Instruction/ maintenance manual of the product NSA-220 ZyXEL Communications
Go to page of 192
www .zyxel.com NSA -220 Network S torage Appliance User ’ s Guide V ersion 1.00 3/2007 Edition 1.
.
About This User's Guide NSA-220 User’s Guide 3 About This User's Guide Intended Audience This manual is intended for people who want to configure the NSA using the web configurator . A basic knowledge of TCP/IP netw orking concepts and topology will be helpful.
Document Conventions NSA-220 User’s Guide 4 Document Conventions W arnings and Notes These are how warnings and notes are shown in this User ’ s Guide.
Document Conventions NSA-220 User’s Guide 5 Icons Used in Figures Figures in this User ’ s Guide may use the follo wing generic icons. The NSA icon is not an exact representation of your device.
Safety Warnings NSA-220 User’s Guide 6 Safety Warnings 1 For your safety , be sure to read and follow all warni ng notices and instructions. • Do NOT use this product near water , for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids.
Safety Warnings NSA-220 User’s Guide 7.
Safety Warnings NSA-220 User’s Guide 8.
Contents Overview NSA-220 User’s Guide 9 Contents Overview Introduction .......................................... ........................................................................ .......... 23 Getting to Know Y our NSA ................. ...
Contents Overview NSA-220 User’s Guide 10.
Table of Contents NSA-220 User’s Guide 11 Table of Contents About This User's Guide ........................................................................... ............................... 3 Document Conventions..............................
Table of Contents NSA-220 User’s Guide 12 2.6.2 Navigation Panel ....................... .......... ...... ............. ................ ............. ................ ....... 40 2.6.3 Main Window ... ............. ................ ................
Table of Contents NSA-220 User’s Guide 13 6.4.3 RAID 1 ................. ................ ............. ................ ............. ................ ............. .......... ...... 67 6.4.4 RAID and Data Protection ......... ................ ....
Table of Contents NSA-220 User’s Guide 14 10.1 Shares Introduction .................... ............. ................ ................ ................ ................ ..... ..... 89 10.1.1 Share Icons ....................... ................ ... .
Table of Contents NSA-220 User’s Guide 15 15.3.1 Reset the NSA .. ......... .... ................ ............. ................ ............. ................ ............... 1 1 4 15.3.2 Enabling Scripting of Safe ActiveX Cont rols .. ............
Table of Contents NSA-220 User’s Guide 16.
List of Figures NSA-220 User’s Guide 17 List of Figures Figure 1 Example of the NSA in a Home Network ....................... ............. ................ ............. ................ 25 Figure 2 NSA Front Panel .................... ............
List of Figure s NSA-220 User’s Guide 18 Figure 39 Delete a V olume W a rn ing Screen ......................... ............. ................ ................. ............ ... .... 62 Figure 40 Create a New Internal V olume .................... ..
List of Figures NSA-220 User’s Guide 19 Figure 82 Red Hat 9.0: Checking TC P/I P Properties .................. ............. ................ ................ ........... 14 2 Figure 83 Pop-up Blocker ...... ... ............. ................ ......
List of Figure s NSA-220 User’s Guide 20.
List of Tables NSA-220 User’s Guide 21 List of Tables T able 1 LEDs ..... ............ ................. ................ ............. ................ ................ ................ .. ..................... ... 27 T able 2 Us er-level Global Labels and Icons .
List of Tables NSA-220 User’s Guide 22 T able 39 Maintenance > Configuration . ................ ................ ................. ................ ................ ....... ....... 101 T able 40 Maintenance > FW Upgrade ......... .............
23 P ART I Introduction Getting to Know Y our NSA (25) W eb Configurator Basics (29) T utorials (43) St atus Screen (45).
24.
NSA-220 User’s Guide 25 C HAPTER 1 Getting to Know Your NSA This chapter covers the main featur es and applications of the NSA. 1.1 NSA Overview The NSA (Network Storage Appliance) provides file sh aring and data backup for your home network. • Use SA T A (Serial Advanced T echnology Attachment) I or 3.
Chapter 1 Getting to Know Your NSA NSA-220 User’s Guide 26 " See the product specific ations appendix for a more detailed list of NSA features and lists of comp atible hard drives and USB devices. Refer to the Quick S tart Guide for hardware connections and how to install and remove hard drives from the disk trays.
Chapter 1 Gettin g to Know Your NSA NSA-220 User’s Guide 27 Figure 3 NSA Rear Panel This table describes the NSA’ s LEDs. T able 1 LEDs LED COLOR STATUS DESCRIPTION POWER Blue On The NSA is turned o n and receiving po wer . Off The NSA is turned off.
Chapter 1 Getting to Know Your NSA NSA-220 User’s Guide 28 1.1.2 COPY Button Use the COPY button on the front panel to copy f iles from a connected USB device to the NSA.
NSA-220 User’s Guide 29 C HAPTER 2 Web Configurator Basics This chapter describes how to access the NSA web configurator and provides an overview of its screens. 2.1 W eb Configurator Overview The web configur ator is an HTML-based manage ment interface that allows easy NSA setup and management via Inte rnet browser .
Chapter 2 W eb Configur ator Basics NSA-220 User’s Guide 30 Figure 4 NDU Main Screen From the NDU main page click an icon under Admin to see the web configurator screen login screen. 2.2.2 Web Browser Access Open your browser and type in the server name of the NSA (“nsa220” is the default).
Chapter 2 Web Configur ator Basics NSA-220 User’s Guide 31 Figure 6 NSA Login Screen Y ou should see a screen asking you to change your pas sword (highly recommended) as shown next. T ype a new password (and retype it to confirm) and click Apply or click Ignor e .
