background image

Quick Start Guide

www.zyxel.com

Media Server

NSA Series

Version 4.60

Edition 1

Copyright © 2013 ZyXEL Communications Corporation

User’s Guide

Default Login Details

Web Address

nsa310

nsa310s

nsa320

nsa320s

nsa325

nsa325-v2

User Name

admin

Password

1234

Summary of Contents for NSA series

Page 1: ...xel com Media Server NSA Series Version 4 60 Edition 1 Copyright 2013 ZyXEL Communications Corporation User s Guide Default Login Details Web Address nsa310 nsa310s nsa320 nsa320s nsa325 nsa325 v2 User Name admin Password 1234 ...

Page 2: ...s in your product firmware or your computer operating system Every effort has been made to ensure that the information in this manual is accurate Related Documentation Quick Start Guide The Quick Start Guide shows how to connect the NSA and get up and running right away Web Configurator Online Help The embedded Web Help contains descriptions of individual screens and supplementary information ...

Page 3: ...figurator Basics 29 Tutorials 51 Technical Reference 135 Status Screen 137 System Setting 141 Storage 151 Network 165 Applications 175 Packages 215 Auto Upload 265 Dropbox 279 Using Time Machine with the NSA 283 Users 287 Groups 293 Shares 297 Maintenance Screens 305 Protecting Your Data 325 Troubleshooting 327 Product Specifications 345 ...

Page 4: ...Contents Overview Media Server User s Guide 4 ...

Page 5: ...rting the NAS Starter Utility 21 2 3 NAS Seeker Screen 21 2 4 Main NAS Starter Utility Screen 23 2 4 1 Directory of the NAS 24 2 5 Import Files or Folders with zPilot 25 2 6 Network Drive 26 2 7 Manage the Device 27 2 8 Configure System Settings 27 Chapter 3 Web Configurator Basics 29 3 1 Overview 29 3 2 Accessing the NSA Web Configurator 29 3 2 1 Access the NSA Via NAS Starter Utility 30 3 2 2 We...

Page 6: ... 1 Windows 7 Desktop Shortcut 60 4 6 Creating a Volume in a 2 Bay NSA 61 4 6 1 Creating a RAID 1 Volume 61 4 6 2 Migrate Button 62 4 6 3 Create an Internal Volume Button 62 4 7 Creating a Volume in a 1 Bay NSA 63 4 7 1 Creating a RAID 1 Volume 64 4 7 2 Migrate Button 64 4 7 3 Create a SATA Volume Button 65 4 7 4 Creating a PC Compatible Volume 67 4 8 Deleting a Volume 70 4 9 File Sharing Tutorials...

Page 7: ...the NSA 118 4 17 Using a Mac to Access the NSA 119 4 17 1 Finder 120 4 17 2 Go Menu 121 4 18 How to Use the BackupPlanner 122 4 18 1 Creating an Archive Backup 122 4 18 2 Creating a Synchronization Backup 125 4 18 3 Restoring Archived Files by Backup Job 128 4 18 4 Restoring by Backup Files 131 Part II Technical Reference 135 Chapter 5 Status Screen 137 5 1 Overview 137 5 2 The Status Screen 137 C...

Page 8: ...2 What You Can Do 165 8 3 What You Need to Know 165 8 4 The TCP IP Screen 166 8 5 UPnP Port Mapping Screen 169 8 5 1 UPnP and the NSA s IP Address 169 8 5 2 UPnP and Security 170 8 5 3 The NSA s Services and UPnP 170 8 5 4 Configuring UPnP Port Mapping 171 8 6 The PPPoE Screen 172 8 7 Telnet Screen 173 Chapter 9 Applications 175 9 1 Overview 175 9 2 What You Can Do 175 9 3 What You Need to Know 17...

Page 9: ...in 205 9 12 4 Download Service Notification 205 9 12 5 P2P Download Security 206 9 12 6 Web Publishing Example 208 9 12 7 Web Publishing 209 9 12 8 Channel Guides for Broadcatching 210 9 12 9 Printer Sharing 211 9 12 10 Copying Files 211 9 12 11 Synchronizing Files 212 Chapter 10 Packages 215 10 1 Overview 215 10 2 What You Can Do 215 10 3 SMART Screen 215 10 3 1 SMART Brief Summary 216 10 3 2 SMA...

Page 10: ...55 10 12 9 Restore Archive Step 1 255 10 12 10 Restore Archive Step 2 256 10 12 11 Restore Archive Step 3 257 10 13 Restore Screen 257 10 13 1 Restore Step 1 258 10 13 2 Restore Step 2 259 10 13 3 Restore Step 3 260 10 13 4 Restore Step 4 261 10 14 Technical Reference 261 10 14 1 S M A R T Attributes 262 Chapter 11 Auto Upload 265 11 1 Overview 265 11 2 What You Can Do 265 11 3 What You Need to Kn...

Page 11: ...4 Displaying User Info 292 Chapter 15 Groups 293 15 1 Overview 293 15 2 What You Can Do 293 15 3 The Groups Screen 293 15 3 1 Adding or Editing a Group 294 15 3 2 Group Names 295 Chapter 16 Shares 297 16 1 Overview 297 16 2 What You Can Do 297 16 3 The Shares Screen 297 16 3 1 Adding or Editing Share 299 16 3 2 Configuring Advanced Share Access 300 16 3 3 Public and ANONYMOUS Share Access Rights 3...

Page 12: ...verity Levels 318 17 8 3 Log Messages 318 Chapter 18 Protecting Your Data 325 18 1 Overview 325 18 2 Protection Methods 325 18 3 Configuration File Backup and Restoration 325 Chapter 19 Troubleshooting 327 19 1 Troubleshooting Overview 327 19 2 Power Hardware Connections and LEDs 327 19 3 NAS Starter Utility 329 19 4 NSA Login and Access 330 19 4 1 Enabling Scripting of Safe ActiveX Controls 332 1...

Page 13: ...e 13 19 16 Package Management 342 19 17 Backups 343 Chapter 20 Product Specifications 345 20 1 LEDs 345 20 2 Supported Media Server Content Formats 346 20 3 Supported iTunes Server Content Formats 346 Appendix A Legal Information 347 Index 351 ...

Page 14: ...Table of Contents Media Server User s Guide 14 ...

Page 15: ...15 PART I User s Guide ...

Page 16: ...16 ...

Page 17: ...igital cameras without using a computer Have the NSA handle large file downloads Automatically download files from website feeds for convenient viewing Play the NSA s video music and photo files on your computers using the included media client software Play the NSA s video music and photo files on hardware based media players Use the NSA s website to share files with remote users Use iTunes on yo...

Page 18: ...2 Hard Disks for 1 Bay Models The 1 bay NSA models have one internal hard disk bay and one external SATA eSATA port This allows you to connect one internal SATA Serial Advanced Technology Attachment hard disk and one eSATA hard disk optional Initializing the internal hard disk configures it as a JBOD volume by default JBOD stands for Just a Bunch Of Disk and in this storage method all disk space i...

Page 19: ... the NSA to the factory default configuration All settings you have configured on the NSA including IP address password user accounts groups and so on will be reset to the factory defaults The reset process does NOT affect the volume settings nor data stored on the NSA You should periodically back up your configuration file to your computer see Section 17 5 on page 313 for details about managing t...

Page 20: ...Chapter 1 Getting to Know Your NSA Media Server User s Guide 20 ...

Page 21: ...s platform Note Refer to the Quick Start Guide for your NSA s hardware connections and the steps for installing the NAS Starter Utility 2 2 Starting the NAS Starter Utility The NAS Starter Utility broadcasts a request packet when you first run it Each NSA has an NAS Starter Utility Agent that always listens and responds to requests from the NAS Starter Utility The NAS Starter Utility receives the ...

Page 22: ...s screen Table 2 NAS Seeker LABEL DESCRIPTION Connect Select a NSA and click this to connect to it Refresh Click this to refresh the screen The NAS Starter Utility does not automatically refresh Status This shows whether the NSA is Online Unreachable Configuring or Config Failed Server Name This is the server name you configured for the NSA If you have more than one NSA in your network it is recom...

Page 23: ...Click this to use the NSA Seeker screen Section 2 3 on page 21 to find and connect to a different NSA on your network Server Name This is the server name you configured for the NSA If you have more than one NSA in your network it is recommended that you give each one a unique name for identification purposes IP Address This is the current IP address of the NSA MAC Address This is the NSA s unique ...

Page 24: ...wnload torrent files SMART This displays when the NSA has the SMART package installed Click this to view hard disk health and performance details WordPress This displays when the NSA has the WordPress package installed Click this to create and manage a blog or website Use the NSA administrator credentials to log in The administrator can then create accounts for other users eMule This displays when...

Page 25: ...drop files from your computer to the NSA Enter the administrator user name and password and click Login Figure 7 Login The zPilot icon displays Figure 8 zPilot Drag files onto the zPilot icon to move them to the NSA zPilot automatically sorts music photo and video files into the Music Photo and Video folders zPilot automatically sorts the types of media files listed in Section 20 2 on page 346 exc...

Page 26: ... Details 2 6 Network Drive In the main NAS Starter Utility screen click Network Drive to add the NSA as a network drive in your computer s Windows Explorer Enter your user name and password and click Login to be able to add the NSA s shares to which you have access as network drives Otherwise select Guest and click Login to be able to add the NSA s public shares as network drives Figure 11 Login S...

Page 27: ...ter Utility screen click Configuration Administration to log into the NSA s administration screens where you can manage the NSA Enter the administrator user name and password and click Login Figure 13 Login See Section 3 5 on page 44 for more on the administration screens 2 8 Configure System Settings Use these screens to be able to change the NSA s server name time zone PPPoE IP address subnet ma...

Page 28: ...et Enter your user name and password Automatically get IP address Select this if the NSA is automatically assigned an IP address from the ISP or a DHCP server in your network Manually assign IP address Select this if you want to assign the NSA a fixed IP address subnet mask and default gateway Note Do not configure an IP address that is already in use in your network This results to a network IP a...

Page 29: ...ozilla Firefox 3 6 Safari 5 Google Chrome 10 or later versions of these browsers The recommended screen resolution is 1024 by 768 pixels or higher In order to use the web configurator you need to allow Web browser pop up windows from your device Web pop up blocking is enabled by default in Windows XP SP Service Pack 2 JavaScript enabled by default 3 2 Accessing the NSA Web Configurator Make sure y...

Page 30: ...and run the NAS Starter Utility See Chapter 2 on page 21 for more information on the NAS Starter Utility Figure 15 NAS Starter Utility Main Screen 3 2 2 Web Browser Access Configure the server name of your NSA using the Network Configuration screen Section 2 8 on page 27 of the NAS Starter Utility Open your browser and type in the server name of the NSA The default is nsa followed by the number of...

Page 31: ...hapter 14 on page 287 for how to create other user accounts If you use the option to stay logged in for two weeks assuming you do not log out make sure you keep your computer secure from unauthorized access Click User Login to go to the Home screens where you can play media files Click Administrator Login to go to the advanced administration screens Figure 17 NSA Login Screen ...

Page 32: ... yet you should see a screen asking you to change your password highly recommended as shown next Type a new password and retype it to confirm and click Apply or click Ignore Figure 18 Change Password Screen 3 4 Home Screens The Home screen after you log in using User Login Figure 19 Home ...

Page 33: ...es when playing videos The icons at the top right of the screen are visible from most screens Use them to navigate between the screens and menus The following table describes the icons Table 5 Main Home Screen Icons ICON DESCRIPTION Use Music Photo and Video to play and organize your music picture and video files Use Favorite to view lists of commonly played recently played and recently added musi...

Page 34: ... number of pages of entries Click an arrow or type a number to go to another page of entries C Select the sorting criteria Artist Sort music by artist All All of the menu s files display here Folder List the folders containing music files Current Playlist Show the playing and queued songs Thumbnail Click this to view the files as thumbnails List Click this to view the files as a list Play Click th...

Page 35: ... progress and lets you control the playback Figure 21 Now Playing 3 4 2 Exif and Google Maps Photos Click a photo s EXIF button to display or hide the photo s Exchangeable image file format Exif data Figure 22 Exif Information Refresh Click this to update the display in the screen Now Playing This link is available when a song is playing Click it to see details about the song that is currently pla...

Page 36: ... of other photos and only display the current photo s marker Figure 23 Google Maps 3 4 3 Slideshow Photos In a Photo menu click the SlideShow button to display the menu s files as a slideshow Move your cursor over the slideshow s screen to display full screen previous pause and next buttons for controlling the slideshow Note Your browser must have the Flash Player plug in installed to view slidesh...

Page 37: ...hared folder but the access rights are independent of the folder you configure the share and the folder separately You can map a share to a network drive for easy and familiar file transfer for Windows users A folder icon with a hand indicates a share The administrator owns and manages the public shares Double click a media file to open it Double click other types of files to be able to save them ...

Page 38: ... folder s name to display the folder s contents Size This column displays a file s size in bytes Last Modified This column displays the last time the file or folder was changed in year month day hour minute second format Create New Folder Click this to open the following screen where you can create a new folder within the share Specify a name to identify the folder See Section 3 4 6 on page 41 for...

Page 39: ...ur computer Note Do not refresh the screen while a download is going on Compress Select files or folders and click this to compress them into a zip file Decompress Select a zipped file and click this to create a folder named after the zip file and save the decompressed files into the folder Restore When you are in a recycle bin folder select a folder or file and click this to restore it Refresh Cl...

Page 40: ...is share owned by Select the administrator or user account that is to own manage this share The share owner controls access rights to the share This is not configurable for the NSA s default admin and public shares Enable This Share Select this option to allow users to access this share When this option is not selected you cannot see and access this share Enable Recycle Bin Select this option to k...