Chapter 2 W eb Configur ator Basics NSA-220 User’s Guide 32 Figure 8 My NSA " The web configurator managem ent session automatically ti mes out if it is left idle for 15 minutes. Simp ly log back into the NSA if this happens to you. The icons and language label at th e top-right of the screen ( ) are visible from most screens.
Chapter 2 Web Configur ator Basics NSA-220 User’s Guide 33 2.5 My NSA Screen Use the My NSA screens to mana ge your shares and access the files in folders to which you have acce ss. A share is a set of user access permissions for a specific folder on a volume (gives someone access to a folder).
Chapter 2 W eb Configur ator Basics NSA-220 User’s Guide 34 2.5.1 My NSA Share Browsing Screen Click My NSA and then click a share to open the followi ng screen. Use the My NSA share browsing screens to see and access share contents. Figure 10 My NSA Share Browsing The following table describes the labels in this screen.
Chapter 2 Web Configur ator Basics NSA-220 User’s Guide 35 Figure 1 1 My NSA Management Overview The following table describes the labels in the this screen. 2.5.3 My NSA Change Share Properties Screen Use the My NSA Change Share Pr operties screen to configure sh are management details.
Chapter 2 W eb Configur ator Basics NSA-220 User’s Guide 36 Figure 12 My NSA Change Share Properties The following table describes the labels in the this screen. T able 6 My NSA Change Share Properties LABEL DESCRIPTION Share Name Configure a name to identify this share.
Chapter 2 Web Configur ator Basics NSA-220 User’s Guide 37 2.5.4 Share and Folder Names The name ca n only contain the followi ng characters: • Alphanumeric (A-z 0-9) and Unicode. The NSA allows FTP access to shares, folders or files with names en coded in the UTF-8 (8-bit UCS/Unicode T ransformation Format) format.
Chapter 2 W eb Configur ator Basics NSA-220 User’s Guide 38 2.5.5 Share Paths A share path is the full path to a folder on a volume that will be shared, for example, /mynsa/ topsecret/ugs/. This is indepe ndent from a “share name” which is the name shown for this share when accessing the share via CIFS or FTP .
Chapter 2 Web Configur ator Basics NSA-220 User’s Guide 39 Figure 13 Password The following table describes the labels in this screen. 2.6 Administration Screens Click Administration in the user -level screens to open the advance d administration screens.
Chapter 2 W eb Configur ator Basics NSA-220 User’s Guide 40 Figure 14 S tatus 2.6.1 Global Administration Icons The icons and language label at the top-right of the screen ( ) are visible from most of the administration screens. The following table describes the ‘global’ icons and labels.
Chapter 2 Web Configur ator Basics NSA-220 User’s Guide 41 Click the St a t u s icon to open the St a t u s screens. Figure 15 Navigation Panel Links The following table describes the navigation panel screens.
Chapter 2 W eb Configur ator Basics NSA-220 User’s Guide 42 2.6.3 Main Window The main window () shows the screen you select in the na viga tion panel. It is disc ussed in the rest of this document. Right after you log in, the St a t u s screen is displayed.
NSA-220 User’s Guide 43 C HAPTER 3 Tutorials This chapter provides tutorials that show how to use the NSA. 3.1 T utorials Introduction The following tutorials cover how yo u use the NS A for file sharing.
Chapter 3 Tutorials NSA-220 User’s Guide 44 Figure 17 Users 3 Configure the screen as follows and write down the username and password to give to Jimmy . If the username and password are th e same as Jimmy’ s W indows login, Jimmy will not need to enter a username and passw ord when he logs int o his share from his computer .
Chapter 3 Tutorials NSA-220 User’s Guide 45 1 In the NSA’ s administration web configurator screens, click Shar es > Create a New Shar e . Figure 20 Shares 2 Specify a name for the share and select wh ich volume it should be on. Then click Browse .
Chapter 3 Tutorials NSA-220 User’s Guide 46 Figure 23 Shares > Create > Browse > New Folder Example 5 Configure the screen as follows and click Apply . Figure 24 Shares > Create Example Now that Bob has created Jimmy’ s share, he can go through the steps again to create another share for Kevin.
Chapter 3 Tutorials NSA-220 User’s Guide 47 2 Select the network drive that you want to map NSA to from the Dr ive list box. This example uses I . Then browse to and select the share on the NSA. Click Finish . Figure 26 Map Network Drive 3 Enter the username and password for Jimmy’ s account and click OK .
Chapter 3 Tutorials NSA-220 User’s Guide 48 3.5 Accessing a Share Using FTP Y ou can also use FTP to access th e NSA. Suppose Jimmy is temporarily using a different computer and wants to access his share without mapping it to the computer . This is how he would do it.
Chapter 3 Tutorials NSA-220 User’s Guide 49 Figure 31 FTP Example: Logged In 3.6 Accessing a Share Through the W eb Configurator Y ou can browse and access files through the web configurator . 1 Log into the NSA web configurator (see Section 2.3 on page 30 ) using your username and password.
Chapter 3 Tutorials NSA-220 User’s Guide 50 Figure 33 My NSA User Login 3 Click a folder ’ s file name to browse the fold er . Y ou can open files or copy them to your computer . However at the time of writing you cannot use the web conf igurator to upload files to the NSA (use CIFS or FTP to upload files, see Section 3.
NSA-220 User’s Guide 51 C HAPTER 4 Status Screen This chapter introduces the NSA St a t u s screen. 4.1 St atus Scree n The St a t u s screen is the first main web configurator screen you see after you log in to the administrator screens. T o view the status screens, click St a t u s on the top-left of the navigation panel.