Page 41: ...s The minimum character length of a name is one character that is a name cannot be blank The maximum character length of share name is 239 characters Unicode is supported for share names although your FTP client must support UTF 8 Full support should be available in all Windows versions after Windows 2000 Share Access Select who can access the files in the share and how much access they are to be ...

Page 42: ... Click this link to go the application s management page where you can configure settings for it See Chapter 9 on page 175 for more information Enable Select a disabled application and click this to turn on the application Some applications are always enabled and cannot be disabled Disable Select an enabled application and click this to turn off the application Select the Flickr or Youtube Uploadr...

Page 43: ...lled if you already have Windows Media Player installed or a link for installing it if you do not already have it installed Double Click Behavior Setting Select Replace current playlist and start to play to have double clicking a song cause the NSA to immediately stop any currently playing song and start playing the double clicked song Select Append to current playlist to have double clicking a so...

Page 44: ...want to change the password Old Password Type the user s current password New Password Create a new password for the user You can type from one to 14 single byte no Chinese characters allowed for example ASCII characters Password Confirm You must type the exact same password that you just typed in the above field Language Select the web configurator language from the drop down list box Go to syste...

Page 45: ...ing table describes the global icons and labels 3 4 1 2 Table 12 Global Labels and Icons LABEL ICON DESCRIPTION Language Select the web configurator language from the drop down list box Help Click this to open web help specific to the screen you are in About Click this to view the model name firmware version and copyright Home Click this to return to the Home screens Logout Click this at any time ...

Page 46: ...ecify the NSA s server name and workgroup name Date Time Chose a time zone and or allow the NSA to synchronize with a time server Storage Volume View volume and disk information and create and edit volumes A volume is a storage area that can span one or more internal disks or a single external USB disk S M A R T Install the SMART package to display this screen you can use to monitor hard disks Net...

Page 47: ...and select the categories to include in the log report TFTP Server Configure the NSA to accept log files from TFTP clients eMule Server Configure the eMule server eMule Task Manage eMule tasks eMule Search Search for files available in an eMule server using keywords and other parameters such as file type file size and extension names pyLoad Configure the NAS to use pyLoad to manage your downloads ...

Page 48: ...lete an entry from the list Edit Click this to jump to related item s configuration screen Refresh Click this to refresh the data for the field or value with which it is associated User See the chapter on user accounts for detailed information on variants of this icon Share See the chapter on shares for detailed information on variants of this icon Healthy This represents a healthy volume Degraded...

Page 49: ... and Photo folders until you create other shares on the NSA This session is then displayed as shown in the following figure Session Example Windows Locate Click this to cause the LED on the external storage device to blink Repair If you replace a faulty disk with a disk that contains a volume you need to delete the volume and then click this to fix the degraded RAID volume Table 14 Common Configur...

Page 50: ...Chapter 3 Web Configurator Basics Media Server User s Guide 50 ...

Page 51: ...Creating a Volume in a 1 Bay NSA see page 63 Deleting a Volume see page 70 File Sharing Tutorials see page 71 Download Service Tutorial see page 80 Broadcatching Tutorial see page 95 Copy and Flickr Auto Upload Tutorial see page 101 FTP Uploadr Tutorial see page 102 Web Configurator s Security Sessions see page 105 Using FTPES to Connect to the NSA see page 118 Using a Mac to Access the NSA see pa...

Page 52: ...Chapter 4 Tutorials Media Server User s Guide 52 1 Click Start Control Panel Set View by to Category and click Network and Internet 2 Click View network computers and devices ...

Page 53: ...click either NSA icon to open the Web Configurator login screen 4 2 1 If the NSA Icon Does Not Display The network containing the NSA must be set as a home or work network in order for the NSA icons to display If the network containing the NSA displays as Public 1 Click Network and Sharing Center and then the network s link circled in the figure ...

Page 54: ...options Install Uninstall Click Install to add the NSA as a device in your computer After you install the NSA you can see it in the computer s list of devices see Section 4 5 on page 58 Click Uninstall to remove the NSA from the list of devices installed in your computer View device web page opens the Web Configurator login screen Create shortcut adds a desktop shortcut to the Web Configurator log...

Page 55: ... Web Configurator Serial number is unavailable because the NSA does not have one MAC address is the NSA s unique physical hardware address MAC You need the MAC address to register the product at myZyXEL com Customer support may also request it for troubleshooting purposes Unique identifier is a unique UPnP ID that the NSA generated IP address is the NSA s IP address It is also the IP address for a...

Page 56: ...2 Click See full map 1 in the figure The network containing the NSA must be set as a home or work network in order to use the full map feature If the network containing the NSA displays as Public click the network s link 2 in the figure although it is already set to home here and use the Set Network Location screen to set the network s location to home or work see page 54 2 1 ...

Page 57: ...Chapter 4 Tutorials Media Server User s Guide 57 3 Double click the NSA s icon to open the Web Configurator login screen See Section 4 2 2 on page 54 for the NSA icon s right click options ...

Page 58: ...ws 7 In Windows 7 the NSA automatically displays as a library in Windows Media Player Figure 31 NSA in Windows Media Player 4 5 Windows 7 Devices and Printers After you use the NSA s network icon s install option you can manage the NSA from the Windows 7 Devices and Printers folder ...

Page 59: ...Download NAS Starter Utility downloads the NSA s Starter Utility It lets you find set up and manage the NSA as well as copy files to it and access the files on it See Chapter 2 on page 21 for details Create shortcut has Windows make a desktop shortcut to this screen Troubleshoot opens Windows device troubleshooting wizard Remove device removes the NSA from the Windows 7 Devices and Printers folder...

Page 60: ... downloads the NSA s Starter Utility It lets you find set up and manage the NSA as well as copy files to it and access the files on it See Chapter 2 on page 21 for details Restore previous versions is the Windows 7 option for restoring a file or folder It does not apply to this shortcut Send to give you options for copying the shortcut to another location Cut removes this shortcut so you can paste...

Page 61: ...tion Your NSA has two bays for Serial Advanced Technology Attachment SATA hard disks The JBOD storage method is used if you are using a single hard disk for your NSA This JBOD volume shows up in the Storage Volume screen Section 7 3 on page 155 as follows 4 6 1 Creating a RAID 1 Volume This storage method allows recovery of data if your hard disk fails To create a RAID 1 volume you must install tw...

Page 62: ... be created This may take quite a while depending on how much data you have in the original volume 4 6 3 Create an Internal Volume Button If you do not have an existing volume in the Storage Volume screen do the following steps to create a RAID 1 volume 1 In the Storage Volume screen click Create an Internal Volume 2 In the Disk Configuration screen you can select the storage method Type in the Vo...

Page 63: ...you can see the following progress bar Wait for the RAID 1 volume to be created 3 The Storage Volume screen displays with your RAID 1 volume 4 7 Creating a Volume in a 1 Bay NSA This section shows you how to create a volume on your 1 bay NSA Creating a volume deletes all existing data in the SATA or eSATA hard disk Make sure you have a backup of your existing data before following the steps in thi...

Page 64: ...her another JBOD or a PC Compatible Volume 4 7 1 Creating a RAID 1 Volume This applies to the NSA310 This storage method allows recovery of data if your hard disk fails To create a RAID 1 volume you must connect an eSATA hard disk to your NSA There are two ways to create a RAID 1 volume Click the Migrate button This is a quick way to create a RAID 1 volume Use this to automatically synchronize dat...

Page 65: ...e Storage Volume screen do the following steps to create a RAID 1 volume 1 In the Storage Volume screen click Create a SATA Volume 2 In the Disk Configuration screen you can select the storage method Type in the Volume Name for your RAID 1 volume The volume name can be 1 to 31 characters a z 0 9 spaces _ and Choose RAID 1 and click Apply This deletes all existing data in the eSATA hard disk Make s...

Page 66: ...Media Server User s Guide 66 The NSA starts creating the volume and you can see the following progress bar Wait for 2 minutes for the RAID 1 volume to be created 3 The Storage Volume screen displays with your RAID 1 volume ...

Page 67: ...isk 1 Connect the eSATA hard disk to your NSA and go to the Storage Volume screen Click Create a SATA Volume 2 In the Disk Configuration screen you can select the storage method Type in the Volume Name for your PC Compatible volume The volume name can be 1 to 31 characters a z 0 9 spaces _ and Choose PC Compatible Volume Select the File System you want to use NTFS in this example Make sure this fi...

Page 68: ...Media Server User s Guide 68 The NSA starts creating the volume and you can see the following progress bar Wait for 2 minutes for the volume to be created 3 The Storage Volume screen displays with your PC Compatible Volume ...

Page 69: ...our NSA to save files to your eSATA hard disk For example you can refer to Section 4 11 on page 95 to use the Broadcatching feature of your NSA to download files to your eSATA disk 1 When asked for the Location of Downloaded Files make sure you save the completed files to the eSATA hard disk Volume 2 in this example 2 The files downloaded by the NSA should be in the Volume 2 folder You can check t...

Page 70: ...e the following notification 4 The computer assigns a letter to the eSATA hard disk drive F in this example that is accessible from the My Computer screen Double click the eSATA drive and check your files They should be the same files that are in the My NSA Share Browser screen 4 8 Deleting a Volume Delete an existing volume in your NSA by doing the following steps ...

Page 71: ...y existing data in the hard disk 4 9 File Sharing Tutorials The following sections cover using the NSA for file sharing This chapter assumes you have already followed the Quick Start Guide instructions to perform initial setup and configuration so you have a working volume See the rest of this User s Guide for details on configuring the NSA s various screens 4 9 1 Creating a User Account Bob wants...

Page 72: ...s Guide 72 1 At the NSA web configurator login screen enter the administrator account and password and click Administrator Login to go to the advanced administration screens 2 Click Sharing Users to open the Users screen Then click Add User ...

Page 73: ...ick Apply to create the account 4 The account now displays in the Users screen Now that Bob has created Jimmy s account he can go through the steps again to create another account for Kevin After both accounts are created he can go to Section 4 9 2 on page 73 to create shares for Jimmy and Kevin 4 9 2 Creating a Share Suppose Bob has already created separate accounts for his sons Jimmy and Kevin N...

Page 74: ...uide 74 1 In the NSA s administration web configurator screens click Shares Add Share Click Add Share to create a new share 2 Specify a name for the share and select which volume it should be on Configure the screen as follows Then click Edit ...

Page 75: ...eate another share for Kevin 4 9 3 Creating a Group After creating user accounts for Jimmy and Kevin Bob wants to create a group for his sons and another one for the parents Bob can assign access rights to his sons group for certain shares such as a cartoons share and allow only the parents group to access the scary movie share This is how he would create the group 1 In the NSA s administration we...

Page 76: ...roup for the parents Then he can see the rest of the tutorials for how to use the groups in assigning access rights to shares 4 9 4 Accessing a Share From Windows Explorer If you map a NSA share where data is stored to a Windows network drive you can use Windows Explorer to transfer files to and from the NSA as if it was another folder on your computer Here he maps Jimmy s share to Jimmy s compute...

Page 77: ...want to map the NSA to from the Drive list box This example uses I Then browse to and select the share on the NSA Click Finish 4 Enter the username and password for Jimmy s account and click OK You do not need to do this if the username and password are the same as Jimmy s Windows login ...

Page 78: ... s share to Jimmy s computer he can go through the steps again to map Kevin s share to Kevin s computer 4 9 5 Accessing a Share Using FTP You can also use FTP to access the NSA Suppose Jimmy is temporarily using a different computer and wants to access his share without mapping it to the computer This is how he would do it 1 Open the FTP client Windows Explorer is used here and type ftp username s...

Page 79: ...er your password and click Login 3 Now you can access files and copy files from to your local computer s drives to or from this network folder 4 9 6 Accessing a Share Through the Web Configurator You can browse and access files through the web configurator ...

Page 80: ...e the folder You can open files or copy them to your computer You can also create new folders and upload additional files to the share 3 Click the logout icon when your are done 4 10 Download Service Tutorial This tutorial covers using the NSA to download a file from the Internet Use this same procedure for P2P downloads as well as regular HTTP web and FTP downloads See Section 9 12 2 on page 204 ...

Page 81: ...e link opens either the file you want or a pop up window about how to handle the file Note It is also OK for the link to open a torrent file If you are redirected to a screen that says the download should start in a few seconds there may be a link to click if the download does not start automatically See if that link opens the file or the pop up window 3 Right click the download link and select Co...

Page 82: ...rials Media Server User s Guide 82 4 Log into the NSA web configurator see Section 3 3 on page 31 using the administrator account and click Application Zone and the Application Zone Download Service link 5 Click Add ...

Page 83: ...res all downloads in the admin share s download folder See Section 4 9 4 on page 76 Section 4 9 5 on page 78 or Section 4 9 6 on page 79 for how to access a share 4 10 2 Installing the Link Capture Browser Plugin In addition to copying and pasting a download link to the Download Service screen you can also install a link capture browser plugin in your web browser Use the plugin to easily add a dow...

Page 84: ...lla Firefox 2 0 3 0 it does not support Windows 7 Internet Explorer 1 Open the folder containing the link capture browser plugin 2 Double click on the plugin to display the following screen Click I Agree to begin installation 3 Select a location to save the plugin and click Install Close the screen once the installation is complete ...

Page 85: ... for ZyXEL s NBG410W3G a 3G wireless router Right click on the download link and select NSA Setting 5 Enter the NSA s web address The default is nsa followed by the number of your model nsa320 for example Then click Apply A warning message displays asking for confirmation Click OK to apply the setting Firefox 1 Open Firefox 2 Open the folder containing the link capture browser plugin ...

Page 86: ...Chapter 4 Tutorials Media Server User s Guide 86 3 To install the plugin drag and drop the plugin to Firefox 4 The following screen displays Click Install Now ...

Page 87: ... Guide 87 5 You need to restart Firefox after the installation 6 When Firefox restarts a message displays to show the installation succeeded The plugin is installed as an extension in Add ons Click Options to configure the NSA s web address ...