Chapter 4 Status Screen NSA-220 User’s Guide 52 The following table describes the labels in this screen. Ta b l e 1 1 Status LABEL DESCRIPTION S tatus Click Status to refresh the status screen statistics. System Information Server Name This displays the name which helps you find the NSA on the network.
Chapter 4 Status Screen NSA-220 User’s Guide 53 4.1.1 Session Example (Windows) Open windows explorer and type two back sl ashes followed by the NSA name or IP address. Initially you can only read and write to the Public , Vi d e o , Music , and Photo folders until you create other shares on the NSA.
Chapter 4 Status Screen NSA-220 User’s Guide 54.
55 P ART II S t atus, System, S torage, and Network System Setting Screens (57) Storage Screens (61) Network Screen (73).
56.
NSA-220 User’s Guide 57 C HAPTER 5 System Setting Screens This chapter discusses the system setting screens. 5.1 System Setting Screens This section gives an overview of the various features included in th e system setting screens. Use the system setting screens to: • Specify the NSA’ s W indows/CIFS server name and workgroup name.
Chapter 5 S ystem Setting Screens NSA-220 User’s Guide 58 Figure 36 System Setting > Server Name The following table describes the labels in these screens. 5.3 Date/T ime Use this screen to select a time zone and a time server from which your NSA can get the time and date.
Chapter 5 System Sett ing Screens NSA-220 User’s Guide 59 5.3.2 Date/Ti me Screen Click the System Setting link in the navigation panel and then click the Date/T ime link to access the System Setting > Date/Time screen. Figure 37 System Setting > Date/T ime The following table describes the labels in this screen.
Chapter 5 S ystem Setting Screens NSA-220 User’s Guide 60 T ime Server Address Select a time se rver from the drop-down list box or select Spec if y m y own time server and enter th e time server you wish to use in the field below . Check with your ISP/network admi nistrator if you ar e unsure of this information.
NSA-220 User’s Guide 61 C HAPTER 6 Storage Screens This chapter covers storage system s, volumes and disks on the NSA. 6.1 St orage Introduction Use the S torage screens to create and manage NSA volu mes (internal and external) and disks. • See Section 6.
Chapter 6 Stora ge Screens NSA-220 User’s Guide 62 The following table describes the labels in this screen. Y ou see a warning sc reen before you delete a volume. Figure 39 Delete a V olume W arning Screen 6.3 V olumes and RAID A volume is a storage area on a disk or disks.
Chapter 6 Storage Scre ens NSA-220 User’s Guide 63 " Back up your data before deleti ng or re-creating a volume! For example if you original ly have one disk co nfigured at JBOD, and you then i.
Chapter 6 Stora ge Screens NSA-220 User’s Guide 64 • Choose RAID 0 if performance matters mo re than data se curity . RAID 0 has the fastest read and write performance but if one disk fails you lose all your data on the volume. It has fast performance as it can re ad and writ e to two disks simult aneously .
Chapter 6 Storage Scre ens NSA-220 User’s Guide 65 " Y ou should not restart the NSA while the NSA is resych ronizing a volume as this will cause the synch ronization to begin again after the NSA fully reboots. " Y ou can access data on a RAID volume whil e it is resychronizi ng, but it is not recommended.
Chapter 6 Stora ge Screens NSA-220 User’s Guide 66 lost. Parity protection is used with striping, and the “n” pieces of data are typically the blocks or bytes distributed across the drives in the array . The parity information can either be stored on a separate, dedicated drive, or be mixed with the data across all the drives in the array .
Chapter 6 Storage Scre ens NSA-220 User’s Guide 67 RAID 0 capacity is the size of the smallest disk multiplied by the num ber of disks you have configured at RAID 0 on the NSA.
Chapter 6 Stora ge Screens NSA-220 User’s Guide 68 • Keep another copy of important fil es (preferably in another location). 6.5 Disks Here is information on the NSA internal disks and external disks attached to the USB port(s). 6.5.1 External Disks Y ou may connect USB storage devices that supp ort the following file systems to the NSA.
Chapter 6 Storage Scre ens NSA-220 User’s Guide 69 If you do not want to keep the data on a disk that you will remove, it is recommended that you delete the volume be fore you remove the disk.
Chapter 6 Stora ge Screens NSA-220 User’s Guide 70 6.7 Editing an Internal V olume Click an internal volume’ s Edit icon in the Vo l u m e sc reen as shown in Figure 38 on page 61 to change the internal disk drive volume’ s name. Figure 41 Edit an Internal V olume The following table describes the labels in this screen.
Chapter 6 Storage Scre ens NSA-220 User’s Guide 71 " Creating a volume formats the drive. All data on the di sk will be lost. Figure 42 Create a New External V olume The following table describes the labels in this screen.
Chapter 6 Stora ge Screens NSA-220 User’s Guide 72 Figure 43 Edit an External V olume The following table describes the labels in this screen. T able 22 Edit an External Volume LABEL DESCRIPTION V olume Name T yp e a volume name from 1 to 32 single-byte (no Chinese characters allowed for example) ASCII characte rs.
NSA-220 User’s Guide 73 C HAPTER 7 Network Screen This chapter discusses the network configuration screen. 7.1 Network Settings Use the network configuration screen to assign the NSA a dynamic or static IP address and DNS information. 7.1.1 IP Address The NSA needs an IP address to communicate with the media servers on your network.
Chapter 7 Network Scr een NSA-220 User’s Guide 74 Figure 44 Network > Netw ork Config The following table describes the labels in this screen. T able 23 Network Config > Network Config LABEL DESCRIPTION IP Address Obtain an IP address automatically Select this option to have the NSA get IP address information automatica lly .
Chapter 7 Network Scree n NSA-220 User’s Guide 75 Apply Click Apply to save your TCP/IP configurations. After you click Apply , the NSA restarts. W ait until you see the Login screen or until the NSA fully boo ts and then use the NDU to rediscover it.
Chapter 7 Network Scr een NSA-220 User’s Guide 76.
NSA-220 User’s Guide 77 C HAPTER 8 Application Screens This chapter discusses the application screens. 8.1 Application Screens Use the application screens to: • Enable FTP file transfer to/from the NSA, set the number of FTP co nnections allowed and an FTP idle timeout.
Chapter 8 Application Screens NSA-220 User’s Guide 78 Figure 45 Applications > FTP The following table describes the labels in this screen. 8.4 Media Server The NSA can functio n as a media server where y ou store multimedia files (videos, music, and photos).
Chapter 8 Applica tion Screens NSA-220 User’s Guide 79 8.5 Media Server Screen Click Applications > Media S e rver to open the followi ng screen. Use this screen to turn the media server of f an d on and see which shar es the NSA will publish (share with media clients).
Chapter 8 Application Screens NSA-220 User’s Guide 80.
81 P ART III User Account s and Shares Users (83) Shares (89).
82.
NSA-220 User’s Guide 83 C HAPTER 9 Users This chapter introduces the Users screens of the NSA. 9.1 User Account s Introduction Use the Users screens to crea te and manage administrator and user accounts. Administrators can: • Configure and manage the NSA.
Chapter 9 Users NSA-220 User’s Guide 84 Figure 47 Users The following table describes the labels in this screen. 9.2.1 User Icons The following table describes the user icons. T able 26 Users LABEL DESCRIPTION Accounts List Create a New Account Click this button to open a screen where you can configure a new user account.
Chapter 9 Users NSA-220 User’s Guide 85 9.3 Adding or Editing a User Account Click the Cr eate a New Account button in t h e Users screen to crea te a new NSA user account with NSA access password. Click the Change Account Properties button in the screen shown previously to edit an existing account.
Chapter 9 Users NSA-220 User’s Guide 86 • Spaces • _ [underscores] •. [ p e r i o d s ] • - [dashes] Other limitations on usernames are: • All leading and trailing spa ces are removed automatically . • Multiple spaces within names are converted to a single space.
Chapter 9 Users NSA-220 User’s Guide 87 The following table describes the labels in this screen. 9.5 Delete Account Screen In the Users screen, select an account and click Delete Account to open this screen. Use this screen to remove a user accou nt.
Chapter 9 Users NSA-220 User’s Guide 88.
NSA-220 User’s Guide 89 C HAPTER 10 Shares This chapter introduces the Shares screens of the NSA. 10.1 Shares Introduction Use the Shares screens to create and manage shares. A share is a set of user access permissions mapped to a spec ific folder on a vo lume.
Chapter 10 Shares NSA-220 User’s Guide 90 Figure 51 Shares The following table describes the labels in this screen. See T able 31 on page 89 for icon details. 10.2 Adding a New Share Click the Create a New Shar e button in the Shares screen to open the following screen.
Chapter 10 Shares NSA-220 User’s Guide 91 Figure 52 Shares > Add Share The following table describes the labels in this screen. T able 33 Shares > Add Share LABEL DESCRIPTION Share Name T ype a share name from 1 to 255 single-byte (no Chinese characters allowed for example) ASCII characte rs.
Chapter 10 Shares NSA-220 User’s Guide 92 10.2.1 Public and ANON YMOUS Share Access Right s If you make a share public, u sers do not need to log in. W ith ANONYMOUS FTP , you must enter either 'anonymo us' or 'ftp' as the username.
Chapter 10 Shares NSA-220 User’s Guide 93 The following table describes the labels in this screen. T able 34 Share Path Browse LABEL DESCRIPTION Folder Name This section lists the volume’ s existing folders. Select the one for which you want to create a share.
Chapter 10 Shares NSA-220 User’s Guide 94.
95 P ART IV Protection, Media Client, Maintenance, & T roubleshooting Maintenance Screens (97) Protecting Y our Data (105) Media Client Software (107) T roubleshooting (1 1 1).
96.
NSA-220 User’s Guide 97 C HAPTER 11 Maintenance Screens This chapter discusses the Maintenance screens. 1 1.1 Maintenance Overview Use the maintenance screens to: • V iew logs • Manage the NSA configuration file • Upload new firmware • Restart or shut down yo ur NSA 1 1.
Chapter 11 Maintena nce Screens NSA-220 User’s Guide 98 1 1.3 Log Classes The following table shows information on log classes. 1 1.4 Log Severity Levels The following table shows informa tion on log severity levels. Levels range from 0 to 6 with 0 being the most severe level log and 6 being an informational log only .
Chapter 11 Maintena nce Screens NSA-220 User’s Guide 99 1 1.5 Log Messages Here are some example log messages. T able 38 Log Messages CLASS SEVERITY MESSAGE Network NOTICE %s is active because of changing Port Group. Enable DHCP client. Network NOTICE %s is in active because of changing Port Grou p.
Chapter 11 Maintena nce Screens NSA-220 User’s Guide 100 1 1.6 Configuration Click Maintenance > Configuration to open the following screen. Use the Configuration screen to back up or restore the NSA configuration settings and enable or disable the hardware reset button.