Page 88: ...in sending download links to the NSA from your web browser This example shows how to send a download link to the NSA s download service using the link capture browser plugin 1 Open your Internet browser this example uses Firefox 2 Find a download link for the file you want In this example www zyxel com has a Download Now link for downloading a user s guide for ZyXEL s P 660W T1 an ADSL router 3 Ri...

Page 89: ...Log into the NSA web configurator see Section 3 3 on page 31 using the administrator account and click Application Zone and the Application Zone Download Service link 6 The download task appears in the Download Service screen s Active or Queue tab It may appear in the Completed tab if the NSA already finished downloading the file or it may appear in the Error tab if the NSA failed to download the ...

Page 90: ...nload files at night Here is how you use the download period control feature to set the time range 1 Click Applications Download Service Preferences to open the General Settings screen 2 Select Enable Download Period Control and use the arrows to adjust the time period from 23 30 to 09 00 Click Apply to save your changes The NSA only downloads files within this 9 5 hour period every day Note If yo...

Page 91: ...k Apply Here is a list of P2P download settings you want to configure for your NSA Limit the maximum upload rate to 20 KB s Enter this value in the Max upload rate field Actively download three torrent files but only upload one at a time Enter 3 in the Maximum Number of Active Torrents field and enter 1 in the Maximum Number of Seeding Jobs field Keep sharing until the NSA has shared equal or grea...

Page 92: ...w to subscribe to the NSA s download service notifications See Section 9 12 4 on page 205 for more on download service notifications Some RSS readers may not support the NSA s download service notifications For example Google Reader cannot support this feature if the NSA has a private IP address Note It is recommended to subscribe to the download service notifications using the built in reader in ...

Page 93: ...er User s Guide 93 Internet Explorer 7 Example 1 After you activate download service notification click the RSS feed icon 2 The following screen displays Select Subscribe to this feed 3 The following screen displays Click Subscribe ...

Page 94: ...tab to check the updates of your NSA s download list Firefox Example 1 After you activate download service notification click the RSS feed icon 2 The following screen displays Select Live Bookmarks from the drop down list and click Subscribe Now 3 The following screen displays Select Bookmarks Menu and click Add ...

Page 95: ...catching Tutorial Use broadcatching to have the NSA download frequently updated digital content like TV programs radio talk shows Podcasts audio files and blogs This example shows how to subscribe the NSA to the CNET TV Internet television channel See Section 9 9 on page 194 for more on the broadcatching service 1 Open your Internet browser this example uses Firefox ...

Page 96: ...s is not the link for the actual RSS feed Click the link to go to another screen that has RSS feed links Note Make sure the link goes to the actual RSS feed instead of to another list of links or information about the channel One way to test this is by clicking the link Clicking an actual RSS feed link opens a screen of XML code in browsers without an RSS feed aggregator or a window where you can ...

Page 97: ... the download link and select Copy Link Location in Firefox or Copy Shortcut in Internet Explorer 4 Log into the NSA web configurator see Section 3 3 on page 31 using the administrator account and click Administration Applications Broadcatching 5 Click Add Channel ...

Page 98: ...items to delete This example keeps the most recent 10 items 10 Click Apply 11 After a few moments the channel appears in the Broadcatching screen where you can select items you want to download The NSA saves the items you download in a folder named after the channel By default the channel folders are created in the admin share s download folder The NSA s media server feature makes it easy for user...

Page 99: ...he NSA is on and the SYS light is on steady not blinking 2 Use a USB cable to connect the printer s USB port to one of the NSA s USB ports Make sure the printer is also connected to an appropriate power source 3 Turn on the printer 4 The NSA detects the printer after a few moments 5 On your computer open your CIFS file sharing program Windows Explorer for example and browse to the NSA Double click...

Page 100: ... get the file from the printer s CD or the printer manufacturer s website the driver is not installed on the NSA Note You must install the printer driver on each computer that will use the printer After the driver installation finishes the computer is ready to use the printer Select the printer in an application to use it to print Browse to the NSA using a CIFS program like Windows Explorer and do...

Page 101: ...details on setting up a Flickr account for auto upload In this example Amy select the NSA s photo share for auto upload This is how Amy would transfer the files from her USB disk to the NSA 1 Click Applications Copy Sync Button in the navigation panel to open the screen 2 Configure the copy settings as shown and click Apply 3 Press and release the COPY SYNC button on the NSA s front panel to start...

Page 102: ...ally upload files saved on the NSA to a remote FTP server Amy wants to share files on her NSA with Susan They each have an NSA at home so Susan has to set her NSA as an FTP server for Amy to automatically send files using FTP Uploadr l To set the NSA as an FTP server click Applications FTP to open the FTP screen Select Enable FTP and click Apply Amy s NSA Susan s NSA ...

Page 103: ...er NSA This is how Amy would set up the NSA s FTP Uploadr 1 Click Applications Auto Upload FTP Uploadr to open the FTP Uploadr screen Select Enable FTP Uploadr and click Apply to turn on FTP Uploadr 2 Click Add Server 3 Enter the information as describe in Table 15 on page 103 Click Apply to add the server Table 15 FTP Uploadr Tutorial FTP Server Information FTP Domain Name or IP Address example2 ...

Page 104: ...ferences to configure the auto upload settings 5 Amy wants to share video files with Susan In the Preferences screen click the Add button and select video from the Shares drop down list box enter a forward slash in the Path field and click Apply to add the share to the Folder Watch List t ...

Page 105: ... or modified files will be uploaded automatically to the Amy share on Susan s NSA Similarly Susan can go through the steps described above to configure FTP Uploadr on her NSA Once Susan completes the setup Amy can also receive files from Susan s NSA 4 15 Web Configurator s Security Sessions These tutorials show you how to configure security for the NSA s Web Configurator sessions You will customiz...

Page 106: ...izing the NSA s Certificate 1 Click Maintenance SSL and then select Edit a self signed CA certificate and click Edit 2 Next let s modify the certificate by changing the Common Name to this NSA s host name of nsa the Organization to ZyXEL and the Key Length to 2048 ...

Page 107: ...r s Guide 107 3 The NSA restarts its network services and returns you to the login screen 4 15 2 Downloading and Installing Customized Certificate 1 Log in and return to Maintenance SSL Under Modify the Existing Certificate click Download ...

Page 108: ...Chapter 4 Tutorials Media Server User s Guide 108 2 Save the file to your computer 3 Find the certificate file on your computer and double click it ...

Page 109: ...ser s Guide 109 4 Install the certificate The rest of the steps in this section are an example of installing a certificate in Windows In the Certificate dialog box click Install Certificate 5 In the Certificate Import Wizard click Next ...

Page 110: ...utorials Media Server User s Guide 110 6 Leave Automatically select certificate store based on the type of certificate selected and click Next 7 In the Completing the Certificate Import Wizard screen click Finish ...

Page 111: ...ick Yes 9 Finally click OK when presented with the successful certificate installation message 4 15 3 Turn on the NSA s Web Security Now that you have customized the NSA s certificate and installed it in your computer you can turn on security for your Web Configurator sessions This example uses Firefox 3 0 ...

Page 112: ...12 1 Close your web browser and open it again to reset its session with the NSA Log in and click Maintenance SSL Select Force HTTPS and click Apply 2 A warning screen pops up if applying your change may disconnect some users Click Apply to continue ...

Page 113: ...you out and automatically redirects your formerly non secure HTTP connection to a secure HTTPS connection Your browser may give you a warning about the device s public key certificate Add an exception to allow your browser to bypass the warning 4 Click Add Exception ...

Page 114: ...Chapter 4 Tutorials Media Server User s Guide 114 5 Click Get Certificate ...

Page 115: ...Chapter 4 Tutorials Media Server User s Guide 115 6 Before you add an exception verify that the device to which you are trying to connect is providing the correct certificate Click View ...

Page 116: ... Server User s Guide 116 7 The SHA1 fingerprint must match the NSA s certificate you downloaded from the NSA to your computer Double click the NSA s certificate file and then click Details and look at the Thumbprint Click Close ...

Page 117: ...plays Now anyone who connects to the NSA s Web Configurator screens will automatically do so by HTTPs Use a secure method to let your users know the correct fingerprint for the NSA s certificate so they can check it before adding a security exception as in steps 6 to 7 on pages 115 to 116 See the next section for how to use FTPES with the NSA for secure FTP transfers ...

Page 118: ...he NSA for secure FTP transfers Before you go through this section read Section 4 15 on page 105 to configure HTTPS This example uses FileZilla 1 Open FileZilla and click File Site Manager New Site Configure the Host field with the NSA s address Set the Servertype to FTPES FTP over explicit TLS SSL Configure the account name and password Click Connect ...

Page 119: ...K The shares and folders to which Gonzo has access display Now you can use FTP to securely transfer files to or from the NSA Use a secure method to let your users know the correct fingerprint for the NSA s certificate so they can check it before adding a security exception 4 17 Using a Mac to Access the NSA This tutorial shows you how to find the NSA on Mac OS X 10 5 Leopard You can access the NSA...

Page 120: ...Chapter 4 Tutorials Media Server User s Guide 120 4 17 1 Finder 1 Open a new Finder window 2 Select All under the SHARED sidebar Look for the NSA from the Network list ...

Page 121: ...Chapter 4 Tutorials Media Server User s Guide 121 3 Expand the NSA to display the shares you may access 4 17 2 Go Menu 4 In the Finder click Go Connect to Server ...

Page 122: ...appear only after you have installed and enabled BackupPlanner BackupPlanner is an application that you can install using Package Management see Chapter 10 on page 215 Use the NSA s BackupPlanner to have a backup of your files and folders Schedule backups for times when the network is not busy like at night or on weekends For example you might do daily backups of important individual files or fold...

Page 123: ...often added to the shares that you need to back up and existing files are not frequently changed so select Incremental The NSA does a full backup first and later only copies source files that are new and or modified since the last backup This example sets the NSA to do another full backup after every four incremental backups Figure 33 Protect Backup Add Job Step 1 ...

Page 124: ...ect the volume1 check box to select all the folders and files Select Remote and enter the other NSA s address username password and share name If you want to make sure the remote NSA is reachable click Test Connection Figure 34 Protect Backup Add Job Step 2 ...

Page 125: ... is already configured on the target NSA so you can leave the encryption off too Have the NSA keep 3 backups Figure 35 Protect Backup Add Job Step 3 5 Set the frequency to Weekly Schedule the backup for 5 00 every Saturday morning Protect Backup Add Job Step 4 4 18 2 Creating a Synchronization Backup To create a synchronization backup ...

Page 126: ... Mirror to make the target folder identical to the source folder The NSA deletes any other files in the target folder Figure 37 Protect Backup Add Job Step 1 2 Select the folder that needs to be mirrored your Private folder in this example and Remote Enter the other NSA s address and administrator password Click Show target content to display the remote NSA s contents Select the destination on the...

Page 127: ...anch office is a good one and not many files need to be backed up so leave the compression off Turn on the encryption to protect these sensitive files during the transfer The final files stored on the remote NSA will be unencrypted usable Restrict the bandwidth usage to 256 KB s to stop the archives from using all of your network connection s available bandwidth You don t have to configure a purge...

Page 128: ...ou do not need to use a special restore process to use the files a synchronization backup creates The copy of files that the NSA creates on the other NSA s Backups share can be used directly by anyone with access to that share 4 18 3 Restoring Archived Files by Backup Job If you have backup jobs for which the NSA has already performed backups you can restore the files based on the backup job Do th...

Page 129: ...Media Server User s Guide 129 1 Click Protect Backup screen select a backup job and click Restore Archive Figure 42 Protect Backup 2 Select which backup to use and click Next Figure 43 Protect Backup Restore Archive Step 1 ...

Page 130: ...rver User s Guide 130 3 Select the files and folders you want to restore and click Next Figure 44 Protect Backup Restore Archive Step 2 4 Select the original location and click Done Figure 45 Protect Backup Restore Archive Step 3 ...

Page 131: ...rray containing the backup job failed you cannot restore archived files by the backup job In this example the NSA s RAID array failed You ve replaced the hard drives and re configured the RAID To restore by backup files 1 Click Protect Restore Specify where the archive files are located In this example enter 192 168 3 2 as the IP address admin as the account name 1234 as the password and Backups a...

Page 132: ... Media Server User s Guide 132 2 Select the backup job and backup time and click Next Figure 48 Protect Restore Step 2 3 Select everything in the share except the recycle folder Click Next Figure 49 Protect Restore Step 3 ...

Page 133: ...hapter 4 Tutorials Media Server User s Guide 133 4 Browse to the folder where you want to put the files Click Done Figure 50 Protect Restore Step 4 5 The NSA restores the files and you can use them again ...

Page 134: ...Chapter 4 Tutorials Media Server User s Guide 134 ...

Page 135: ...135 PART II Technical Reference ...

Page 136: ...136 ...

Page 137: ...us screen which is the first advanced administration screen that displays 5 2 The Status Screen Click Administration in the Home screens Section 3 5 on page 44 to open the Web Configurator You can also view the status screen by clicking Status on the top left of the navigation panel Figure 51 Status ...

Page 138: ...gure this UPS This shows the Uninterruptible Power Supply UPS capacity Click the Edit icon to go to the screen where you can configure this CPU Usage This displays a summary of CPU usage by all current processes Click the Show CPU Info icon to display the ten processes currently using the most CPU capacity Click the Refresh icon to update this display It also automatically updates itself every 10 ...

Page 139: ...olume For external drives this field shows front USB for the front USB port and rear USB1 and rear USB2 for the rear USB ports Disk Usage This field shows total disk size the percentage of the disk being used and the percentage that is available Active Sessions This shows how many users are currently connected to the NSA Type This shows whether it s a Windows CIFS web web configurator or FTP conne...