Chapter 11 Maintena nce Screens NSA-220 User’s Guide 101 Figure 55 Maintenance > Config uration The following table describes the labels in this screen. 1 1.7 Firmware Upgrade Click the Maintenance link in the Navigation pa nel and t h en click the FW Upgrade link or the FW Upgrade tab to access the Mainten ance > FW Upgrade screen .
Chapter 11 Maintena nce Screens NSA-220 User’s Guide 102 The following table describes the labels in this screen. 1 1.8 Shut down Click the Maintenance link in the Navigation pa nel and t h en click the Shutdown link or the Shutdown tab to access the Maintenance > Shutdown screen.
Chapter 11 Maintena nce Screens NSA-220 User’s Guide 103 When you cli ck the Shutdown button a pop-up screen will ap pear asking you to confirm. Click OK to continue or Cancel to quit the shutdown.
Chapter 11 Maintena nce Screens NSA-220 User’s Guide 104.
NSA-220 User’s Guide 105 C HAPTER 12 Protecting Your Data This chapter compares the different ways of pr otecting data on the NSA and explains how to use backup man agement software inc luded on the CD. 12.1 Protection Methods There are a variety of wa ys to protect your data on the NSA.
Chapter 12 Protec ting Your Data NSA-220 User’s Guide 106 " Configuration File Backup and Restorati on does not affect da t a (your files and folders), volumes on the NSA. 12.1.2 Memeo Autobackup Use the Memeo Au tobackup software (included on th e CD) on your com puter to sche dule and manage backups.
NSA-220 User’s Guide 107 C HAPTER 13 Media Client Software This chapter introduces the media cl ient software incl uded on the CD. 13.1 Media Client Introduction The NSA can function as a server to allo w DLNA (Digital Living Network Alliance) compliant media clients to play files.
Chapter 13 Media Client Software NSA-220 User’s Guide 108.
NSA-220 User’s Guide 109 C HAPTER 14 Memeo Autobackup Software This chapter introduces the Memeo Autobackup software included on the CD. 14.1 Memeo Autobackup Introduction Use the Memeo Autobackup softwa re included on the CD to au tomatically back up selected files from your computer to the NSA whenever you modify the files.
Chapter 14 M emeo Auto backup Softw are NSA-220 User’s Guide 11 0.
NSA-220 User’s Guide 111 C HAPTER 15 Troubleshooting 15.1 T roubleshooting Overview This chapter offers some sugg estions to solve problems you might encounter .
Chapter 15 Trou bleshooting NSA-220 User’s Guide 11 2 Orange means that the NSA detected an error on the hard drive (like a bad sector for example). The NSA automatically tries to recover a bad sector , but the LED stays orange until the NSA restarts.
Chapter 15 Trou bleshooting NSA-220 User’s Guide 11 3 • Make sure the Ethernet cable is connected pr operly to the NSA and connected to another (Ethernet) device. Make sure the other device is turned on. If it’ s connected directly to a computer , make sure that the computer network card is working (p ing 127.
Chapter 15 Trou bleshooting NSA-220 User’s Guide 11 4 • Make sure your computer ’ s IP address is in the s ame subnet as the NSA’ s IP address. Y ou can use the NDU to find the NSA’ s IP address. See Appendix B on page 1 29 for how to change your computer ’ s IP address.
Chapter 15 Trou bleshooting NSA-220 User’s Guide 11 5 • The computer running the NDU can only discover NSAs in the same subnet. NSAs connected to the same switch or router as your NDU computer are usually in the same subnet unless the router is doing subne tting or the switch is implementing VLAN.
Chapter 15 Trou bleshooting NSA-220 User’s Guide 11 6 Figure 61 Security Settings - Script S afe ActiveX Controls V I can see the login screen, but I cannot log in to the NSA. • Make sure you have entered the use rname and password correctly . The default username is admin , and the default password is 1234 .
Chapter 15 Trou bleshooting NSA-220 User’s Guide 11 7 • Check that the NSA is turned on and connected to the network. T ry to ping the NSA or use the NDU to discover it. • Check that you entered your login name and password correctly . • Check that the share exists and check its access settings.
Chapter 15 Trou bleshooting NSA-220 User’s Guide 11 8 15.6 Media Server Functions V I set the media server function to publish a folder , but some of the files in the folder do not display in t he list on the media client. Files with formats that are not supported on th e media server may not display in the list.
11 9 P ART V Appendices and Index Product Specification s (121) Setting up Y our Computer ’ s IP Address (129) Open Source Licences (151) Legal Information (181) Customer Support (183) Index (187).
120.
NSA-220 User’s Guide 121 A PPENDIX A Product S pecifications See also Chapter 1 on pa ge 25 for a general overview of the key features. Feature T ables Physical Features These are the main external physical features. Firmware Features These are some of the main firmware features of the NSA.
Appendix A Product Specifications NSA-220 User’s Guide 122 S pecification T ables The NSA hardwa re specif ications are shown in the following table. RAID File S torage Use RAID 0 if you want pure write speed and/or maximum capacity for your drives, and/or you have ot her means of protecting your data.
Appendix A Product Specifications NSA-220 User’s Guide 123 The NSA firmware specif ications are shown in the following table Maximum S t orage Capacity 1.5 TB (with two 750 GB hard drives installed) is the largest storage capacity that has been tested as of this writing.
Appendix A Product Specifications NSA-220 User’s Guide 124 The following list, which is not exhaustive, illustrates the standards and recommendations supported in the NSA.
Appendix A Product Specifications NSA-220 User’s Guide 125 RFC 1001 (STD-19) - Protocol standard fo r NetBIOS service on a TCP/UD P transport: Concepts and methods RFC 1002 (STD-19) - Protocol stand.
Appendix A Product Specifications NSA-220 User’s Guide 126 Supported Media Server Content Format s The following describes the deta ils about the files that the NSA media server can publish. * Files may be converted to JPEG to allow play b ack on client applicatio ns that do not support the original file formats.
Appendix A Product Specifications NSA-220 User’s Guide 127 Comp atible Hard Disks The following hard disks have been tested an d are known to be compatible with the NSA. T able 49 Power Consumption in Watts (W) POWER SOURCE SYSTEM BOOT UP SYSTEM READ/WRITE SYSTEM IDLE 240V/50Hz 58.
Appendix A Product Specifications NSA-220 User’s Guide 128.
NSA-220 User’s Guide 129 A PPENDIX B Setting up Y our Computer ’ s IP Address All computers must have a 10M or 100M Et hernet adapter card and TCP/IP installed.
Appendix B Setting up Your Computer’s IP Address NSA-220 User’s Guide 130 Figure 62 WIndows 95/98/Me: Network: Co nfiguration Inst alling Components The Network window Configuration tab displays a list of installed components. Y ou need a network adapter , the TCP/IP protocol and Client for Microsof t Networks.
Appendix B Setting up Your Computer’s IP Address NSA-220 User’s Guide 131 Configuring 1 In the Network window Configuration tab, select your network adapter's TCP/IP entry and click Properties 2 Click the IP Address tab. • If your IP address is dynamic, select Obtain an IP address automatically .
Appendix B Setting up Your Computer’s IP Address NSA-220 User’s Guide 132 Figure 64 Windows 95/98/Me: TCP/IP Properties: DNS Configuration 4 Click the Gateway tab. • If you do not know you r gateway’ s IP addr ess, remove previously installed gateways.
Appendix B Setting up Your Computer’s IP Address NSA-220 User’s Guide 133 Figure 65 Windows XP : S tart Menu 2 In the Control Panel , double-click Network Connections ( Network and Dial-up Connections in W indow s 2000/NT). Figure 66 Windows XP: Control Panel 3 Right-click Local Area Connection and then click Pr operties .
Appendix B Setting up Your Computer’s IP Address NSA-220 User’s Guide 134 Figure 67 Windows XP: Control Panel: Network Connections: Properties 4 Select Internet Protocol (TCP/IP) (under the Genera l tab in W in XP) and then click Properties .
Appendix B Setting up Your Computer’s IP Address NSA-220 User’s Guide 135 Figure 69 Windows XP: Internet Protocol (TCP/IP) Prope rties 6 If you do not know your gateway's IP ad dress, remove any previously installed gateways in the IP Settings tab and click OK .
Appendix B Setting up Your Computer’s IP Address NSA-220 User’s Guide 136 Figure 70 Windows XP : Advanced TCP/ IP Properties 7 In the Internet Protocol TCP/IP Pr operties window (the General tab in W indow s XP): • Click Obtain DNS server address automatically if yo u do not know your DNS server IP address(es).
Appendix B Setting up Your Computer’s IP Address NSA-220 User’s Guide 137 Figure 71 Windows XP: Internet Protocol (TCP/IP) Prope rties 8 Click OK to close the Internet Protocol (TCP/IP) Properties window . 9 Click Close ( OK in W ind ows 2000/NT) to close the Local Area Connecti o n Properties window .
Appendix B Setting up Your Computer’s IP Address NSA-220 User’s Guide 138 Figure 72 Macintosh OS X: Apple Menu 2 Click Network i n the icon bar . • Select Automatic from the Location list. • Select Built-in Ethernet from the Show list. • Click the TCP/IP tab.
Appendix B Setting up Your Computer’s IP Address NSA-220 User’s Guide 139 V erifying Settings Check your TCP/IP properties in the Network window . Linux This section shows you how to configure your computer’ s TCP/IP settings in Red Hat Linux 9.
Appendix B Setting up Your Computer’s IP Address NSA-220 User’s Guide 140 Figure 75 Red Hat 9.0: KDE: Ethernet Device: General • If you have a dyna mic IP address, click Automatically obtain IP address settings with and select dhcp from the drop down list.
Appendix B Setting up Your Computer’s IP Address NSA-220 User’s Guide 141 Figure 77 Red Hat 9.0: KDE: Networ k Configuration: Activate 7 After the network card restart proc ess is complete, make sure the St a t u s is Active in the Network Configuration screen.
Appendix B Setting up Your Computer’s IP Address NSA-220 User’s Guide 142 Figure 80 Red Hat 9.0: DNS Settings in resolv .conf 3 After you edit and save the configuration files, you must restar t the network card. Enter ./network restart in the /etc/rc.
NSA-220 User’s Guide 143 A PPENDIX C Pop-up Windows In order to use the web configurato r you may need to allow: • W eb browser pop-u p windows from your device.
Appendix C Pop-up Windows NSA-220 User’s Guide 144 Figure 84 Internet Options: Privacy 3 Click Apply to save this setting. Enable pop-up Blockers with Exceptions Alternatively , if you only want to allow pop-up windo ws from your device, see the following steps.
Appendix C Pop -up Windows NSA-220 User’s Guide 145 Figure 85 Internet Options: Privacy 3 T ype the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. 4 Click Add to move the IP address to the list of Allowed sites .
Appendix C Pop-up Windows NSA-220 User’s Guide 146 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScript s If pages of the web configura tor do not display properly in Internet Explorer , ch eck that JavaScripts are allowed.
Appendix C Pop -up Windows NSA-220 User’s Guide 147 Figure 88 Security Setting s - Java Scrip ting Java Permissions 1 From Internet Explorer , click To o l s , In ternet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM .
Appendix C Pop-up Windows NSA-220 User’s Guide 148 JA V A (Sun) 1 From Internet Explorer , click To o l s , In ternet Options and then the Adva nced tab. 2 Make sure that Use Java 2 for <applet> under Java (Sun) is sele cted. 3 Click OK to clos e the window .
Appendix C Pop -up Windows NSA-220 User’s Guide 149 Select the check boxes as shown in the following screen. Figure 92 Mozilla Firefox Content Security.
Appendix C Pop-up Windows NSA-220 User’s Guide 150.
NSA-220 User’s Guide 151 A PPENDIX D Open Source Licences Notice Information herein is subject to change withou t notice. Companies, name s, and data used in examples herein are fictitious unless otherwise noted.
Appendix D Open Source Licences NSA-220 User’s Guide 152 “Derivative W orks” shall mean any work, whether in Source or Object form, that is based on (or derived from) the W ork and for which the edit orial revisions, annotatio ns, elaborations, or other modifications represent, as a whole, an original work of authorship .
Appendix D Open So urce Licences NSA-220 User’s Guide 153 distributed as part of the Derivative W orks; within the Source form or documentation, if provided along with the Derivative W orks; or , within a display genera ted by the Derivative W orks, if and wherever such third-party no tices n ormally appear .
Appendix D Open Source Licences NSA-220 User’s Guide 154 Redistribution and use in source and binary fo rms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source co de must retain the above copyright notice, this li st of conditions and the following disclaimer .
Appendix D Open So urce Licences NSA-220 User’s Guide 155 The licenses for most software ar e de signed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your free dom to share and change free software--to make su re the software is free for all its users.
Appendix D Open Source Licences NSA-220 User’s Guide 156 W e call this license the “Lesser” General Public License because it does Less to protect the user's freedom than the ordinary General Pu blic License. It also provides other free software developers Less of an advant age over competing non-free programs.
Appendix D Open So urce Licences NSA-220 User’s Guide 157 1. Y ou may copy and distribute verbatim copies of the Library's comple te source code as you receive it, in any medium, provided that .
Appendix D Open Source Licences NSA-220 User’s Guide 158 compelled to copy the source along with the object code. 5. A program that contains no derivative of any portion of the Library , but is designed to work with the Library by being compiled or linked with it, is called a “work that uses the Library”.
Appendix D Open So urce Licences NSA-220 User’s Guide 159 required form of the “work that uses the Librar y” must include any data and utility programs needed for reproducing the executable from it.
Appendix D Open Source Licences NSA-220 User’s Guide 160 contest validity of any such claims; this sec tion has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices.
Appendix D Open So urce Licences NSA-220 User’s Guide 161 END OF TERMS AND CONDITIONS. This Product includes apcid, apcupsd, auto fs, device-mapper , evms, exim. Lm_sensors, mdadm, pam_mount, raid tools, samba, sg_utils, smartmontool s, vsftpd, xfsprogs and Linux kernel software under GPL license.
Appendix D Open Source Licences NSA-220 User’s Guide 162 0. This License ap plies to any program or othe r work which c ontains a notice placed by the copyright holder saying it may be distributed under the terms of this Ge neral Public License.
Appendix D Open So urce Licences NSA-220 User’s Guide 163 3. Y ou may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Se.
Appendix D Open Source Licences NSA-220 User’s Guide 164 directly or indirectly through you, then the on ly way you could satisfy both it and this License would be to refrain entirely from di stribution of the Program.
Appendix D Open So urce Licences NSA-220 User’s Guide 165 INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DA T A OR DA T A BEING RENDERED INACCURA TE OR LOSSES SUST AINED BY YOU O.
Appendix D Open Source Licences NSA-220 User’s Guide 166 Open SSL License LICENSE ISSUES =============== The OpenSSL toolkit stays unde r a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit.
Appendix D Open So urce Licences NSA-220 User’s Guide 167 Original SSLeay License -------------------------------- Copyright (C) 1995-1998 Eric Y oung (e ay@cryptsoft.com) A ll ri ghts reserved. This package is an SSL implementation written by Eric Y oung (eay@cryptsoft.
Appendix D Open Source Licences NSA-220 User’s Guide 168 This Product include mod _ ssl software under BSD license BSD Copyright (c) [dates as appropriate to package] The Regents of the University of California.
Appendix D Open So urce Licences NSA-220 User’s Guide 169 5. The PHP Group may publish revised and/or new versions of the license from time to time. Each version will be given a distinguishing version number .
Appendix D Open Source Licences NSA-220 User’s Guide 170 1.2. “Contributor V ersion” means the combina tion of the Original Code, prior Modifications used by a Contributor , and th e Modifications made by that particular Contributor .
Appendix D Open So urce Licences NSA-220 User’s Guide 171 The Initial Developer hereby grants Y ou a wo rld-wide, royalty-free, non-exclusive license, subject to third party intellectual property cl.
Appendix D Open Source Licences NSA-220 User’s Guide 172 Any Modification which Y ou create or to which Y ou contribute must be made available in Source Code form under the terms of this Licen se ei.
Appendix D Open So urce Licences NSA-220 User’s Guide 173 Contributor . Y ou must make it absolutely clear than any such warranty , support, indemnity or liability obligation is of fered by Y ou alo.
Appendix D Open Source Licences NSA-220 User’s Guide 174 Once Covered Code has been published under a particu lar version of the License, Y ou may always continue to use it under the terms of that version. Y ou may also choose to use such Covered Code under the terms of any sub sequent version of the License published by Netscape.