Page 140: ...Chapter 5 Status Screen Media Server User s Guide 140 ...

Page 141: ...and use the following applications BackupPlanner Use this to schedule and run backup jobs for files stored in your NSA to an internal drive external storage device or to another NSA in the network DyDNS This gives your NSA a domain name with a dynamic IP address At the time of writing this package supports accounts from the following service providers DynDNS NoIP 3322 ZoneEdit and DHS Gallery This...

Page 142: ...net It uses the Kad protocol pyLoad Use this to have the NAS manage your downloads including those from one click hosting sites One click hosting sites allow Internet users to easily upload files to the one click host s server so others can download them The following applications come with their own configuration screens and documentation Gallery NZBGet PHP MySQL phpMyAdmin SqueezeCenter Transmis...

Page 143: ...g packages Table 17 System Setting Firmware Packages LABEL DESCRIPTION Firmware File Type the location of the firmware file you want to upload Browse Click this to find the file on your computer Upload Click this to upload the new firmware The NSA automatically restarts after you upgrade Wait until the restart completes before accessing the NSA again If you interrupt the upgrade then the NSA may b...

Page 144: ... Install Upgrade Choose the item s on the list and click this to install the selected application s on your system or upgrade to the latest version if you have previously installed the application Uninstall Cancel Installation Choose the item s on the list and click this to uninstall the selected application s from your system or cancel their active download s or install process es This is only av...

Page 145: ... the NSA that you can configure in the NSA Web Configurator Enabled This displays for applications installed and enabled by the NSA that have their own web configurators Disabled This displays for applications installed and disabled by the NSA that have their own web configurators Unknown It is possible to get this status if the web location for the application is unavailable Package Name This is ...

Page 146: ...in the NSA Web Configurator Enabled This displays for applications installed and enabled by the NSA that have their own web configurators Disabled This displays for applications installed and disabled by the NSA that have their own web configurators Name This is the name of the application Size This is the size of the application at initial download Needed Space This is the needed space to complet...

Page 147: ...inus signs allowed but not as the last character The name must begin with an alphabet a z and is NOT case sensitive Description Add text here to describe the NSA if the Server Name field is not enough Use up to 61 characters You can use all characters except the following Workgroup Name Type your workgroup name in this field A workgroup is a group of computers on a network that can share files The...

Page 148: ...u enter time settings manually they revert to their defaults when power is lost New Date yyyy mm dd This field displays the last updated date from the time server or the last date configured manually When you set Time and Date Setup to Manual enter the new date in this field and then click Apply New Time hh mm ss This field displays the last updated time from the time server or the last time confi...

Page 149: ...zones in the European Union start using Daylight Saving Time at the same moment 1 A M GMT or UTC So in the European Union you would select March Last Sunday The time you specify depends on your time zone In Germany for instance you would type 2 because Germany s time zone is one hour ahead of GMT or UTC GMT 1 End Date Configure the day and time when Daylight Saving Time ends if you selected Enable...

Page 150: ...Chapter 6 System Setting Media Server User s Guide 150 ...

Page 151: ... or backup data The eSATA hard disk is optional You can attach one SATA and one eSATA to the NSA hard disk tray Both SATA and eSATA hard disks are treated as internal disks volumes refer to Section 7 3 on page 155 USB attached storage disks are treated as external disks volumes Volume A volume is a storage area on a disk or disks You can create volumes on the internal disks and external disks atta...

Page 152: ...lly repairs a degraded RAID volume if you insert an empty disk without an existing file system Otherwise when you replace a disk you must go to the Storage Internal Volume RAID screen select the degraded array and click Repair Resynchronizing or Recovering a RAID 1 Volume Resynchronizing or recovering a RAID 1 volume that was down is done block by block so the time it takes depends more on the siz...

Page 153: ...eated on NSA internal disk drives and external volumes created on external disk drives attached to the NSA USB ports Create a SATA Volume NSA310 Click this to format internal hard drives and create a new volume All data on the disk s will be lost Create a USB Volume NSA310 Click this to format an external hard drive and create a new volume All data on the disk will be lost Status This field shows ...

Page 154: ...sk JBOD volume The volume is unusable If you removed one of the disks you should be able to re install it and use the volume again as long as you did not change anything on the disk If a disk has failed you need to replace it and re create the whole volume All data will be lost See page 328 for how to install or replace a hard drive Down when a volume is down and can not be fixed A down RAID volum...

Page 155: ...is no explicit message from CIFS that tells users their volume is degraded or down 7 3 Creating an Internal SATA Volume In the Storage screen Figure 57 on page 153 click the Create an Internal Volume or Create a SATA Volume button depending on your model to open the following screen Use this screen to create a new NSA internal disk drive volume Note Creating a volume formats the hard drive All dat...

Page 156: ...e by other computer systems However the computer s platform for example Windows XP SP2 should support the file system you selected for the eSATA hard disk External Disk This is checked automatically It refers to the eSATA hard disk that you can attach as a second drive to your NSA310 File System Select the file system you want the new volume to use Windows file systems include NTFS Recommended for...

Page 157: ...IPTION Volume Name For an internal volume type a volume name from 1 to 31 characters To avoid confusion it is highly recommended that each volume use a unique name Acceptable characters are all alphanumeric characters and spaces _ underscores and periods The first character must be alphanumeric A Z 0 9 The last character cannot be a space For an external volume type a volume name from 1 to 32 sing...

Page 158: ...le Repair Select this to have the NSA automatically attempt to repair any errored files it detects during the scan This may also result in the NSA finding some files and placing them in the Lost and Found share The rest of the screen shows which users are currently connected to the NSA They will be disconnected if you perform the scan Type This shows whether it s a Windows CIFS web Web Configurato...

Page 159: ...e first character must be alphanumeric A Z 0 9 The last character cannot be a space Available Disk s Select the external USB device upon which you want to create the volume File System Select the file system you want the new volume to use Windows file systems NTFS Recommended FAT32 Newer and more efficient than FAT16 Supports a volume size of up to 2 TB Tera Bytes and individual file sizes of up t...

Page 160: ...the smallest drive in the array and N is the number of drives in the array Storage efficiency assumes all drives are of identical size Performance rankings are approximations 7 6 2 Choosing a Storage Method for a Volume The following is a guide to help you choose a storage method for the various number of disks supported on the NSA See Section 7 6 3 on page 161 for theoretical background on JBOD a...

Page 161: ...dancy as if one disk fails the other has the duplicated data Mirroring setups always require an even number of drives Duplexing Like in mirroring all data is duplicated onto two distinct physical hard drives but in addition it also duplicates the hardware that controls the two hard drives one of the drives would be connected to one adapter and the other to a second adapter Striping Striping is the...

Page 162: ...but written sequentially to each disk until it s full RAID 0 RAID 0 spreads data evenly across two or more disks data striping with no mirroring nor parity for data redundancy so if one disk fails the entire volume will be lost The major benefit of RAID 0 is performance The following figure shows two disks in a single RAID 0 volume Data can be written and read across disks simultaneously for faste...

Page 163: ...ault tolerance without need of large amounts of storage capacity or top performance for example accounting and financial data small database systems and enterprise servers RAID and Data Protection If a hard disk fails and you re using a RAID 1 volume then your data will still be available but at degraded speeds until you replace the hard disk that failed and resynchronize the volume However RAID c...

Page 164: ...Chapter 7 Storage Media Server User s Guide 164 ...

Page 165: ...at You Need to Know IP Address The NSA needs an IP address to communicate with other devices on your network The NSA can get an IP address automatically if you have a device on your network that gives them out Or you can assign the NSA a static fixed IP address DNS Server Address A DNS Domain Name System server maps domain names like www zyxel com to their corresponding numerical IP addresses This...

Page 166: ...he same size of jumbo frames that you specify in the NSA Note If you enable jumbo frames on the NSA in a network that does not support them you will lose access to the NSA If this occurs you will have to restore the factory default configuration Push the RESET button on the NSA s rear panel and release it after you hear a beep In the following example the NSA has jumbo frames enabled and set to 8K...

Page 167: ... information is assigned the NSA uses Auto IP to assign itself an IP address and subnet mask For example you could connect the NSA directly to your computer If the computer is also set to get an IP address automatically the computer and the NSA will choose addresses for themselves and be able to communicate Static Select this option for the NSA to use fixed TCP IP information You must fill in the ...

Page 168: ...onfigurator Enable Another Web Configuration Port Select this to configure an additional HTTP port for accessing the web configurator Specify a number in the Port Number field Jumbo Frames Jumbo frames improve network performance You must have a 1 Gbps Gigabit Ethernet network that supports jumbo frames Select the largest size of frame that all of your network devices including computer Ethernet c...

Page 169: ...allow access from the WAN Internet to services you select on the NSA You can also set which port Internet users need to use in order to access a specific service on the NSA Note To use UPnP port mapping your Internet gateway must have UPnP enabled If your Internet gateway supports Port Address Translation PAT is sometimes included with a port forwarding feature you can have the Internet users use ...

Page 170: ... CIFS is a standard protocol supported by most operating systems in order to share files across the network Using UPnP port mapping for CIFS allows users to connect from the Internet and use programs like Windows Explorer to access the NSA s shares to copy files from the NSA delete files on the NSA or upload files to the NSA from the Internet If you configure UPnP port mapping to allow CIFS access...

Page 171: ...s to these files from the Internet without having to enter a user name or password See Section 9 8 on page 193 for more on web publishing 8 5 4 Configuring UPnP Port Mapping Click Network UPnP Port Mapping to display the UPnP Port Mapping screen Use this screen to set how the Internet gateway s UPnP feature configure s the Internet gateway s NAT IP address mapping and port mapping settings These s...

Page 172: ...eway to allow access from the Internet to the NSA s service If you clear this check box people will not be able to access the NSA s service from the Internet unless you manually configure the Internet gateway s firewall and NAT rules to allow access WAN Port When you enable WAN access for one of the NSA s services specify the port number 1 65 536 Internet uses need to use to connect to the Interne...

Page 173: ...he IP address of your PPPoE connection IP Subnet Mask This field displays the IP subnet mask of your PPPoE connection Configuration Enable PPPoE Connection Select this option to establish a direct Internet connection for the NSA You need to enter the username and password as given by your ISP Username Enter the username exactly as your ISP assigned If assigned a name in the form user domain where ...

Page 174: ...in the navigation panel to open the following screen Figure 70 Network Telnet The following table describes the labels in this screen Table 34 Network Telnet LABEL DESCRIPTION Enable Telnet Service Select this to enable Telnet access to the NSA Clear it to not allow Telnet access to the NSA To use Telnet log in as admin or root and use the admin password Apply Click this to save your changes Reset...

Page 175: ... Section 9 9 on page 194 to download frequently updated digital content like TV programs radio talk shows Podcasts audio files and blogs Use the Print Server screen Section 9 10 on page 200 to share a printer Use the Copy Sync Button screen Section 9 11 on page 202 to transfer files between a USB device and the NSA Use the Auto Upload screens Chapter 11 on page 265 to upload files in selected shar...

Page 176: ...ble in a home network iTunes Server The NSA iTunes server feature lets you use Apple s iTunes software on a computer to play music and video files stored on the NSA You can download iTunes from www apple com Download Service The NSA s download service downloads files from the Internet directly to the NSA You do not have to download to your computer and then copy to the NSA This can free up your co...

Page 177: ...oadcatching to have the NSA download frequently updated digital content like TV programs radio shows podcasts audio files and blogs RSS RSS Really Simple Syndication is a format for delivering frequently updated digital content A channel uses a feed to deliver its contents items Subscribe the NSA to a feed to be able to download the contents 9 4 FTP Server Use FTP or FTPES FTP over Explicit TTL SS...

Page 178: ...ured 10 in the Connection Limit field The FTP connection limit will only be 3 6 ports in the range divided by 2 because it is the smaller value Starting Port Enter the first port number in the range Choose from 1024 to 65535 Ending Port Enter the last port number in the range Choose from 1024 to 65535 Download Upload Rate For All Users include admin Select this if you want to limit the download up...

Page 179: ...s Media Server Media Server LABEL DESCRIPTION Enable Twonky Media Server Select this to have the NSA share the media files in the shares selected in the Share Publish tab Clear it to stop the NSA from sharing media files through the Home screens or media players Click the hyper link to open the Twonky media server configuration screens to check media server status or modify media server settings S...

Page 180: ...following screen Use this screen to turn the iTunes server on or off Figure 76 Applications iTunes Server Publish Photos Select this to give media clients access to the share s photo files Publish Videos Select this to give media clients access to the share s video files Apply Click this to save your changes Reset Click this to restore your previously saved settings Table 37 Applications Media Ser...

Page 181: ...plications Download Service LABEL DESCRIPTION Enable Download Service Use this option and click the Apply button to turn the download service off or on If you turn off the service all downloads are paused Files currently downloading are queued Turning on the download service resumes downloads or restarts them if they are not able to resume Enable Download Notify Use this option and click the Apply...

Page 182: ...ompleted item and click this to re seed a P2P file or download a file again If you want to re seed a P2P task keep the P2P file and the completed file in their original locations Task Info Select an item on the list and click this to display information about the download task See Section 9 7 6 on page 192 for more details The table lists your downloads Click a column s heading to sort the entries...

Page 183: ...ding This value is in the format ConnectedPeers AllPeers Health where Connected Peers is the number of computers to which the NSA is connected in order to download the file AllPeers refer to the total number of computers to which the NSA can connect in order to download the file Health indicates the availability of the file Download Speed This is how fast the NSA is getting the file It is normal f...

Page 184: ...ated to the magnet link For a P2P download using a torrent file you can copy and paste the URL of the torrent file The NSA will automatically download the torrent file and use it You do not have to manually download the torrent file or save it to your computer Note Make sure the link opens either the file you want or a pop up window about how to handle the file It is also OK for the link to open a...

Page 185: ...lick this to open the following screen where you can set the default folder location where you Put incomplete downloads in and Move complete downloads to Share Select the share from the list Path Type the folder location in the share directly or click Browse to open the following screen and navigate to the file s location Current Location This is the location of the selected folder Folder Name Ent...

Page 186: ... General Download Settings Click Applications Download Service Preferences to open the following screen Use this screen to set the default location for saving downloads and configure the download period Figure 79 Applications Download Service Preferences General Settings ...

Page 187: ...hat channel where is a folder that you have set Edit Click this to open the following screen where you can set the default folder location where you Put incomplete downloads in and Move complete downloads to Share Select the share from the list Path Type the folder location in the share directly or click Browse to open the following screen and navigate to the file s location Current Location This ...

Page 188: ...e is active in the time period hh mm hh mm Specify the time period for the NSA to download files Note If you also configured the Power On Off Schedule feature in the Power Management screen make sure your active download period does not conflict with the power off period Apply Click this to save your changes Reset Click this to restore your previously saved settings Cancel Click this to return to ...

Page 189: ...onfigured in the Maximum Number of Active Torrents field Maximum Number of Active Connections Specify how many active connections are allowed on the NSA Enter a number from 1 to 500 This specifies the number of computers that can connect to the NSA to download files being shared by the NSA Keep Sharing While With P2P download the NSA starts sharing a file while you are downloading it Set how long ...

Page 190: ...nload Edit IP Filter LABEL DESCRIPTION Enable IP Filter Click this to enable or disable IP filtering for P2P downloads Update IP Filter Table File from the Internet Every Week Select this option and enter a URL to use an online IP filter table You can find an online IP filter table in websites such as http www bluetack co uk config level1 gz When you change the URL of the online IP filter table th...

Page 191: ... a tutorial on adding a download task Figure 82 Applications Download Service Select Files The following table describes the labels in this screen Table 45 Applications Download Service Select Files LABEL DESCRIPTION Select Files File Name This is the name of a file specified in the torrent file Select the check boxes of the files you want to download Size This is the size of the file to be downlo...

Page 192: ...data Complete This field displays how much has been downloaded to the NSA Seeds This is the number of computers that are sharing the complete file that you are downloading Peers This is the number of other computers that are also downloading and sharing the file you are downloading Download Speed This field displays how fast the NSA downloads the file Upload Speed This field displays how fast the ...

Page 193: ...files Completed on This field displays when the file was successfully downloaded to the NSA Info Hash This information is used to verify the torrent file Tracker This field displays the tracker that NSA is currently connected to A tracker is a server used for finding peers sharing the file Close Click this to close the screen Table 46 Applications Download Service Task Info LABEL DESCRIPTION Table...

Page 194: ...u include it when telling others how to access the web published share For example say you specified port 8080 the NSA s IP address is 192 168 1 23 and the name of the web published share is FamilyPhotos You would have to enter http 192 168 1 23 8080 MyWeb FamilyPhotos in your browser s address bar to access the share s web page Unpublished Shares This list box displays the shares that the NSA doe...

Page 195: ...the channel s items that you have already downloaded stay in the channel s folder in the admin share s download folder Refresh Channel Select a channel and click Refresh Channel to check for new files Edit Channel Select a channel and click Edit Channel to open a screen where you can set the channel s download and delete policies The table lists channels and their files Click a column s heading to...

Page 196: ...2P download users Double click the item to go to the Download Service screen Downloading The NSA is downloading the file Double click the item to go to the Download Service screen Queued The file is waiting in line for the NSA to download it Double click the item to go to the Download Service screen Pause The download has been manually stopped Double click the item to go to the Download Service sc...

Page 197: ...licking the link Clicking an actual RSS feed link opens a screen of XML code in browsers without an RSS feed aggregator or a window where you can add the RSS feed in browsers with an RSS feed aggregator Download Policy Set which of the channel s items the NSA downloads Download All Items Download every file in the feed Download Only New Items Download new files from today on Manually Choose Items ...

Page 198: ...ck this to open the following screen where you can set the default folder location where you Put incomplete downloads in and Move complete downloads to Share Select the share from the list Path Type the folder location in the share directly or click Browse to open the following screen and navigate to the file s location Current Location This is the location of the selected folder Folder Name Enter...

Page 199: ...ield This is read only URL This is the address of the channel Download Policy Set which of the channel s items the NSA downloads Download All Items Download every file in the feed Download Only New Items Download new files from today on Manually Choose Items for Download Only download individual files you select later in the Broadcatching screen Delete Policy Set how the NSA handles deleting the i...

Page 200: ... that channel where is a folder that you have set Edit Click this to open the following screen where you can set the default folder location where you Put incomplete downloads in and Move complete downloads to Share Select the share from the list Path Type the folder location in the share directly or click Browse to open the following screen and navigate to the file s location Current Location Thi...

Page 201: ...ch printer connected to the NSA must use a unique name Actions Rename Click this to change the name the NSA uses for the printer Cancel Job Click this to remove all print jobs from the NSA queue for a particular printer However since the NSA sends print jobs to the printer as soon as it can this button may only have an effect if there are very large or many print jobs in the queue To stop a print ...

Page 202: ...SA to copy files from your USB device to the NSA Select NSA USB to copy files from the NSA to your USB device Create a New Folder for Copied Files Select this option to place the copied files in a new folder The name of the folder created for the copied files consists of the date and time of the copy in year_month_day_hour_minute_second format Backup Files to be Replaced This option is only availa...

Page 203: ...is enabled by default with the video photo and music shares published Songs from the iTunes Store After using iTunes on your computer to download songs from Apple s iTunes Store you can copy them to the NSA Many of these songs have DRM Digital Rights Management At the time of writing you can use your Apple account ID and password to authorize up to a total of five computers to play the files To au...

Page 204: ...ocol Note Do not use the NSA for illegal purposes Illegal downloading or sharing of files can result in severe civil and criminal penalties You are subject to the restrictions of copyright laws and any other applicable laws and will bear the consequences of any infringements thereof ZyXEL bears NO responsibility or liability for your use of the download service feature Torrent Files The NSA needs ...

Page 205: ...nk Capture Browser Plugin Instead of copying and pasting a file s URL to the NSA s download service you can right click on the URL in the web browser and select Send to NSA The URL is then added to the NSA s download service list See Section 4 10 2 on page 83 and Section 4 10 3 on page 88 for tutorials about installing and using the link capture browser plugin Note At the time of writing the plugi...

Page 206: ...ased Firewall Place a hardware based firewall between your network and the Internet a software based firewall on your computer would just protect the computer itself not the NSA since your computer is not between your NSA and the Internet Figure 95 Firewall Ideally your firewall should have the following Stateful packet inspection to control access between the Internet and your network and protect...

Page 207: ...ownload users are also trying to download the file from you The firewall slows this down because by default it only allows traffic from the Internet in response to a request that originated on the LAN it lets you get files from the Internet and blocks those on the Internet from getting files from you Figure 96 Firewall Blocking Incoming P2P Download Requests To speed up P2P download file transfers...

Page 208: ...Requests 9 12 6 Web Publishing Example This example covers how to configure the Web Publishing screen to let people use a web browser to access a share named FamilyPhotos without logging into the Home screens and shows how to access the share through the Internet 1 Click Applications Web Publishing and configure the screen as shown enable the web publishing and move FamilyPhotos over to Published ...

Page 209: ... having to log into the Home screens This way you can share files with others without them having to know and enter a user name and password For example if you want to share photos in a FamilyPhotos share you could web publish it and others could use a web browser to access the photos at http my NSA s IP Address MyWeb FamilyPhotos Note The NSA does not use any security for the files in the publish...

Page 210: ...configure one set of firewall rules and NAT or port forwarding settings on your Internet gateway specifically for allowing access to the web published shares and another separate set of rules for accessing the NSA s web configurator 9 12 8 Channel Guides for Broadcatching Here are some popular broadcatching channel guide web sites Note ZyXEL does not endorse these web sites and is not responsible ...

Page 211: ... NSA s USB port to let multiple computers on your network use it See www zyxel com for a list of compatible printers Figure 101 Printer Sharing 9 12 10 Copying Files You can copy files from a USB device to the NSA or from the NSA to a USB device Simply press and release the COPY SYNC button to start copying files See Section 9 11 on page 202 for details about configuring the copy settings ...

Page 212: ...ynchronizing Files Synchronization makes the contents on the target device identical to the ones on the source device You can synchronize files from a USB device to the NSA or from the NSA to a USB device In addition you may also synchronize files in both directions simultaneously Press and hold the COPY SYNC button until you hear a beep to synchronize files See Section 9 11 on page 202 for detail...

Page 213: ... device is transferred to the NSA File A from the USB device replaces file A on the NSA File C on the NSA is deleted USB NSA When you synchronize files in both directions simultaneously both storage devices transfer unique files to one another Files with the same file name are synchronized according to their modification date time The difference in modification time between the two files has to be...

Page 214: ...les Example 2 A on the USB device and B on the NSA are modified more recently File A from the USB device replaces file A on the NSA File B from the NSA replaces file B on the USB device A copy of file C from the USB device is transferred to the NSA A copy of file D from the NSA is transferred to the USB device A B Before Sync After Sync USB NSA A B USB NSA C D B A B C D D C new A new new new new n...

Page 215: ...NSA to accept log files from TFTP clients Use the eMule screens Section 10 8 on page 226 to configure the server task and search settings for the eMule application Use the pyLoad screen Section 10 9 on page 240 to configure the NAS so you can have it manage your downloads including those from one click hosting sites Use Polkast Section 10 10 on page 241 for fast secure direct access to your NSA fr...

Page 216: ...he entries by that criteria Status This shows the condition of the hard disk volume Go to Section 7 4 on page 157 for more information Name This shows the name assigned to the hard disk Temperature This shows the temperature of the hard disk in degrees celsius Performance This shows your hard disk s performance Refer to Section 10 3 2 on page 217 for more information on how S M A R T determines yo...

Page 217: ...the Threshold Value Bad This shows when you compare each Value with the Threshold Value and at least one Value is less than or equal to the Threshold Value Detailed Information Model Family This shows the vendor and product family of the hard disk Device Model This shows the factory model of the hard disk Serial Number This shows the serial number of the hard disk Firmware Version This shows the f...

Page 218: ...s 100 or 200 usually represent the mean or normal value Worst This is the lowest value attained by the hard disk since S M A R T started its assessment of the hard disk Threshold This is the attribute s threshold value If the attribute s current normalized value is less than or equal to the threshold the attribute has failed An attribute value close to or below the threshold indicates the hard dri...

Page 219: ...ibute has failed if the normalized value is less than or equal to the threshold This displays if the attribute is not failing now and has never failed in the past FAILING_NOW This displays if the attribute s current normalized value is less than or equal to the threshold In_the_past This displays if the attribute s current normalized value is greater than the threshold but the worst recorded value...

Page 220: ... to use dynamic DNS You need to have registered a dynamic DNS account with a service provider such as www dyndns org The Dynamic DNS service provider will give you a password or key Service Provider Select your Dynamic DNS service provider Hostname Enter your host name provided by the Dynamic DNS service Username Enter your user name for your DNS account Password Enter the password assigned to you...

Page 221: ... edit it Refer to Section 10 5 1 on page 221 for the Edit NFS Share screen Delete NFS Share s Select an NFS share from the list and click this to delete it The table lists your NFS shares Click a column s heading to sort the entries by that criteria Status This shows whether the share is active or not NFS Share Path This shows the location of the share in the NSA Volume Name This shows the volume ...

Page 222: ...The NFS server assigns this path to the share folder you input Comment Enter a short description for the share DN IP Filter Enter the domain name s or IP address es that can have access to the NFS share Enter to make the share available to all users in the network You can also enter a wildcard such as domain com to indicate that all users within that network have access to the share Select the acc...

Page 223: ...y firewalls between the NSA and the syslog clients in order to let the syslog traffic go to the NSA Table 60 Network NFS NFS Session LABEL DESCRIPTION Type This shows if the NFS share is active or not NFS Share Path This shows the location of the share in the NSA Username This shows the username of the active user connected to the NFS share Connected At This displays the date and time the user las...

Page 224: ...plays the share folder s path Type the location of the folder using forward slashes as branch separators or use Browse to find or create a folder on the NSA After you click Apply in the Syslog Server screen the NSA creates a folder for the current month s logs The folder s name uses the year and month in YYYYMM format Purge Policy Select Enable Purge Policy and set a number of months in the Log De...

Page 225: ...elect the format you want to use for recording the received logs The Example item below the drop down list boxes displays how the selected custom format looks For example if you select Full Date the individual log entries would display with something like 2009 May 13 17 15 51 in front of them Apply Click this to save your changes Reset Click this to restore the screen s last saved settings Table 6...

Page 226: ...nfigure the eMule server Click Applications eMule Server to open the following screen Figure 115 Applications eMule Server Path Use this if you want to further specify a folder within the share This field displays the share folder s path Type the location of the folder using forward slashes as branch separators or use Browse to find or create a folder on the NSA Apply Click this to save your chang...

Page 227: ...lect a server from the list and click this to disconnect from the server Edit Server Select a server from the list and click this to edit the server s information including the server name and IP address Refer to Section 10 8 3 on page 228 for the Edit Server screen Delete Selected Server s Select the server s from the list and click this to delete the server s from the list The table lists your s...

Page 228: ...e Server Add LABEL DESCRIPTION Server IP Select this if you know the server name IP address and port number of the eMule server you want to add Server Name Enter the server name IP Address Enter the IP address of the server Port Number Enter the port number used by the server for file sharing ED2K Link Select this and enter the ED2K link for the eMule server you want to add The ED2K link is used w...