Appendix D Open So urce Licences NSA-220 User’s Guide 175 any software, hardware, or device , other than such Participant's Contributor V ersion, directly or indirectly infringes any patent, then any ri ghts granted to Y ou by such Participant under Sections 2.
Appendix D Open Source Licences NSA-220 User’s Guide 176 As between Initial Developer and the Contri butors, each party is responsible for claims and damages arising, directly or indirectly , out of.
Appendix D Open So urce Licences NSA-220 User’s Guide 177 The above copy right notice and this permission not ice shall be included in all copies or substantial portions of the Software.
Appendix D Open Source Licences NSA-220 User’s Guide 178 4.Restrictions Y ou may not publish, display , disclose, sell, re nt, lease, modify , store, loan, distribute, or create derivative works of the Software, or any part thereof.
Appendix D Open So urce Licences NSA-220 User’s Guide 179 DOCUMENT A TION OR OTHER WISE SHALL BE EQUAL TO THE PURCHASE PRICE, BUT SHALL IN NO EVENT EXCEED $1,000. BECAUSE SOME ST A TES/COUNTRIES DO NOT ALLOW THE EXCLUSION OR LIMIT A TION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENT AL DAMAGES, THE ABOVE LIMIT A TION MA Y NOT APPL Y TO YOU.
Appendix D Open Source Licences NSA-220 User’s Guide 180.
NSA-220 User’s Guide 181 A PPENDIX E Legal Information Copyright Copyright © 2007 by ZyXEL Communications Corporation. The contents of this publication may not be reprod uced in any part or as a wh.
Appendix E Legal In formation NSA-220 User’s Guide 182 Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Vie w ing Certifications 1 Go to http://www .zyxel.com . 2 Select your product on the ZyXEL home pag e to go to that pro duct's page.
NSA-220 User’s Guide 183 A PPENDIX F Customer Support Please have the following information r eady when you contact customer support. Required Information • Product model and serial number . • W arranty Information. • Date that you received your de vice.
Appendix F Custom er Support NSA-220 User’s Guide 184 Denmark • Support E-mail: support@zyxel.dk • Sales E-mail: sales@zyxel.dk • T elephone: +45-39-55-07-00 • Fax: +45-39-55-07-07 • W eb Site: www .zyxel.dk • Re g u l ar M ai l : ZyXEL Communications A/ S, Columbusvej, 2860 Soebo rg, Denmark Finland • Support E-mail: support@zyxel.
Appendix F Customer Support NSA-220 User’s Guide 185 • T elephone: +7-3272-590-698 • Fax: +7-327 2-590-689 • W eb Site: www .zyxel.kz • Re g u l a r M a i l: ZyXEL Kazakhstan, 43, Dostyk ave.,Office 414, Dost yk Business Centre, 050010, Almaty , Republic of Kazakhstan North America • Support E-mail: support@zyxel.
Appendix F Custom er Support NSA-220 User’s Guide 186 • W eb Site: www .zyxel.es • Re g ul a r Ma i l: ZyXEL Communications, Art e , 21 5ª planta, 28033 Madrid, Spain Sweden • Support E-mail: support@zyxel.se • Sales E-mail: sales@zyxel.se • T elephone: +46-31-744-7700 • Fax: +46-31-744-7701 • W eb Site: www .
Index NSA-220 User’s Guide 187 Index A about icon 40 accessing share contents 34 accessing the web configu rator 29 administration screens 32 , 39 anonymous access rights 92 ANONYMOUS FTP 92 apac he.
Index NSA-220 User’s Guide 188 FCC interf erence statemen t 181 file path 35 , 36 file storage system 123 file system errors 42 finding external storag e devices 42 finding the NSA 52 firmware speci.
Index NSA-220 User’s Guide 189 to screens 40 locate icon icons locate 42 log 97 classes 98 screen 97 severity 98 logging/ monitoring 124 login username 30 logout icon 32 , 40 M MAC address 52 Manage.
Index NSA-220 User’s Guide 190 return material authorization (RMA) 182 rights 181 RMA 182 S safety warnings 6 SA T A 25 SA T A 3.0 Gbit/s 25 SA T A I 25 scan disk icon 42 screen hyperlinks 40 screen.
Index NSA-220 User’s Guide 191 down 42 , 64 healthy 42 , 64 inactive 64 name restrictions 37 OK 64 resync 64 status 64 volume icon 42 volume name 52 volume status 52 W warranty 182 period 182 web br.
Index NSA-220 User’s Guide 192.
An important point after buying a device ZyXEL Communications NSA-220 (or even before the purchase) is to read its user manual. We should do this for several simple reasons:
If you have not bought ZyXEL Communications NSA-220 yet, this is a good time to familiarize yourself with the basic data on the product. First of all view first pages of the manual, you can find above. You should find there the most important technical data ZyXEL Communications NSA-220 - thus you can check whether the hardware meets your expectations. When delving into next pages of the user manual, ZyXEL Communications NSA-220 you will learn all the available features of the product, as well as information on its operation. The information that you get ZyXEL Communications NSA-220 will certainly help you make a decision on the purchase.
If you already are a holder of ZyXEL Communications NSA-220, but have not read the manual yet, you should do it for the reasons described above. You will learn then if you properly used the available features, and whether you have not made any mistakes, which can shorten the lifetime ZyXEL Communications NSA-220.
However, one of the most important roles played by the user manual is to help in solving problems with ZyXEL Communications NSA-220. Almost always you will find there Troubleshooting, which are the most frequently occurring failures and malfunctions of the device ZyXEL Communications NSA-220 along with tips on how to solve them. Even if you fail to solve the problem, the manual will show you a further procedure – contact to the customer service center or the nearest service center