Page 229: ...s connection to the server Connected Connecting or Not Connected ED2k ID This is the identification given to the NSA by the eMule server The ID comes in two types High ID The NSA connects to the server directly Low ID The NSA connects to the server from behind a firewall ED2k IP This is the IP address of the eMule server to which the NSA is connected ED2k Port This is the port number of the eMule ...

Page 230: ...Click this to add a download task ED2K link to the list Refer to Section 10 8 6 on page 232 for the Add Task screen Preferences Click this to open a screen where you can set the default location for saving downloaded files You can also configure your eMule download settings Refer to Section 10 8 7 on page 233 for the Preferences screen Browse Incomplete Downloads Click this to open a screen where ...

Page 231: ...o the task File Size Size This shows the size of the file s associated in the task Complete This shows the percentage of the file that has been downloaded by the NSA It also indicates what percent of the file still needs to be downloaded Source This shows the total number of peers that can share the required files to the NSA eMule client Download Speed This shows the download speed of the NSA for ...

Page 232: ...L DESCRIPTION Source ED2K Link Paste the ED2K link of the file you want to download into this field The ED2K link identifies files in the eMule network It starts with ed2k and may contain the name and size of the file you want to download Location of Downloaded Files This shows where the NSA stores new downloads Put incomplete downloads in and where the NSA moves completed downloads Move completed...

Page 233: ...e Browse to find or create a folder on the NSA or type the location of the folder using forward slashes as branch separators Current Location This is the location of the selected folder Folder Name Enter a new folder name and click to create it Type This identifies the item as a folder or file Name This is the name of the folder file Select a folder If you don t select a folder a forward slash dis...

Page 234: ...Preferences LABEL DESCRIPTION Username Username Enter your user name that identifies the NSA in the eMule network Location of Downloaded Files This shows where the NSA stores new downloads Put incomplete downloads in and where the NSA moves completed downloads Move completed downloads to The Share column shows the name of the share where the file is downloaded The Path column points to the locatio...

Page 235: ...ays in the Path field All contents within the specified share are automatically selected Click Apply to save your settings and Cancel to close the screen Port Number UDP Port Enter the UDP port number you want to use for file transfers TCP Port Enter the TCP port number you want to use for file transfers Upload and Download Rate Max download rate Enter the maximum download rate for download tasks ...

Page 236: ...en without saving Table 69 Applications eMule Task Preferences LABEL DESCRIPTION Table 70 Applications eMule Task Preferences Edit IP Filter LABEL DESCRIPTION Enable IP Filter Click this to enable IP filtering This prevents your NSA from accessing certain networks and IP addresses that may be hosting malicious programs Select Update IP Filter Table File from the Internet Every Week if you know the...

Page 237: ...e name can be 1 to 239 single byte no Chinese characters allowed for example ASCII characters The name cannot be the same as another existing folder in the same path See Section 3 4 6 on page 41 for more information on folder names Upload Click this to add files to the share Use Browse to locate a file and click Apply to upload the file Note that the size of each file should be less than 2 GB Rena...

Page 238: ... list and click this to make a duplicate of the file folder to another share Current location This is the name of the share and folder path that you are in Type The icon in this column identifies the entry as a folder or a file The folder with an arrow pointing up is for the link that takes you to the next higher layer in the share s folder tree Name This section lists the share s existing folders...

Page 239: ...ile s is not completed the file parts cannot open on their own Hash This shows the hash value of the download file This is a text string that can be interpreted by eMule to check the downloaded file s integrity ED2K Link This shows the ED2K link for this file The ED2K link identifies files in the eMule network It starts with ed2k and may contain the name and size of the file you want to download S...

Page 240: ...ze Enter the minimum file size you want included in the search results Max Size Enter the maximum file size you want included in the search results Min Sources Enter the minimum number of peers sharing the file you want to download Extension Enter the file extensions separated by commas of files you want included in the search results Search Click this to have the NSA search the eMule network for ...

Page 241: ...nagement Page This is the IP address and port number of the NSA s pyLoad management login screen The pyLoad management login screen uses the NSA s IPv4 address and the port number you configure Click this link to go to it Username Only the admin account can log into the pyLoad management screen Password You can configure a separate password for using the admin account to access the NSA s pyLoad ma...

Page 242: ...pear click the Retrieve List from Internet icon to update the list Figure 129 Polkast Installation Step 1 2 The following confirmation screen appears Click Apply The NSA must have a connection to the Internet to download the Polkast package Figure 130 Polkast Installation Step 2 ...

Page 243: ...Chapter 10 Packages Media Server User s Guide 243 3 The installation progress appears in the Polkast row Figure 131 Polkast Installation Step 3 ...

Page 244: ...Chapter 10 Packages Media Server User s Guide 244 4 A link appears in the Management Page column after installation finishes Click this link Figure 132 Polkast Installation Step 4 ...

Page 245: ...rmation on using Polkast visit www polkast com Get free Polkast mobile apps from the Apple App Store Amazon AppStore and Android Market For Polkast Pro users the NSA does not count as a second homebase for pricing purposes 10 11 Protect Screens The Protect screens include Backup screens These include steps to create and customize backup jobs Restore screens These include steps to restore previous ...

Page 246: ... s included in that backup job to the NSA This applies to Archive backups only Refer to Section 10 12 8 on page 255 to see the screens Abort Job Select a backup job in the list and click this to stop the process if the backup job is currently active Status This shows the current state of the backup job Waiting means the backup job is not active but is scheduled to run at some time Running indicate...

Page 247: ...ain undisturbed You can also choose between the following types of archive Full The NSA does a fresh backup each time This provides the most protection but also requires the most storage space Incremental The NSA backs up new or modified files from the source folder since the last backup The first backup is a full backup You can also do a full backup after several incremental backups Enter how man...

Page 248: ...ackages Media Server User s Guide 248 10 12 2 Backup Step 2 Use this screen to specify where the files you want to backup are located and set where you want the backup to be stored Figure 136 Protect Backup Step 2 ...

Page 249: ...de select a sub folder or file within that folder the main folder icon will turn and any new sub folders and files added to this main folder after the initial backup configuration will NOT be backed up A list of your select folders and files displays below the selection fields Selected Source Folders This shows the path of the backup source folder you selected Backup Target Select the target folde...

Page 250: ...sion is a method of packing computing files in a way that saves hard disk space For a Synchronization backup to a remote target the source data will be compressed before the transmission to reduce the transmission time It is used in slow networks only Encryption Select Yes if you want NSA to encrypt the files for your backup Otherwise choose No In an Archive backup this means using a password to s...

Page 251: ...er files that existed only in those previous backups Select this if backup space is limited and recovery of old files is not important If you want to store all backups for a certain time period select Keep Backups for n day s 1 3650 Enter a value n from 1 to 3650 to specify how many days the NSA stores all backup files After this day has expired all backup files will be deleted Previous Click this...

Page 252: ...al between days when the NSA performs the backup job Every how many weeks This is only available if you selected Weekly as your backup frequency Enter the interval between weeks when NSA performs the backup job Step 1 Please select the month s of a year This is only available if you selected Monthly as your backup frequency Select the month s when you want the NSA to perform the backup job Step 2 ...

Page 253: ...ly and shows the path of the source folder for backup Backup Target This field is read only and shows on which volume whether internal or external the backup files are stored If the target location is a remote NSA this shows the remote IP address Target Path This field is read only and shows the target folder for the backup files Compression This field is read only and shows whether the backup emp...

Page 254: ... NSA stores All backup files older than the last one are deleted You will not be able to recover files that existed only in those previous backups Select this if backup space is limited and recovery of old files is not important If you want to store all backups for a certain time period select Keep Backups for n day s 1 3650 Enter a value n from 1 to 3650 to specify how many days the NSA stores al...

Page 255: ...days when the NSA performs the backup job Every how many weeks This is only available if you selected Weekly as your backup frequency Enter the interval between weeks when NSA performs the backup job Step 1 Please select the month s of a year This is only available if you selected Monthly as your backup frequency Select the month s when you want the NSA to perform the backup job Step 2 Please sele...

Page 256: ...backup job Scheduler Information This field displays the backup s frequency Restored Time Select a previous backup in the list that you want to restore to your NSA Next Click this to go to the next screen Table 82 Protect Backup Restore Archive Step 1 LABEL DESCRIPTION Table 83 Protect Backup Restore Archive Step 2 LABEL DESCRIPTION Step 2 Please select which file s folder s to restore Folder Choo...

Page 257: ...e Step 3 LABEL DESCRIPTION Step 3 Set a restore target and start restoring Original Location Select this to restore the files to their original location in the NSA Other Location Click this to select a folder where you want to place the restored files Click Browse to open the following screen Volume Select a volume from the list Current Location This is the location of the selected folder Type Thi...

Page 258: ... in another NSA in the network that you used for your backup Fill in the fields below when you choose this option Select Internal or External Volume if you want to use another volume in the NSA or an attached USB hard disk for your backup Click Browse to select the backup file IP Address Enter the address of the NSA you want to use User Enter the username you use to access the NSA Password Enter t...

Page 259: ...to save your settings and Cancel to close the screen Next Click this to go to the next screen Table 85 Protect Restore Step 1 LABEL DESCRIPTION Table 86 Protect Restore Step 2 LABEL DESCRIPTION Step 2 Select Restore Point If you selected Remote NSA for the backup you want to restore you can see a list of all the backups you performed in the Job Name table If you selected Internal or External Volum...

Page 260: ...want to restore to your NSA Previous Click this to go back to the previous screen Next Click this to go to the next screen Table 86 Protect Restore Step 2 LABEL DESCRIPTION Table 87 Protect Restore Step 3 LABEL DESCRIPTION Step 3 Please select which file s folder s to restore Folder Chooser Select the folder where the backup you want to restore is located Selected Folder This shows the path of the...

Page 261: ...apter Table 88 Protect Restore Step 4 LABEL DESCRIPTION Step 3 Set a restore target and start restoring Browse Click this to select a folder where you want to place the restored files Volume Select a volume from the list Current Location This is the location of the selected folder Type This identifies the item as a file or folder Name This is the name of the folder file Click Apply to save your se...

Page 262: ...gin of a channel when it reads data 07 Seek Error Rate Low This is the rate of the magnetic heads seek errors A failure in the mechanical positioning system such as servo damage or a thermal widening of the disk results in seek errors An increasing number of seek errors indicate the condition of the disk surface and the mechanical subsystem are worsening 08 Seek Time Performance High This is an av...

Page 263: ...l subsystem problems 199 UltraDMA CRC Error Count Low This is the number of data transfer errors through the interface cable according to the ICRC Interface Cyclic Redundancy Check 200 Write Error Rate Multi Zone Error Rate Low This is the total number of errors in writing sectors 201 Soft Read Error Rate Low This is the number of read write head off track errors If the value is not zero make a ba...

Page 264: ...nt Low This is the total number of load cycles 226 Load In time This is the total time that the magnetic heads actuator has had a load not been in the parking area 227 Torque Amplification Count Low This is the number of attempts to compensate for variations in platter speed 228 Power Off Retract Cycle Low This is how many times the magnetic armature was automatically retracted because the power w...

Page 265: ...ckr and or YouTube account 11 2 What You Can Do Use the Flickr YouTube screen Section 11 4 on page 265 to upload photos and videos to your Flickr and YouTube accounts Use the FTP Uploadr screen Section 11 5 on page 274 to upload files to FTP servers 11 3 What You Need to Know FTP File Transfer Protocol FTP is a file transfer service that operates on the Internet A system running the FTP server acc...

Page 266: ... Flickr YouTube Disable Enable Select a service from the list and click this to turn the service on or off If you disable the service and add more files to the watch folder s the NSA will not auto upload these files However the NSA still uploads any files added before you turned off the service Pause Resume Select a service from the list and click this to pause or resume the auto upload feature Co...

Page 267: ...Chapter 11 Auto Upload Media Server User s Guide 267 The web browser opens the Yahoo Flickr login page Enter your Yahoo account s information and click Sign In Figure 150 Yahoo Flickr Login Page ...

Page 268: ...LL ALLOW IT to establish a link between the NSA and your Flickr account Figure 151 Flickr Authorization A confirmation page displays indicating successful authorization Return to the NSA web configurator Click Get Ready in the following screen to complete the authorization process Figure 152 Confirming Flickr Authorization ...

Page 269: ... Upload Media Server User s Guide 269 Once the NSA is associated with your Flickr account you can configure auto upload settings in the following screen Figure 153 Applications Auto Upload Flickr YouTube Config Flickr ...

Page 270: ...er is available for auto upload represents a missing folder The share may be deleted from the NSA or the hard disk was removed from the NSA Share Name This is the share selected for auto upload Path This is the path of a folder selected for auto upload The NSA only uploads files stored in the specified share or folder to your Flickr account Action Use the Remove icon to remove a folder from the Fo...

Page 271: ...o can see your media files on Flickr Determine who has the right to see files uploaded to your Flickr account Select Only You if you do not want anyone else to see your files You may also restrict the access to Your friends and or Your family You can set up a friend family list in your Flickr account Select Anyone to allow everyone to see your files Hide from public site area Check this option to ...

Page 272: ...ettings in the following screen Figure 155 Applications Auto Upload Flickr YouTube Config YouTube The following table describes the labels in this screen Table 92 Applications Auto Upload Config YouTube LABEL DESCRIPTION Youtube Account Configuration Username This field displays the Youtube account authorized for the auto upload feature ...

Page 273: ...contains files you want the NSA to automatically upload Share Select the share from the list Path Type the folder location in the share directly or click Browse to open the following screen and navigate to the folder s location Current Location This is the location of the selected folder Folder Name Enter a new folder name and click to create it Type This is the type of the folder file Name This i...

Page 274: ...en you add new files to the specified shares the NSA also automatically uploads the new files to the FTP server Use this screen to configure the FTP Uploadr Click Applications Auto Upload FTP Uploadr to open the screen shown next Figure 156 Applications Auto Upload FTP Uploadr Who can see your media files on YouTube Determine who has the right to see files uploaded to your YouTube account Select O...

Page 275: ...g Yes will disable the FTP Uploadr Add Server Click this to add a target FTP server entry See Section 11 5 1 on page 275 for more details Preferences Click this to manage the settings of the FTP Uploadr Edit Server Select a server from the list and click this to edit the FTP server entry Delete Selected Server s Select a server from the list and click this to remove the FTP server entry Server Inf...

Page 276: ...ver LABEL DESCRIPTION Domain Name IP Address Enter the domain name or IP address of the FTP server Account Name Enter the account name used to access the FTP server Password Enter the password associated with the account name Port Number Enter the port number for the FTP server Remote Path Enter the path of the FTP server where the NSA automatically uploads files Description Enter additional infor...

Page 277: ...lder Watch List Status This field indicates whether the share or folder is available represents a valid folder The folder is available for auto upload represents a missing folder The share may be deleted from the NSA or the hard disk was removed from the NSA Share Name This is the share selected for auto upload Path This is the path of a folder selected for auto upload The NSA only uploads files s...

Page 278: ... Click Apply to save your settings and Cancel to close the screen Settings Grace Period Specify how long the NSA should wait when you add a new file for auto upload For example if you set the grace period to 5 minutes the NSA uploads a new file after it has been in a watched folder for 5 minutes You can choose from a range of 1 to 10080 minutes up to one week Bandwidth Limit Enter the maximum uplo...

Page 279: ... and have the NSA download torrent files 12 2 Dropbox Screen Use the Dropbox screen to log the NSA into your Dropbox account This creates Drop2NAS and zDownload folders in your Dropbox account See Section 12 3 on page 281 for how to use the folders to move files to your NSA and have the NSA download torrent files The NSA checks the Dropbox account s Drop2NAS and zDownload folders every three minut...

Page 280: ...ile from your Dropbox account Dropbox account has been already used on other NAS One Dropbox account can only work with one NSA at a time Log the other NSA out of your Dropbox account to be able to use the account with this NSA Name This is the owner of the Dropbox account the NSA is configured to use Email This is the e mail address of the owner of the Dropbox account the NSA is configured to use...

Page 281: ... the same name to the Drop2NAS folder the NSA adds a number to the names of the files in the NSA s Enable Dropbox Select this to synchronize and back up your Dropbox account The first time you do this a Dropbox screen prompts you to log into your Dropbox account Then a NSA pop up opens Click Get Ready Click Allow when the Dropbox screen notifies you of the NSA s DropNAS application trying to conne...

Page 282: ...opies torrent files in the zDownload folder to the NSA s admin download torrents folder and automatically starts downloading them The NSA adds a suffix to the name of each torrent file in the Dropbox account s zDownload folder and keeps updating it to show the job s state downloading queued paused canceled uploading finished error or retrying The NSA does not take any action for folders nor other ...

Page 283: ...ime Machine backups Click Applications Time Machine to open the following screen Figure 162 Applications Time Machine The following table describes the labels in this screen 13 3 Using Time Machine After enabling Time Machine on the NSA follow the steps below to set up Time Machine on your Mac to use your NSA for backup Table 97 Applications Time Machine LABEL DESCRIPTION Enable Time Machine Selec...

Page 284: ...ne with the NSA Media Server User s Guide 284 1 Click Apple System Preferences Then go to System and select Time Machine 2 Turn Time Machine ON Then click Change Disk 3 Select share01 as the backup disk Then click Use for Backup ...

Page 285: ... configuring user accounts and shares see Section 4 9 on page 71 In this example user1 12345 is used Then click Connect 5 Time Machine starts backing up files to share01 after 120 seconds If you want to backup immediately click Time Machine icon and select Back Up Now 6 The screen shows the status of the backup once the process begins 7 To stop the backup process click the Time Machine icon and se...

Page 286: ...Chapter 13 Using Time Machine with the NSA Media Server User s Guide 286 ...

Page 287: ...nage shares that he owns Change his own password Access the contents of other shares to which he is given access rights 14 2 What You Can Do Use the main Users screen Section 14 3 on page 287 to display a list of user accounts created on the NSA Use the Add User screen Section 14 3 2 on page 289 to create new user accounts Use the Edit User screen Section 14 3 2 on page 289 to edit the properties ...

Page 288: ...r Click this to open a screen where you can configure a new user account Refer to Section 14 3 2 on page 289 to see the screen Search Click this to display a search field Type in the name of an account and then click Search to look up the account you specified Click Clear to close the search function Edit User Select an account and click this to open a screen where you can edit the properties of t...

Page 289: ...e used by the account You can also check the account s membership in any groups Refer to Section 14 4 on page 292 to see the screen Display Number Click the drop down menu to set how many accounts you want to display in one screen Go to Page Click the drop down menu to display and access more user accounts User Type This field displays whether the account is an administrator account or a user acco...

Page 290: ... Users Add or Edit a User General Settings The following table describes the labels in these screens Table 100 Users Add or Edit a User LABEL DESCRIPTION General Settings Click this to configure the user s user name and password Username Type a name from 1 to 32 single byte no Chinese characters allowed for example ASCII characters See Section 14 3 3 on page 291 for more details on usernames New P...

Page 291: ...word that you just typed in the above field Account Type Select Administrator to give the account full configuration and management access to the NSA Select User to give the account basic access rights to the NSA and allow the user to manage his own shares change his own password and access the contents of other shares to which he is given access rights Quota per volume Click this to configure whi...

Page 292: ...e This field displays the selected username Space Usage Click this to display the amount of volume space used by the selected account Group List Click this to display the selected user s group membership Volume Name This field displays the volume s created on the NSA Used Space This field displays how much storage space the selected account is currently using This only applies for files that the u...

Page 293: ... 15 2 What You Can Do Use the main Groups screen Section 15 3 on page 293 to display and manage a list of groups created on the NSA Use the Add Group screen Section 15 3 1 on page 294 to create new groups Use the Edit Group screen Section 15 3 1 on page 294 to edit the properties of an existing group 15 3 The Groups Screen Use this screen to create and manage groups Click Sharing Groups to display...

Page 294: ...the group you specified Click Clear to close the search function Edit Group Select a group and click this to open a screen where you can edit the properties of the selected group Delete Selected Group s Select a group and click this to open a screen where you can delete the group Display Number Click the drop down menu to set how many groups you want to display in one screen Go to Page Click the d...

Page 295: ... group names are All leading and trailing spaces are removed automatically Table 103 Sharing Groups Add or Edit a Group LABEL DESCRIPTION Group Name Type a name from 1 to 32 single byte no Chinese characters allowed for example ASCII characters See Section 15 3 2 on page 295 for more details on group names Group Membership Use this field to assign group membership to individual users Available Use...

Page 296: ...oup name cannot be the same no matter the letter case as an existing group For example if a group exists with the name FAMILY you cannot create a group named family The group name cannot be the same as a system group name such as EVERYONE nor be the same as an existing group Other reserved groups names that are not allowed are nobody root everyone ...

Page 297: ...list of shares created on the NSA Use the Add Shares screen Section 16 3 1 on page 299 to create additional shares on the NSA Use the Recycle Bin screen Section 16 4 on page 301 to configure and clean up the recycle bins Use the Edit Share screen Section 16 3 1 on page 299 to edit a share s properties Use the Share Browser screen Section 16 5 on page 302 to navigate add and edit the contents in a ...

Page 298: ...u may delete the share from the NSA Share Type The NSA automatically creates an Auto SATA share for each internal SATA volume The auto SATA share has the same name as the volume and is the volume s root or master share It contains all of the volume s shares All new shares you create on the volume are also automatically included in the auto SATA share You cannot delete edit or use the share browser...

Page 299: ... byte no Chinese characters allowed for example ASCII characters The name cannot be the same as another existing share See Section 3 4 6 on page 41 for more information on share names Volume You should have already created volumes a single accessible storage area with a single file system on the NSA Select the one that contains the folder that you want to share out You cannot modify this when edit...

Page 300: ...ign access rights full read only or deny to users or groups If you publish the share to the media server or the web all users will have at least read only access to the share regardless of what you configure here Keep it private to owner means only the share owner selected above can access the share Make it Public means every user including people who do not have accounts on the NSA can access the...

Page 301: ...te the item in the recycle folder You may move or copy the deleted item to another share Table 106 Sharing Shares Add Share or Edit Share Advanced LABEL DESCRIPTION Available Users Groups This field lists the users groups to which you can assign access rights Authority Use this field to assign access rights to users groups Full Control gives users groups full access read write and execute to all f...

Page 302: ...Sharing Shares Recycle Bin LABEL DESCRIPTION Clean Recycle Bin every N days Specify how often you want to clear the contents in all recycle bins The specified days correspond to how long a file has been stored in a recycle bin For example if you set the interval to be 3 days recycle bins will clean up items deleted or not accessed for 3 days Note Cleaning up recycle bins permanently removes the fi...

Page 303: ... make sure you keep the file extension Delete Select a file folder from the list and click this to open a warning screen Click Yes to delete the file folder or click No to close the screen Move Select a file folder from the list and click this to relocate the file folder to another share Copy Select a file folder from the list and click this to make a duplicate of the file folder to another share ...

Page 304: ...wn list Path This field displays the share folder s path You can use Browse to find or create a folder on the NSA or type the location of the folder using forward slashes as branch separators Browse Click this to open the following screen and navigate to the location of the file folder Current Location This is the location of the selected folder Folder Name Enter a new folder name and click to cre...

Page 305: ...and Wake on LAN Use the Log screen Section 17 4 on page 309 to check the system s logs Use the Configuration screen Section 17 5 on page 313 to backup or restore the NSA configuration file Use the SSL screen Section 17 6 on page 314 to configure HTTPS and the NSA s SSL certificate Use the Shutdown screen Section 17 7 on page 316 to restart or shut down your NSA 17 3 The Power Screen Use this scree...

Page 306: ...e gets down to the percentage you specify in this field This allows the NSA to shut down properly and avoid data loss caused by a power failure when the UPS stops supplying power A setting around 50 is recommended A setting close to 100 is not recommended since it would cause the NSA to shut down whenever the UPS is charging A setting close to 0 is also not recommended since the UPS would not have...

Page 307: ...igured Click Edit to go to the screen where you can configure the power control schedules Refer to Section 17 3 2 on page 308 for this screen Note This feature is not supported on NSA310 Enable Wake On LAN Enable Wake On LAN to be able to turn on the NSA through its wired Ethernet connection You must have a computer or router on your LAN that supports sending Wake On LAN magic packets to turn on t...

Page 308: ...e to have it reboot every Friday at 14 00 Click a column s heading cell to sort the schedules by that column s criteria Click the heading cell again to reverse the sort order Type This field displays whether the power control schedule has the NSA turn on turn off or reboot Frequency This field shows how often monthly weekly or daily the NSA is to apply this power control schedule Execute Time This...

Page 309: ...A does not perform the restart or power off If the NSA is turned on at the time when a power on is scheduled the NSA does not perform the power on Use this part of the screen to configure power on power off and reboot times Please select the day of the month This is only available if you set the Frequency to Monthly Choose the day of each month for the power control schedule entry Every how many w...

Page 310: ...BEL DESCRIPTION Refresh Click this to update the log display Purge all Logs Click this to erase all logs from the NSA Report Config Click this to open a screen where you can configure email alerts for logs Refer to Section 17 4 1 on page 310 to see the screens for this Display The screen always shows all logs by default Choose a specific log category to view logs for just that category This is the...

Page 311: ... To Enter the e mail address where you want to receive the log alerts Email From Enter the e mail address the NSA uses in the From field of the e mail header for its log alerts Email Server Enter the e mail server address the NSA uses to send e mail alerts Email Format Select the e mail format you want the NSA to use in its e mail alerts Use SMTP Authentication Click this if the e mail server you ...

Page 312: ...t Config screen click the Syslog Server Setting tab to open the following screen Figure 181 Maintenance Log Report Config Syslog Server Setting Table 114 Maintenance Log Report Config Report Setting LABEL DESCRIPTION Email Alert Check the type of log alerts you want to receive in your e mail Select All Log to include all types of log alerts Email Report Check the type of log alerts you want to rec...

Page 313: ...our e mail Select All Log to include all types of log alerts Apply Click this to save your changes Cancel Click this to return to the previous screen without saving Table 116 Maintenance Configuration LABEL DESCRIPTION Backup Current Configuration Settings Backup Click this to save the current configuration of the NSA to your computer A pop up screen appears asking you to confirm Click OK to conti...

Page 314: ...te authority Figure 183 Maintenance SSL Restore Click this to load the previously saved configuration file to the NSA This replaces your current NSA configuration settings with the settings in the previously saved configuration file A pop up screen appears asking you to confirm Click OK to continue or Cancel to quit Reset MySQL Database Password Click this to reset the password for your MySQL data...

Page 315: ...f the NSA s public key certificate to your local computer This is useful for installing the certificate without having to connect to the NSA or for sending by email to other users for them to install prior to logging into the NSA for the first time After saving the certificate to your computer double click it to install it Note Each web browser handles certificate installation differently Modify t...

Page 316: ... option and enter the NSA s IP address if you want to use this for the common name Host Domain Name Select this option and enter the NSA s domain name if you want to use this for the common name Organizational Unit Optional Enter this name of the organizational unit which owns or maintains the NSA This is an optional field Organization Optional Enter this name of the organization or company which ...

Page 317: ...nce Shutdown Confirm Shutdown 17 8 Technical Reference This section provides technical background information on the topics discussed in this chapter 17 8 1 Log Classes The following table shows information on log classes Table 119 Maintenance Shutdown LABEL DESCRIPTION Restart Click this to have the device perform a software restart Shutdown Click this to shut down the system and restart it again...

Page 318: ... NSA Table 120 Log Classes continued LOG CATEGORY DESCRIPTION Table 121 Log Severity Levels LEVEL DESCRIPTION 0 Emergency 1 Alert 2 Critical 3 Error 4 Warning 5 Notice 6 Info Table 122 Log Messages CLASS SEVERITY MESSAGE Auto upload INFO s is queued Auto upload INFO s uploaded Flickr or YouTube Upload Auto upload WARNING error uploading s s s Auto upload INFO s will not be uploaded to s for there ...

Page 319: ...n INFO USB Sync Finished Elapsed Time s Seconds Copy Sync Button INFO USB Sync Moving s from Internal Volume to Backup Folder Copy Sync Button INFO USB Sync Moving s from USB to Backup Folder Copy Sync Button INFO USB Sync Skip s File not Exist Copy Sync Button INFO USB Sync Skip s Not a Regular File Copy Sync Button INFO USB Sync Start Pre Processing Generating File Lists Copy Sync Button NOTICE ...

Page 320: ...wnload s Download Service INFO Download service stopped Download Service INFO Download service suspend s because of no data income detected or to limit max download slot Download Service INFO Download service add comment s to s by user Download Service INFO Download service set min upload download ratio to d Download Service INFO Download service set max seed slot to d Download Service INFO Downlo...

Page 321: ...rk NOTICE Interface s was disabled Network NOTICE Interface s was enabled Network NOTICE Port Group on s is changed Renew DHCP client Network NOTICE Account pppoe was changed Network NOTICE Add account pppoe Network NOTICE ADD interface ppp0 Network NOTICE Interface ppp0 will reapply because Device Ha become active status Network NOTICE Interface ppp0 will reapply because Device Ha is not running ...

Page 322: ...RROR Start Repairing Degraded Raid by disk s FAILED Storage INFO Relabel Raid to s SUCCESS Storage INFO Start Repairing Degraded Raid by disk s SUCCESS Storage NOTICE Auto Repair Degraded RAID by disk s Storage NOTICE There is a RAID Degraded Storage ERROR Cancel External Volume Scan FAILED Storage ERROR Cancel Internal Volume Scan FAILED Storage ERROR Cannot Unmount Volume and RAID System Busy Us...

Page 323: ...gin attempt incorrect password or inexistent username Users ALERT Failed s login attempt incorrect password or inexistent username Users INFO User s has logged in from s Users INFO User s has logged out from s Users INFO User s from s has been logged out re auth timeout Users INFO User s from s has been logged out lease timeout Users NOTICE Add new user s by s from s Users NOTICE User s password h...

Page 324: ... schedule Power Management INFO Job s is triggered by user Power Management ERROR Job s is resulted as failed Power Management INFO Job s is finished successfully Power Management INFO Job s is pending because other job is running Power Management INFO Job s is canceled by user Power Management INFO Restore job s is triggered by user Power Management INFO Power On schedule is triggered Power Manag...

Page 325: ... a configuration backup file If things go wrong after you make the configuration changes you can always go back to the previous configuration by restoring an earlier configuration file Table 123 Overview of Protection Methods SITUATION ACTION Unexpected NSA behavior after configuration changes Back up the NSA configuration file before you make major configuration changes Need to transfer data from...

Page 326: ...de 326 If you forgot the NSA password then use the RESET button see Section 1 1 4 on page 19 to return the NSA to the factory default configuration Note Configuration File Backup and Restoration does not affect data your files and folders volumes on the NSA ...

Page 327: ...ile Transfer Networking Some Features Screens Do Not Display Media Server Functions Download Service and Broadcatching Functions Web Publishing Auto Upload Package Management Backups 19 2 Power Hardware Connections and LEDs The NSA PWR LED does not turn on no LEDs are on Make sure the NSA is turned on Make sure you are using the power adaptor or cord included with the NSA Make sure the power adapt...

Page 328: ...le hard disk installed the hard disk is installed correctly in the disk bay Push the disk back into the NSA disk bay until the hard disk is fitted snugly inside the NSA see the NSA Quick Start Guide and Section 7 2 1 on page 152 the hard disk could be faulty Try a different hard drive or test the original hard disk in a different NSA or computer 2 If you had to replace the drive turn on the NSA an...

Page 329: ... the NSA will download the file again If the file is intact but not completely downloaded the NSA will resume the download task after it restarts 19 3 NAS Starter Utility The NAS Starter Utility cannot discover my NSA Close the NAS Starter Utility and reopen it Check your hardware connections and make sure they are set up correctly Only one instance of the NAS Starter Utility can run on your compu...

Page 330: ...then release it You will hear three quick beeps after you release the button I have at least two NSAs in my network how do I identify which one I want to configure in the NAS Starter Utility screens If you have several NSAs connected to your computer network give each a unique name You may have to disconnect all but one and use the NAS Starter Utility to rename it Then connect another NSA and rena...

Page 331: ...P addresses and communicate See Section 8 4 on page 166 if you need to configure the NSA with a static IP address If you are connecting to the NSA by its IP address make sure you use the correct one If the NSA has a wired Ethernet connection and a wireless connection through an attached USB wireless dongle the NSA has a different IP address for each connection To connect through the wired Ethernet...

Page 332: ...t display properly in Internet Explorer check that scripting of safe ActiveX controls is enabled 1 In Internet Explorer click Tools Internet Options and then the Security tab Figure 188 Internet Options Security 2 Click the Custom Level button 3 Under Script ActiveX controls marked safe for scripting make sure that Enable is selected the default ...

Page 333: ...is 1234 These fields are case sensitive so make sure Caps Lock is not on Turn the NSA off and on If this does not work see Section 1 1 4 on page 19 to reset the device I cannot see the multi language web configurator screens while using Internet Explorer Use Section 19 4 1 on page 332 to enable the scripting of safe ActiveX controls The Web Configurator logs out by itself The web configurator mana...

Page 334: ...olume in which the share resides exists and is not down or degraded If it is down or degraded see Section 19 2 on page 327 Make sure you have the client for Microsoft networks installed and enabled in your network connection s properties In Windows XP or 2000 click Start Settings Control Panel Network Connections Network and Dial up Connections in Windows 2000 NT Local Area Connection Properties C...

Page 335: ... He may need to disconnect existing CIFS connections as new CIFS connection may use previously saved login information that may be different to NSA login Check that the array in which the share resides exists and is not down or degraded If the array is down or degraded see Section 19 2 on page 327 If the user is using DFS links then he can only access the NSA using CIFS and not FTP Check that the ...

Page 336: ...A and transfer files in the same way you transfer files in your local computer 1 On your Windows computer click Start Run or open a web browser 2 Enter nsa followed by the number of your model 320 for example or the Server Name you assigned the NSA This shows you the folders in the NSA 3 Use drag and drop or copy and paste to transfer files over to your NSA Use the COPY SYNC button to transfer fil...

Page 337: ...on your network can play the media files in the published shares No user name and password or other form of security is used The media server is enabled by default with the video photo and music shares published One of the computers in my network cannot use the printer I connected to the NSA You must install the printer driver on each computer that will use the printer Check Section 19 4 on page 3...

Page 338: ...the media server may not display in the list See Section 20 2 on page 346 for the file formats that the media server supports I published a folder with the media server function but the media client does not play some of the files or does not play them properly 1 Files with formats that are not supported on the media server may not display in the list See Section 20 2 on page 346 for the file form...

Page 339: ...tton 4 Then click the NSA s link to reconnect Figure 191 iTunes Reconnected 5 Another way to get the NSA s iTunes server function to scan the published media server folders for files is to go to Applications Media Server and disable and re enable the iTunes server option If you uploaded many files it may take awhile for the NSA to find and list all of them Then try reconnecting your iTunes client ...

Page 340: ...use the other However if you remove the system volume you may lose the download and broadcasting lists With two JBOD volumes the hard disk that was installed first is usually the system volume The channel I added in the Broadcatching screen is active but no files are downloaded to the NSA Check the Download Policy for that channel see Section 9 9 1 on page 196 It may be set to manual download You ...

Page 341: ...wall s public IP address is static or that the firewall uses a Dynamic Domain Name DDNS Web publishing uses TCP protocol and the port number you specify Make sure there is not another service using TCP protocol with the same port number If Firefox access to the share does not work check that you did not set the Web publishing feature to use one of the following ports Firefox blocks these ports by ...

Page 342: ...des the folder containing the file You can upload the file to the watch folder again Make sure the file s format is supported by Flickr or YouTube You can find the supported file extensions in the Folder Watch List 2d If the log message displays not authorized yet check if you can enter the NSA s Configuration screen for the service If you changed the password of your Flickr or YouTube account you...

Page 343: ...t screen to install the S M A R T application 19 17 Backups I cannot make a backup Check that enough space is available on the external disk If there isn t you may need to purge older backups or delete other files on the backup USB disk or NSA see Section 10 11 on page 245 If you are using BackupPlanner Section 10 12 on page 246 You can look at the Backup screen s Last Run Result display If you re...

Page 344: ...Chapter 19 Troubleshooting Media Server User s Guide 344 ...

Page 345: ...tays on green when the hard disk drive is in hibernation Blinking The NSA is saving data to the hard disk drive Red On The NSA detected an error on the hard disk drive like a bad sector for example The NSA automatically tries to recover a bad sector but the LED stays red until the NSA restarts Off The NSA cannot detect a hard disk in the disk bay USB Green On The USB device is connected properly t...

Page 346: ... 3GP VDR MPE DVR MS Xvid M1V M4V MOV MPV MKV FLV MTS Note Not all published file types can be viewed by all client applications 20 3 Supported iTunes Server Content Formats At the time of writing the NSA supports iTunes publishing audio files of the following formats mp3 m4a m4p wav and mp4 COPY SYNC Green On A USB device is connected to the NSA Blinking The NSA is copying or synchronizing files t...

Page 347: ...yright laws and any other applicable laws and will bear the consequences of any infringements thereof ZyXEL bears NO responsibility or liability for your use of the download service feature Make sure all data and programs on the NSA are also stored elsewhere ZyXEL is not responsible for any loss of or damage to any data programs or storage media resulting from the use misuse or disuse of this or a...

Page 348: ...quivalent product of equal or higher value and will be solely at the discretion of ZyXEL This warranty shall not apply if the product has been modified misused tampered with damaged by an act of God or subjected to abnormal working conditions Note Repair or replacement as provided under this warranty is the exclusive remedy of the purchaser This warranty is in lieu of all other warranties express ...

Page 349: ... product please contact your local city office your household waste disposal service or the store where you purchased the product Do NOT obstruct the device ventilation slots as insufficient airflow may harm your device Your product is marked with this symbol which is known as the WEEE mark WEEE stands for Waste Electronics and Electrical Equipment It means that used electrical and electronic prod...

Page 350: ...Appendix A Legal Information Media Server User s Guide 350 ...

Page 351: ...wnload 184 204 preferences 186 protection 206 207 status 183 URL 184 232 FTP 175 177 265 activation 178 anonymous access 178 passive mode transfer 178 media server 176 178 configuration 179 iTunes server 176 203 204 print server 211 configuration 201 name 201 web publishing 176 193 209 activation 193 example 208 port number 210 archive 122 authorization Flickr 266 268 YouTube 271 auto upload Flick...

Page 352: ... tool 168 diagnostic tools 168 discovery 21 disk S M A R T attributes 262 disk replacement 152 displaying user information 292 DLNA 176 203 DNS 165 168 documentation related 2 Domain Name System see DNS domain user troubleshooting 335 troubleshooting share access 335 download period control 187 download service 176 204 activation 181 adding a task 184 191 configuration 181 download period control ...

Page 353: ...118 passive mode transfer 178 FTP Uploadr 274 activation 275 bandwidth limit 278 configuration 276 grace period 278 server entry 275 FTPES 175 FTPES FTP over explicit TLS SSL 118 FTPS 118 265 G global icons 33 45 GMT 28 149 Google Maps 36 GPS 36 grace period 271 273 278 groups 293 adding 294 295 editing 295 membership 291 295 names 295 searching 294 Guide Quick Start 2 H Home icons 33 HTTP port 16...

Page 354: ... navigation panel 46 network 165 diagnostic tools 168 DNS 165 168 HTTP port 168 IP address 165 jumbo frames 166 168 PPPoE 165 173 174 activation 173 TCP IP 166 network connection test 168 notifications download service activation 181 notifications download service 205 O other documentation 2 P P2P download IP filtering 189 190 protection 206 207 re seeding 182 settings 188 torrent files 184 204 he...

Page 355: ...8 schedule power management 308 scheduling download service 187 secure connections 111 server Syslog 223 TFTP 225 server entry FTP Uploadr 275 server name 147 setup COPY SYNC button 202 download service 181 Flickr 270 FTP Uploadr 276 media server 179 P2P download 188 print server 201 YouTube 271 272 share configuration 40 troubleshooting local user access 334 share publishing 179 shares 37 297 acc...

Page 356: ...perature CPU 138 TFTP server 225 thumbprint 116 time 147 lag 142 server 148 zone 28 149 Time Machine 283 TLS 118 175 265 torrent files 184 204 health 192 info hash 193 trackers 193 Transport Layer Security see TLS troubleshooting domain user 335 domain user share access 335 file access 335 folder access 335 forgot password 330 331 LED indicators 327 LAN 328 local user share access 334 login 333 me...

Page 357: ...scanning 158 status 153 154 storage methods 160 duplexing 161 mirroring 161 parity 161 striping 161 W web configurator 29 icons 33 login 31 navigation panel 46 password 32 43 status 45 web publishing 176 193 209 activation 193 example 208 port number 210 troubleshooting 341 web security 111 workgroup name 147 Y YouTube 265 access rights 274 activation 266 authorization 271 configuration 271 272 gr...

Page 358: ...Index Media Server User s Guide 358 ...

Reviews: