ZYXEL NSA221 - NAS Server

NSA221 - NAS Server ZYXEL - Free user manual and instructions

Find the device manual for free NSA221 ZYXEL in PDF.

📄 579 pages English EN Download 💬 AI Question
Notice ZYXEL NSA221 - page 3
View the manual : Français FR English EN
Pick your language and provide your email: we'll send you a specifically translated version.

User questions about NSA221 ZYXEL

0 question about this device. Answer the ones you know or ask your own.

Ask a new question about this device

The email remains private: it is only used to notify you if someone responds to your question.

No questions yet. Be the first to ask one.

Download the instructions for your NAS Server in PDF format for free! Find your manual NSA221 - ZYXEL and take your electronic device back in hand. On this page are published all the documents necessary for the use of your device. NSA221 by ZYXEL.

USER MANUAL NSA221 ZYXEL

natural_image Black ZyXEL server with visible ports and power button (no readable text or symbols beyond branding)

ZyXEL

About This User's Guide

Intended Audience

This manual is intended for people who want to configure the NSA using the Web Configurator.

Tips for Reading User's Guides On-Screen

When reading a ZyXEL User's Guide On-Screen, keep the following in mind:

  • If you don't already have the latest version of Adobe Reader, you can download it from http://www.adobe.com.
  • Use the PDF's bookmarks to quickly navigate to the areas that interest you. Adobe Reader's bookmarks pane opens by default in all ZyXEL User's Guide PDFs.
  • If you know the page number or know vaguely which page-range you want to view, you can enter a number in the toolbar in Reader, then press [ENTER] to jump directly to that page.
  • Type [CTRL]+[F] to open the Adobe Reader search utility and enter a word or phrase. This can help you quickly pinpoint the information you require. You can also enter text directly into the toolbar in Reader.
  • To quickly move around within a page, press the [SPACE] bar. This turns your cursor into a "hand" with which you can grab the page and move it around freely on your screen.
  • Embedded hyperlinks are actually cross-references to related text. Click them to jump to the corresponding section of the User's Guide PDF.

- Quick Start Guide

The Quick Start Guide is designed to help you get your NSA up and running right away. It contains information on setting up your network and configuring for Internet access.

- Web Configurator Online Help

The embedded Web Help contains descriptions of individual screens and supplementary information.

Note: It is recommended you use the web configurator to configure the NSA.

- Support Disc

Refer to the included CD for support documents.

Documentation Feedback

Send your comments, questions or suggestions to: techwriters@zyxel.com.tw

Thank you!

The Technical Writing Team, ZyXEL Communications Corp.,

6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 30099, Taiwan.

Need More Help?

More help is available at www.zyxel.com.

ZYXEL NSA221 - Need More Help? - 1

text_image SUPPORT & DOWNLOADS PARTNER Download Library Knowledge Base Glossary Support & Feedback Warranty Information ZyXEL Windows Vista Support Forum Firmware Software Driver Datasheet Tech Doc Overview User's Guide Quick start guide CLI Reference Guide Support note Certification Declaration SNMP MIB File

- Download Library

Search for the latest product updates and documentation from this link. Read the Tech Doc Overview to find out how to efficiently use the User Guide, Quick Start Guide and Command Line Interface Reference Guide in order to better understand how to use your product.

- Knowledge Base

If you have a specific question about your product, the answer may be here. This is a collection of answers to previously asked questions about ZyXEL products.

- Forum

This contains discussions on ZyXEL products. Learn from others who use ZyXEL products and share your experiences as well.

Customer Support

Should problems arise that cannot be solved by the methods listed above, you should contact your vendor. If you cannot contact your vendor, then contact a ZyXEL office for the region in which you bought the device.

See http://www.zyxel.com/web/contact_us.php for contact information. Please have the following information ready when you contact an office.

  • Product model and serial number.
  • Warranty Information.
  • Date that you received your device.

Brief description of the problem and the steps you took to solve it.

Document Conventions

Warnings and Notes

These are how warnings and notes are shown in this User's Guide.

Warnings tell you about things that could harm you or your device.

Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations.

Syntax Conventions

  • The NSA may be referred to as the "NSA", the "device" or the "system" in this User's Guide.
  • Product labels, screen names, field labels and field choices are all in bold font.
  • A key stroke is denoted by square brackets and uppercase text, for example, [ENTER] means the "enter" or "return" key on your keyboard.
  • "Enter" means for you to type one or more characters and then press the [ENTER] key. "Select" or "choose" means for you to use one of the predefined choices.
  • A right angle bracket ( > ) within a screen name denotes a mouse click. For example, Maintenance > Log > Log Setting means you first click Maintenance in the navigation panel, then the Log sub menu and finally the Log Setting tab to get to that screen.
  • Units of measurement may denote the "metric" value or the "scientific" value. For example, "k" for kilo may denote "1000" or "1024", "M" for mega may denote "1000000" or "1048576" and so on.
  • "e.g.," is a shorthand for "for instance", and "i.e.," means "that is" or "in other words".

Icons Used in Figures

Figures in this User's Guide may use the following generic icons. The NSA icon is not an exact representation of your device.

Graphics in this book may differ slightly from the product due to differences in operating systems, operating system versions, or if you installed updated firmware/software for your device. Every effort has been made to ensure that the information in this manual is accurate.

NSAZYXEL NSA221 - Icons Used in Figures - 1ComputerZYXEL NSA221 - Icons Used in Figures - 2-Notebook computerZYXEL NSA221 - Icons Used in Figures - 3
ServerZYXEL NSA221 - Icons Used in Figures - 4TelevisionZYXEL NSA221 - Icons Used in Figures - 5-FirewallZYXEL NSA221 - Icons Used in Figures - 6
RouterZYXEL NSA221 - Icons Used in Figures - 7SwitchZYXEL NSA221 - Icons Used in Figures - 8InternetZYXEL NSA221 - Icons Used in Figures - 9

Safety Warnings

  • Do NOT use this product near water, for example, in a wet basement or near a swimming pool.
  • Do NOT expose your device to dampness, dust or corrosive liquids.
  • Do NOT store things on the device.
  • Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning.
  • Connect ONLY suitable accessories to the device.
  • Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks. ONLY qualified service personnel should service or disassemble this device. Please contact your vendor for further information.
  • ONLY qualified service personnel should service or disassemble this device.
  • Make sure to connect the cables to the correct ports.
  • Place connecting cables carefully so that no one will step on them or stumble over them.
    • Always disconnect all cables from this device before servicing or disassembling.
  • Use ONLY an appropriate power adaptor or cord for your device.
  • Connect the power adaptor or cord to the right supply voltage (for example, 110V AC in North America or 230V AC in Europe).
  • Do NOT allow anything to rest on the power adaptor or cord and do NOT place the product where anyone can walk on the power adaptor or cord.
  • Do NOT use the device if the power adaptor or cord is damaged as it might cause electrocution.
  • If the power adaptor or cord is damaged, remove it from the power outlet.
  • Do NOT attempt to repair the power adaptor or cord. Contact your local vendor to order a new one.
  • Do not use the device outside, and make sure all the connections are indoors. There is a remote risk of electric shock from lightning.
  • CAUTION: RISK OF EXPLOSION IF BATTERY (on the motherboard) IS REPLACED BY AN INCORRECT TYPE. DISPOSE OF USED BATTERIES ACCORDING TO THE INSTRUCTIONS. Dispose them at the applicable collection point for the recycling of electrical and electronic equipment. For detailed information about recycling of this product, please contact your local city office, your household waste disposal service or the store where you purchased the product.
  • Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device.

Your product is marked with this symbol, which is known as the WEEE mark. WEEE stands for Waste Electronics and Electrical Equipment. It means that used electrical and electronic products should not be mixed with general waste. Used electrical and electronic equipment should be treated separately.

ZYXEL NSA221 - Safety Warnings - 1

Contents Overview

User's Guide 19

Getting to Know Your NSA 21

NAS Starter Utility 27

Web Configurator Basics 47

Tutorials 69

Technical Reference 135

Status Screen 137

System Setting 141

Storage 147

Network 161

Applications 173

Package Management 219

Auto Upload 273

Users 289

Groups 295

Shares 299

Maintenance Screens 309

Protecting Your Data 333

Troubleshooting 339

Product Specifications 359

Table of Contents

About This User's Guide .... 3

Document Conventions....6

Safety Warnings....8

Contents Overview 9

Table of Contents....11

Part I: User's Guide.... 19

Chapter 1

Getting to Know Your NSA....21

1.1 Overview 21

1.2 Hard Disks 22

1.3 LEDs 23

1.3.1 COPY/SYNC Button 24

1.3.2 RESET Button 24

Chapter 2

NAS Starter Utility 27

2.1 Overview 27

2.2 Starting the NAS Starter Utility 27

2.3 NAS Discovery Screen 27

2.4 Main NAS Starter Utility Screen 29

2.5 Initialization Wizard 30

2.5.1 Default Configuration 31

2.5.2 Manual Configuration 34

2.5.3 Directory of the NAS 40

2.6 Import Files or Folders with zPilot 41

2.7 Add a Network Drive to My Computer 42

2.8 Manage the Device 43

2.9 Configure Network Setting 44

Chapter 3

Web Configurator Basics....47

3.1 Overview 47

3.2 Accessing the NSA Web Configurator 47

3.2.1 Access the NSA Via NAS Starter Utility 47
3.2.2 Web Browser Access 48

3.3 Login 48

3.4 Home Screens 50

3.4.1 Home Screens 52
3.4.2 Favorite 54
3.4.3 File Browser 55
3.4.4 Share and Folder Names ...... 59
3.4.5 Application Zone 60
3.4.6 System Settings 61

3.5 Administration Screens 63

3.5.1 Global Administration Icons 63
3.5.2 Navigation Panel 64
3.5.3 Main Window 65
3.5.4 Status Messages 65
3.5.5 Common Screen Icons 66
3.5.6 Session Example (Windows) 67

Chapter 4 Tutorials......69

4.1 Overview 69
4.2 Creating a Volume 69

4.2.1 Creating a RAID 1 Volume .... 70
4.2.2 Migrate Button 70
4.2.3 Create an Internal Volume Button 71

4.3 Deleting a Volume 72

4.4 File Sharing Tutorials 73

4.4.1 Creating a User Account 73
4.4.2 Creating a Share 76
4.4.3 Creating a Group 77
4.4.4 Accessing a Share From Windows Explorer 78
4.4.5 Accessing a Share Using FTP 80
4.4.6 Accessing a Share Through the Web Configurator 82

4.5 Download Service Tutorial 83

4.5.1 Copying/Pasting a Download Link 83
4.5.2 Installing the Link Capture Browser Plugin 86
4.5.3 Using the Link Capture Browser Plugin 91
4.5.4 Configuring the Download Service Preferences 93
4.5.5 Using Download Service Notification 95

4.6 Broadcasting Tutorial 99
4.7 Printer Server Tutorial 102
4.8 Copy and Flickr Auto Upload Tutorial 104

4.9 FTP Uploadr Tutorial 105
4.10 Web Configurator's Security Sessions ....110

4.10.1 Customizing the NSA's Certificate ....110
4.10.2 Downloading and Installing Customized Certificate 112
4.10.3 Turn on the NSA's Web Security 116

4.11 Using FTPES to Connect to the NSA 122
4.12 How to Use the BackupPlanner 123

4.12.1 Creating an Archive Backup 124
4.12.2 Creating a Synchronization Backup 127
4.12.3 Restoring Archived Files by Backup Job 130
4.12.4 Restoring by Backup Files 132

Part II: Technical Reference 135

Chapter 5

Status Screen 137

5.1 Overview 137
5.2 The Status Screen 137

Chapter 6

System Setting....141

6.1 Overview 141
6.2 What You Can Do .... 141
6.3 What You Need to Know 141
6.4 The Server Name Screen 142
6.5 The Date/Time Screen 143

Chapter 7

Storage....147

7.1 Overview ...... 147

7.1.1 What You Need to Know About Storage 147

7.2 The Storage Screen 148

7.2.1 Disk Replacement Restrictions 148
7.2.2 Storage Screen 149

7.3 Creating an Internal Volume ...... 151
7.3.1 Volume Status 152
7.4 Editing a Volume 153
7.5 Creating an External Volume 154
7.5.1 External Disks 155
7.6 Storage Technical Reference 156
7.6.1 Volumes and RAID 156

7.6.2 Choosing a Storage Method for a Volume 157
7.6.3 Storage Methods ...... 157

Chapter 8

Network 161

8.1 Overview 161
8.2 What You Can Do 161
8.3 What You Need to Know 161
8.4 The TCP/IP Screen 163
8.5 UPnP Port Mapping Screen 166

8.5.1 UPnP and the NSA's IP Address 167
8.5.2 UPnP and Security 167
8.5.3 The NSA's Services and UPnP 167
8.5.4 Configuring UPnP Port Mapping 168

8.6 The PPPoE Screen 170

Chapter 9

Applications 173

9.1 Overview 173
9.2 What You Can Do 173
9.3 What You Need to Know 174
9.4 FTP Server 176
9.5 The Media Server Screen 178
9.6 The Download Service Screen 179

9.6.1 Adding a Download Task 183
9.6.2 Configuring General Settings 185
9.6.3 Configuring the BitTorrent Settings 188
9.6.4 Edit IP Filter 189
9.6.5 Displaying the Task Information 191

9.7 The Web Publishing Screen 192
9.8 The Broadcatching Screen 194

9.8.1 Adding a Broadcasting Channel 196
9.8.2 Editing a Broadcasting Channel 200

9.9 The Print Server Screen 202

9.9.1 Print Server Rename 203

9.10 The Copy/Sync Button Screen 204
9.11 Technical Reference 205

9.11.1 Sharing Media Files on Your Network 205

9.11.2 Download Service 207

9.11.3 Link Capture Browser Plugin 207

9.11.4 Download Service Notification 208

9.11.5 BitTorrent Security 209

9.11.6 Web Publishing Example ......211

9.11.7 Web Publishing 213
9.11.8 Channel Guides for Broadcasting 214
9.11.9 Printer Sharing 215
9.11.10 Copying Files 216
9.11.11 Synchronizing Files 217

Chapter 10

Package Management 219

10.1 Overview 219
10.2 What You Can Do .... 219
10.3 What You Need to Know 219
10.4 Package Management Screen 220

10.4.1 Displaying the Package Information 223

10.5 eMule Screens 224

10.5.1 eMule Server Screen 224
10.5.2 Add Server 225
10.5.3 Edit Server 226
10.5.4 My Info 227
10.5.5 eMule Task Screen 228
10.5.6 Add Task 230
10.5.7 Preferences 232
10.5.8 Edit IP Filter 235
10.5.9 Share Browsing 236
10.5.10 Task Info 237
10.5.11 eMule Search Screen 239

10.6 DyDNS Screen 240
10.7 NFS Screen 241

10.7.1 Add/Edit NFS Share 243
10.7.2 NFS Session 244

10.8 SMART Screen 245

10.8.1 SMART Brief Summary 246
10.8.2 SMART Full Summary 247

10.9 Protect Screens 249

10.10 Backup Screens 249

10.10.1 Backup: Step 1 251
10.10.2 Backup: Step 2 253
10.10.3 Backup: Step 3 256
10.10.4 Backup: Step 4 257
10.10.5 Edit Job Screen 258
10.10.6 Edit Job: Step 1 259
10.10.7 Edit Job: Step 2 261
10.10.8 Restore Archive Screen 262
10.10.9 Restore Archive: Step 1 262

14.2 What You Can Do 299
14.3 The Shares Screen 300

14.3.1 Adding or Editing Share 302
14.3.2 Configuring Advanced Share Access 303
14.3.3 Public and ANONYMOUS Share Access Rights 304

14.4 The Recycle Bin Configuration Screen 305

14.4.1 Recycle Bins 305
14.4.2 Configuring Recycle Bins 305

14.5 The Share Browser Screen 306

14.5.1 Moving or Copying Files 308

Chapter 15

Maintenance Screens 309

15.1 Overview 309
15.2 What You Can Do .... 309
15.3 The Power Screen 310

15.3.1 Editing the Power Control Schedule Screen 312

15.4 The Log Screen 314

15.4.1 Report Config Screen 315
15.4.2 Email Setting 315
15.4.3 Report Setting 316
15.4.4 Syslog Server Setting 317

15.5 The Configuration Screen 318
15.6 SSL Certification 319
15.6.1 Modifying or Creating a Certificate 321
15.7 The Firmware Upgrade Screen 322
15.8 The Shutdown Screen 323
15.9 Technical Reference 323

15.9.1 Log Classes 324
15.9.2 Log Severity Levels 324
15.9.3 Log Messages 324

Chapter 16

Protecting Your Data....333

16.1 Overview 333
16.2 Protection Methods ...... 333
16.3 Configuration File Backup and Restoration 334
16.4 Memeo Autobackup 334

16.4.1 Memeo Autobackup Installation and Setup 334
16.4.2 Using Memeo Autobackup After the Initial Setup 337

Chapter 17

Troubleshooting....339

17.1 Troubleshooting Overview 339

17.2 Power, Hardware, Connections, and LEDs 339

17.3 NAS Starter Utility 342

17.4 NSA Login and Access 343

17.4.1 Reset the NSA 344

17.4.2 Enabling Scripting of Safe ActiveX Controls 345

17.5 I Cannot Access The NSA 347

17.6 Users Cannot Access the NSA 347

17.7 External USB Drives 349

17.8 Firmware 349

17.9 File Transfer 349

17.10 Networking 350

17.11 Some Features' Screens Do Not Display 351

17.12 Media Server Functions 352

17.13 Download Service and Broadcasting Functions 354

17.14 Web Publishing 355

17.15 Auto Upload 356

17.16 Package Management 357

17.17 Backups 358

Chapter 18

Product Specifications 359

18.1 Physical Features 359

18.2 Firmware Features 360

18.3 Specification Tables 362

18.4 Supported Media Server Content Formats 366

18.5 Supported iTunes Server Content Formats 367

18.6 Power Consumption 367

Appendix A Setting up Your Computer's IP Address....369

Appendix B Pop-up Windows, JavaScripts and Java Permissions 385

Appendix C Common Services 395

Appendix D Importing Certificates....399

Appendix E 431

Appendix E Open Source Licences....431

Appendix F Legal Information 569

Index....573

PART I

User's Guide

Getting to Know Your NSA

1.1 Overview

This chapter covers the main features and applications of the NSA.

Use the NSA to do the following.

  • Share files between computers on your network.
  • Back up files from your computers to the NSA.
  • Use the COPY/SYNC button to copy or synchronize files between the NSA and USB devices like card readers, MP3 players, mass storage devices, and digital cameras without using a computer.
  • Have the NSA handle large file downloads.
  • Automatically download files from website feeds for convenient viewing.
  • Play the NSA's video, music and photo files on your computers using the included media client software.
  • Play the NSA's video, music and photo files on hardware-based media clients like the DMA-2500.
  • Use the NSA’s website to share files with remote users.
  • Use iTunes on your computer to play video and music files stored on the NSA.
  • Share printers.
  • Automatically upload photo and video files to your FTP server, Flickr and YouTube accounts.

Figure 1 Example of the NSA in a Home Network
ZYXEL NSA221 - Overview - 1

flowchart
graph TD
    A["Internet"] --> B["Router"]
    C["USB HDD"] --> D["Stacked Server"]
    E["USB"] --> D
    F["DMA-2500"] --> D
    G["Computer"] --> D
    H["Computer"] --> D
    I["Computer"] --> D
    J["Computer"] --> D
    K["Computer"] --> D
    L["Computer"] --> D
    M["Computer"] --> D
    N["Computer"] --> D
    O["Computer"] --> D
    P["Computer"] --> D
    Q["Computer"] --> D
    R["Computer"] --> D
    S["Computer"] --> D
    T["Computer"] --> D
    U["Computer"] --> D
    V["Computer"] --> D
    W["Computer"] --> D
    X["Computer"] --> D
    Y["Computer"] --> D
    Z["Computer"] --> D
    AA["Computer"] --> D
    AB["Computer"] --> D
    AC["Computer"] --> D
    AD["Computer"] --> D
    AE["Computer"] --> D
    AF["Computer"] --> D
    AG["Computer"] --> D
    AH["Computer"] --> D
    AI["Computer"] --> D
    AJ["Computer"] --> D
    AK["Computer"] --> D
    AL["Computer"] --> D
    AM["Computer"] --> D
    AN["Computer"] --> D
    AO["Computer"] --> D
    AP["Computer"] --> D
    AQ["Computer"] --> D
    AR["Computer"] --> D
    AS["Computer"] --> D
    AT["Computer"] --> D
    AU["Computer"] --> D
    AV["Computer"] --> D
    AW["Computer"] --> D
    AX["Computer"] --> D
    AY["Internet"] --> AZ["Internet"]
    BA["Internet"] --> BB["Internet"]
    BC["Internet"] --> BD["Internet"]
    BE["Internet"] --> BF["Internet"]
    BG["Internet"] --> BH["Internet"]
    BI["Internet"] --> BJ["Internet"]
    BK["Internet"] --> BL["Internet"]
    BM["Internet"] --> BN["Internet"]
    BO["Internet"] --> BP["Internet"]
    BP --> BQ["Internet"]
    BR["Internet"] --> BS["Internet"]
    BT["Internet"] --> BU["Internet"]
    BV["Internet"] --> BW["Internet"]
    BX["Internet"] --> BY["Internet"]
    BZ["Internet"] --> CA["Internet"]
    CB["Internet"] --> CC["Internet"]
    CD["Internet"] --> CE["Internet"]
    CF["Internet"] --> CG["Internet"]
    CH["Internet"] --> CI["Internet"]
    CJ["Internet"] --> CK["Internet"]
    CE1["Internet"] --> CE2["Internet"]
    CE2 --> CE3["Internet"]
    CE3 --> CE4["Internet"]
    CE4 --> CE5["Internet"]
    CE5 --> CE6["Internet"]
    CE6 --> CE7["Internet"]
    CE7 --> CE8["Internet"]
    CE8 --> CE9["Internet"]
    CE9 --> CE10["Internet"]
    CE10 --> CE11["Internet"]
    CE11 --> CE12["Internet"]
    CE12 --> CE13["Internet"]
    CE13 --> CE14["Internet"]
    CE14 --> CE15["Internet"]
    CE15 --> CE16["Internet"]
    CE16 --> CE17["Internet"]
    CE17 --> CE18["Internet"]
    CE18 --> CE19["Internet"]
    CE19 --> CE20["Internet"]
    CE20 --> CE21["Internet"]
    CE21 --> CE22["Internet"]
    CE22 --> CE23["Internet"]
    CE23 --> CE24["Internet"]
    CE24 --> CE25["Internet"]
    CE25 --> CE26["Internet"]
    CE26 --> CE27["Internet"]
    CE27 --> CE28["Internet"]
    CE28 --> CE29["Internet"]
    CE29 --> CE30["Internet"]
    CE30 --> CE31["Internet"]
    CE31 --> CE32["Internet"]
    CE32 --> CE33["Internet"]
    CE33 --> CE34["Internet"]
    CE34 --> CE35["Internet"]
    CE35 --> CE36["Internet"]
    CE36 --> CE37["Internet"]
    CE37 --> CE38["Internet"]
    CE38 --> CE39["Internet"]
    CE39 --> CE40["Internet"]
    CE40 --> CE41["Internet"]
    CE41 --> CE42["Internet"]
    CE42 --> CE43["Internet"]
    CE43 --> CE44["Internet"]
    CE44 --> CE45["Internet"]
    CE45 --> CE46["Internet"]
    CE46 --> CE47["Internet"]
    CE47 --> CE48["Internet"]
    CE48 --> CE49["Internet"]
    CE49 --> CE50["Internet"]
    CE50 --> CE51["Internet"]
    CE51 --> CE52["Internet"]
    CE52 --> CE53["Internet"]
    CE53 --> CE54["Internet"]
    CE54 --> CE55["Internet"]
    CE55 --> CE56["Internet"]
    CE56 --> CE57["Internet"]
    CE57 --> CE58["Internet"]
    CE58 --> CE59["Internet"]
    CE59 --> CE60["Internet"]
    CE60 --> CE61["Internet"]
    CE61 --> CE62["Internet"]
    CE62 --> CE63["Internet"]
    CE63 --> CE64["Internet"]
    CE64 --> CE65["Internet"]
    CE65 --> CE66["Internet"]
    CE66 --> CE67["Internet"]
    CE67 --> CE68["Internet"]
    CE68 --> CE69["Internet"]
    CE69 --> CE70["Internet"]
    CE70 --> CE71["Internet"]
    CE71 --> CE72["Internet"]
    CE72 --> CE73["Internet"]
    CE73 --> CE74["Internet"]
    CE74 --> CE75["Internet"]

Above is the NSA in a home network. Users back up and share data on the NSA. The DMA-2500 plays the NSA's media files on the TV. A USB hard drive provides extra storage space and files are copied directly from the USB mass storage device to the NSA.

Place the NSA behind a firewall and/or IDP (Intrusion Detection and Prevention) device to protect it from attacks from the Internet.

Note: See Chapter 18 on page 359 for a more detailed list of NSA features.

Refer to the Quick Start Guide for hardware connections and how to install and remove hard drives from the disk trays.

Note: Turn off and disconnect the NSA before you install or remove the internal hard disk.

1.2 Hard Disks

Your NSA has two internal hard disk bays. Install one or two SATA (Serial Advanced Technology Attachment) hard disks. Note that both SATA hard disks are treated as internal or SATA volumes in the Storage > Volume screen (Section 7.4 on page 153). Any hard disk connected to the USB port(s) is considered an external or USB volume.

1.3 LEDs

The NSA LEDs (lights) tell you important information.

Figure 2 NSA Front Panel
ZYXEL NSA221 - LEDs - 1

natural_image Front view of a ZyXEL wireless device with visible ports and antenna (no readable text beyond brand name)

This table describes the NSA's LEDs.

Table 1 LEDs

LEDCOLORSTATUSDESCRIPTION
POWERBlueOnThe NSA is turned on and receiving power.
OffThe NSA is turned off.
SYSTEMGreenOnThe NSA has fully started and is operating normally.
BlinkingThe NSA is starting up or upgrading the firmware.
RedOnThe NSA has failed.
HDD1/ HDD2GreenOnThe hard disk drive is connected properly to the NSA.
BlinkingThe NSA is saving data to the hard disk drive.
RedOnThe NSA detected an error on the hard disk drive (like a bad sector for example). The NSA automatically tries to recover a bad sector, but the LED stays red until the NSA restarts.
OffThe NSA cannot detect a hard disk in the disk bay.
USBGreenOnThe USB device is connected properly to the NSA.
BlinkingThe NSA is saving data to the USB device.
RedOnThe USB device has failed and the NSA can no longer detect it.
OffNo USB device connected to the USB port.
LANGreenOnThe NSA has a successful 10/100 Mbps Ethernet connection.
BlinkingThe 100M LAN is sending or receiving packets.
OffThe NSA does not have a 10/100 Mbps Ethernet connection.
AmberOnThe NSA has a successful 1000 Mbps Ethernet connection.
BlinkingThe 1000 M LAN is sending or receiving packets.
OffThe NSA does not have a 1000 Mbps Ethernet connection.
COPY/SYNCGreenOnA USB device is connected to the NSA.
BlinkingThe NSA is copying or synchronizing files to or from the USB device.
RedOnCopying or synchronizing files to or from the USB device failed.
OffNo USB device is connected.

1.3.1 COPY/SYNC Button

Use the COPY/SYNC button on the front panel to copy or synchronize files between a connected USB device and the NSA. See Section 9.10 on page 204 for more details on how to configure the copy/sync settings.

1.3.2 RESET Button

Use the RESET button on the rear panel to restore the NSA's default settings.

Figure 3 The RESET Button
ZYXEL NSA221 - RESET Button - 1

flowchart
graph LR
    A["Press"] --> B["1 Beep"]
    B --> C["2 Beeps"]
    C --> D["5 more seconds"]
    D --> E["Release to Reset"]
    E --> F["IP Address"]
    F --> G["Password"]
    G --> H["Release to Clear All Settings"]

- Press the RESET button until you hear one beep (after about two seconds), then release it. You will hear one more beep after you release the button. This resets the NSA's IP address and password to the default values.

- Press the RESET button until you hear two beeps. After the second beep, continue pressing the button for five more seconds, then release it. You will hear three quick beeps after you release the button.

This resets the NSA to the factory default configuration. All settings you have configured on the NSA, including IP address, password, user accounts, groups, and so on will be reset to the factory defaults.

The reset process does NOT affect the volume settings, nor data stored on the NSA.

You should periodically back up your configuration file to your computer (see Section 15.5 on page 318 for details about managing the NSA's configuration file). You could then restore your configuration in the event that you or someone else reset the NSA to the factory defaults.

Note: You should keep the NSA in a secure location in order to prevent unauthorized reset of the device.

NAS Starter Utility

2.1 Overview

This chapter describes the NAS Starter Utility. Use the NAS Starter Utility to find, set up, and manage the NSA as well as copy files to it and access the files on it.

Make sure you have a backup of any existing data in the hard disk before installing it in the NSA. Using the initialization wizard formats the hard disk and deletes all data in the process.

There is a NAS Starter Utility available for Windows XP, Windows Vista, or Windows 7. Click Help to open a web help page about the NAS Starter Utility screens. NAS Starter Utility screens are shown here as they display with the Windows platform.

Note: Refer to the Quick Start Guide for your NSA's hardware connections and the steps for installing the NAS Starter Utility.

2.2 Starting the NAS Starter Utility

  • The NAS Starter Utility broadcasts a request packet when you first run it. Each NSA has an NAS Starter Utility Agent that always listens and responds to requests from the NAS Starter Utility. The NAS Starter Utility receives the response packet that contains information, such as host name, IP, and so on.
  • If you plan to use more than one NSA in your network, configure them with unique server names. This enables you to identify each NSA in the NAS Starter Utility screens.

2.3 NAS Discovery Screen

Use this screen to view the NSAs in your network. The NSA's Server Name (default is 'nsa221'). See Section 2.9 on page 44 for how to change it to a more recognizable one in your network.

Start the NAS Starter Utility (click the icon in your Desktop or in Start >

Programs > ZyXEL > NAS Starter Utility). The first time you open the NAS

Starter Utility the discovery screen appears as follows.

Figure 4 NAS Discovery
ZYXEL NSA221 - NAS Discovery Screen - 1

text_image ZyXEL NAS Starter Utility NAS Discovery The following picture shows the NAS in the network. You can diagnose the NAS connection status and choose one NAS to get related information or do some further settings. Wired nsa221 Refresh TWPC11477-01 Wireless Hostname:nsa221 IP:192.168.1.34 Model ID:N5A221 Firmware Version:V2010-02-08_01_06_40(AFM.0)b1 Status:Online

The following table describes the labels in this screen.

Table 2 NAS Discovery

LABELDESCRIPTION
RefreshClick this to refresh the screen. The NAS Starter Utility does not automatically refresh.
HostnameThis is the server name you configured for the NSA. If you have more than one NSA in your network, it is recommended that you give each one a unique name for identification purposes.If you have several NSAs connected to your computer/network, hover your mouse over the host name to view the details of each device. A box pops up containing details about the NSA.Hostname shows the NSA's configured server name.IP shows the NSA's current IP address.Model ID shows the NSA's model name.Firmware Version shows the version of firmware the NSA is currently using.Status shows whether the NSA is Online, Unreachable, Configuring, or Config Failed.

2.4 Main NAS Starter Utility Screen

The main NAS Starter Utility screen displays after you select a NSA in the NSA Discovery screen.

Figure 5 NAS Starter Utility Main Screen
ZYXEL NSA221 - Main NAS Starter Utility Screen - 1

text_image ZyXEL NAS Starter Utility Discovery ? Help NSA221 Import files or folders with zPilot Drag and drop files or folders onto zPilot to copy files to the NAS. Media files are automatically sorted into the Music, Photo, and Video shares. Add a network drive to My Computer Make it easy to use shares on the NAS by mapping them to network drives in Windows Explorer (My Computer). Manage the device Create Shares, assign users' privileges, set up network applications and more in Administration. Play media files from Home screen Connect to the Home screen to listen to music, enjoy photo slideshows, or watch video clips through your web browser. Show the directory of the NAS Show the file directory of the NAS in Windows Explorer so you can easily browse and manage the contents. Run the Initialization Wizard Set up the NAS with step-by-step instructions. Configure network setting Configure the Ethernet or PPPoE network only. Name: nsa221 Firmware: V4.00(AFM.0) IP address: 192.168.1.34 Status: ✓ Online NAS Discovery

The following table describes the labels in this screen.

Table 3 NAS Starter Utility Main Screen

LABELDESCRIPTION
DiscoveryClick this to use the NSA Discovery screen (Section 2.3 on page 27) to find and select the NSA on your network to which you want to connect.
barThe bar shows the NSA's in-use and remaining storage capacity.
NameThis is the server name you configured for the NSA. If you have more than one NSA in your network, it is recommended that you give each one a unique name for identification purposes.
FirmwareThis shows the version of firmware the NSA is currently using.
IP addressThis is the current IP address of the NSA.
StatusThis shows whether the NSA is Online, Unreachable, Configuring, or Config Failed.
NAS DiscoveryClick this to use the NSA Discovery screen (Section 2.3 on page 27) to find and select the NSA on your network to which you want to connect.
Import files or folders with zPilotClick this to launch zPilot to drag and drop files onto the NSA.
Add a network drive to My ComputerClick this to add the NSA as a network drive in your computer's Windows Explorer.
Manage the deviceClick this to log into the advanced administration screens. See Section 3.5 on page 63 for details on the administration screens.

Table 3 NAS Starter Utility Main Screen

LABELDESCRIPTION
Play Media Files from Home ScreenClick this to enjoy your media files though your web browser. See Section 3.4 on page 50 for details on the Home screen.
Show the directory of the NSAClick this to open the NSA's file directory in Windows Explorer. See Section 2.5.3 on page 40 for details.
Run the Initialization WizardClick this to set up the NSA for the first time. See Section 2.5 on page 30 for details.
Configure network settingClick this to change the NSA network settings such as the NSA's name, IP address, subnet mask, default gateway, DNS, or PPPoE. See Section 2.9 on page 44 for details.

2.5 Initialization Wizard

Use these screens to set up the NSA for the first time

Click Run the Initialization Wizard in the main utility screen to display the following screen. You must log in using an admin account. The default administrator username is 'admin' and the default password is '1234' and click Next.

Figure 6 Initialization Wizard Welcome
ZYXEL NSA221 - Initialization Wizard - 1

text_image NSA221 | Initialization Wizard Welcome If the NAS is still using the default password, you can find it in the Quick Start Guide. Username: Password: Next Exit

Choose Default Configuration (recommended) or manual configuration. Use the manual option if you need to name the NSA to configure specific network settings. Click Next.

Figure 7 Initialization Wizard: Wizard Type
ZYXEL NSA221 - Initialization Wizard - 2

text_image NSA221 | Initialization Wizard Choose a wizard type Choose one wizard type from the following options. Default Configuration Automatically apply the following settings / actions to the NAS. → A default system name: NSA221 → Your computer timezone. → Your computer network configuration as network settings. → HDD configuration: Raid1 → Map the Photo, Music and Video shares to computer network drives. Manual Configuration Step-by-step configuration. Next Exit

2.5.1 Default Configuration

1 The NAS Starter Utility checks the Internet connection.

Figure 8 Check Network Connection
ZYXEL NSA221 - Default Configuration - 1

text_image NSA221 | Initialization Wizard Check Network Connection Verifying the network connections...

2 Type a new administrator password (and retype it to confirm). If you do not want to change the administrator password, you can leave the fields blank and just click Next.

Figure 9 Change Admin Password
ZYXEL NSA221 - Default Configuration - 2

text_image NSA221 | Initialization Wizard Change Admin Password As a security precaution, it is highly recommended that you change the admin password. New Password: Verify New Password: ! Warning For better security, it is recommended that the password contain 8 or more characters consisting of a mix of letters, numbers, and symbols. Back Next Exit

3 Specify usernames and passwords for the individuals you want to be able to access the NSA.

Figure 10 Create User Accounts
ZYXEL NSA221 - Default Configuration - 3

text_image NSA221 | Initialization Wizard Create User Accounts - optional Normal User Username: Password: Normal User Username: Password: Normal User Username: Password: Normal User Username: Password: Skip Back Next Exit

4 Check your settings. If they are OK, click Next. Otherwise click Back. If you want to change anything other than the user accounts, keep clicking Back until you can change the wizard type to manual.

Figure 11 Confirm Settings
ZYXEL NSA221 - Default Configuration - 4

text_image NSA221 | Initialization Wizard Confirm settings The wizard is about to apply the following settings to the NAS. → NAS Name: nsa221 → Timezone: (GMT+08:00) Beijing,Chongqing,Hong Kong,Urumqi → Time: 2010-02-09 16:42 → Network: DHCP → HDD Configuration: JBOD → Share mapping to Drives: → User Accounts: 0 Back Next Exit

5 Wait while the NAS Starter Utility configures the NSA.

Figure 12 Setting the NAS
ZYXEL NSA221 - Default Configuration - 5

text_image NSA221 | Initialization Wizard Setting the NAS The wizard is configuring the NAS. It might take a few minutes to finish. Please wait. Setting the hostname... 5%

After the NAS Starter Utility finishes configuring the NSA, you can click Show the directory of the NAS to see the NSA's shares (see Section 2.5.3 on page 40) or

click Finish to return to the main NAS Starter Utility screen (see Section 2.4 on page 29).

Figure 13 Setting the NAS
ZYXEL NSA221 - Default Configuration - 6

text_image NSA221 | Initialization Wizard Default Configuration Completed Congratulations! The NAS has initialized successfully. → Show the directory of the NAS Finish

2.5.2 Manual Configuration

1 Set up the NSA's basic network configuration first.

Figure 14 Setup Network
ZYXEL NSA221 - Manual Configuration - 1

text_image NSA221 | Initialization Wizard Setup Network (Step 1 of 7) Select the connection type and fill out IP information if needed. Get IP automatically from DHCP server - recommended Assign IP manually IP Address: 192.168.1.34 Subnet Mask: 255.255.255.0 Default Gateway: 192.168.1.1 Use DNS server from DHCP server Assign DNS server manually Primary DNS Server: 172.23.5.2 Secondary DNS Server: 172.23.5.1 Back Next Exit

The following table describes the labels in this screen.

Table 4 NAS Starter Utility > Config

LABELDESCRIPTION
Get IP automatically from DHCP serverSelect this if the NSA is automatically assigned an IP address from the ISP or a DHCP server in your network.
Assign IP ManuallySelect this if you want to assign the NSA a fixed IP address, subnet mask and default gateway.Note: Do not configure an IP address that is already in use in your network. This results to a network IP address conflict and makes the NSA inaccessible.
Use DNS server from DHCP serverDomain Name System (DNS) is for mapping a domain name to its corresponding IP address and vice versa. Select this if the NSA is automatically given DNS information from the ISP or a DHCP server in your network.
Assign DNS server manuallyIf you were given specific IP address(es) of the DNS server(s), select this and enter the primary and secondary DNS in the corresponding fields.

2 If your Internet connection requires you to enter a user name and password to connect to the Internet, enter them here and click Next. If you do not need to enter a user name and password to connect to the Internet, click Skip.

Figure 15 PPPoE
ZYXEL NSA221 - Manual Configuration - 2

text_image NSA221 | Initialization Wizard Setup Network (Step 1 of 7) Complete the PPPoE section only if you must use a username and password to connect to the Internet. Username: Password: Verify Password: Skip Back Next Exit

3 The NAS Starter Utility checks the Internet connection.

Figure 16 Check Network Connection
ZYXEL NSA221 - Manual Configuration - 3

text_image NSA221 | Initialization Wizard Setup Network (Step 1 of 7) Verifying the network connections...

4 Type a new administrator password (and retype it to confirm) and click Next. If you do not want to change the administrator password, you can leave the fields blank and just click Next.

Figure 17 Change Admin Password
ZYXEL NSA221 - Manual Configuration - 4

text_image NSA221 | Initialization Wizard Change Admin Password (Step 3 of 7) As a security precaution, it is highly recommended that you change the admin password. New Password: Verify New Password: Warning For better security, it is recommended that the password contain 8 or more characters consisting of a mix of letters, numbers, and symbols. Back Next Exit

5 Specify a name to uniquely identify the NSA on your network. Choose the time zone of your location. This sets the time difference between your time zone and Greenwich Mean Time (GMT).

Figure 18 Create User Accounts
ZYXEL NSA221 - Manual Configuration - 5

text_image NSA221 | Initialization Wizard Enter general information (Step 4 of 7) Give the NAS a name and select a timezone. NAS Name: nsa221 Timezone: (GMT+08:00) Beijing,Chongqing,Hong Kong,Urumqi Back Next Exit

6 Select how to configure the hard disks.

Figure 19 Create User Accounts
ZYXEL NSA221 - Manual Configuration - 6

text_image NSA221 | Initialization Wizard Choose HDD Configuration (Step 5 of 7) Each type of HDD configurations offers its advantages of data loss prevention, capacity, or speed. Please select a type according to your requirement. HDD Configuration: Individual Disks 465.76 GB (Slot1) 0.00 GB (Slot2) 465.76 GB (Total Capacity) Back Next Exit

With only one hard disk installed, just click Next. If you have two hard disks installed choose one of the following:

  • RAID 1: Use this to mirror all data on one disk to the other disk to protect against data loss.
  • Individual Disks: Use this if you want maximum storage capacity and/or you have other means of protecting your data. This creates two JBOD volumes (with one disk in each), a failure of one disk (volume) should not affect the other volume (disk).
  • JBOD: Use this if you want maximum storage capacity and/or you have other means of protecting your data. This combines the two physical disks into a single virtual one, so they appear as a single large disk.

- RAID 0: Use this if you want maximum speed for your disks, and/or you have other means of protecting your data. RAID 0 has the fastest read and write performance but if one disk fails you lose all your data from both disks.

7 This screen lists the shares the NAS Starter Utility creates on the NSA by default. Select the ones you want to use as network drives in Windows Explorer.

Figure 20 Connect Network Drives
ZYXEL NSA221 - Manual Configuration - 7

text_image NSA221 | Initialization Wizard Connect Network Drives (Step 6 of 7) Select which shares to map the network drives in Windows Explorer (My Computer). □ admin □ public □ photo □ music □ video Back Next Exit

8 Specify usernames and passwords for the individuals you want to be able to access the NSA and click Next.

Figure 21 Create User Accounts
ZYXEL NSA221 - Manual Configuration - 8

text_image NSA221 | Initialization Wizard Create User Accounts (Step 7 of 7) - optional Normal User Username: Password: Normal User Username: Password: Normal User Username: Password: Normal User Username: Password: Skip Back Next Exit

9 If the settings are OK, click Next. Otherwise click Back. If you want to change anything other than the user accounts, keep clicking Back until you can change the wizard type to manual.

Figure 22 Confirm Settings
ZYXEL NSA221 - Manual Configuration - 9

text_image NSA221 | Initialization Wizard Confirm settings The wizard is about to apply the following settings to the NAS. → NAS Name: nsa221 → Timezone: (GMT+08:00) Beijing,Chongqing,Hong Kong,Urumqi → Time: 2010-02-09 16:42 → Network: DHCP → HDD Configuration: JBOD → Share mapping to Drives: → User Accounts: 0 Back Next Exit

10 Wait while the NAS Starter Utility configures the NSA.

Figure 23 Setting the NAS
ZYXEL NSA221 - Manual Configuration - 10

text_image NSA221 | Initialization Wizard Setting the NAS The wizard is configuring the NAS. It might take a few minutes to finish. Please wait. Setting the hostname... 5%

After the NAS Starter Utility finishes configuring the NSA, you can click Show the directory of the NAS to see the NSA's shares (see Section 2.5.3 on page 40) or

click Finish to return to the main NAS Starter Utility screen (see Section 2.4 on page 29).

Figure 24 Setting the NAS
ZYXEL NSA221 - Manual Configuration - 11

text_image NSA221 | Initialization Wizard Default Configuration Completed Congratulations! The NAS has initialized successfully. → Show the directory of the NAS Finish

2.5.3 Directory of the NAS

Enter the administrator user name and password and click Login.

Figure 25 Login
ZYXEL NSA221 - Directory of the NAS - 1

text_image NSA221 Login User name: Password: Remember Me Login Cancel

The utility opens the NSA's directory in Windows Explorer.

Figure 26 Directory
ZYXEL NSA221 - Directory of the NAS - 2

text_image \192.168.1.34 File Edit View Favorites Tools Help Back Search Folders Folder Sync Address \192.168.1.34 Network Tasks Add a network place View network connections Set up a home or small office network Set up a wireless network for a home or small office View workgroup computers Show icons for networked UPnP devices Other Places Name Comments admin music photo public video Printers and Faxes Shows installed printers and fax ... Go

2.6 Import Files or Folders with zPilot

In the main NAS Starter Utility screen click Import files or folders with zPilot to be able to drag and drop files from your computer to the NSA.

Enter the administrator user name and password and click Login.

Figure 27 Login
ZYXEL NSA221 - Import Files or Folders with zPilot - 1

text_image NSA221 Login User name: Password: Remember Me Login Cancel

The zPilot icon displays.

Figure 28 zPilot
ZYXEL NSA221 - Import Files or Folders with zPilot - 2

Drag files onto the zPilot icon to move them to the NSA. zPilot automatically sorts music, photo, and video files into the Music, Photo, and Video folders. zPilot can automatically sort the types of media files listed in Table 121 on page 366 (except for the subtitles). Other types of files go to the Public folder. For folders of files you are prompted to choose the target destination. The zPilot icon shows the transfer rate.

Figure 29 zPilot Showing Transfer Rate
ZYXEL NSA221 - Import Files or Folders with zPilot - 3

Double-click the zPilot icon to display the NAS Starter Utility screen with status details about the file transfers. Click the "x" button next to a file entry to stop transferring the file. Click Clean Up to clear completed transfers from the list.

Figure 30 zPilot Showing Transfer Rate
ZYXEL NSA221 - Import Files or Folders with zPilot - 4

text_image zPilot File Importer Status 03 Lenka - Skipalong.mp3 01 Lenka - The Show.mp3 09 Lenka - Live Like You're Dying.mp3 06 Lenka - Knock Knock.mp3 Clean Up

2.7 Add a Network Drive to My Computer

In the main NAS Starter Utility screen click Add a network drive to My Computer to add the NSA as a network drive in your computer's Windows Explorer.

Enter the administrator user name and password and click Login.

Figure 31 Login
ZYXEL NSA221 - Add a Network Drive to My Computer - 1

text_image NSA221 Login User name: Password: Remember Me Login Cancel

Select a share on the NSA and the drive letter on your computer to which you want to map it. The table displays the NSA shares that are already mapped to drive letters on your computer. After you click OK you can see the new drive in

Windows Explorer (My Computer) where you can access and use it like your computer's other drives.

Figure 32 Network Drive Mapping
ZYXEL NSA221 - Add a Network Drive to My Computer - 2

text_image NSA221 | Network Drive Mapping Select a Share and specify a drive letter. Successfully connected network drives can be found later in Windows Explorer (My Computer). Share: public Drive Letter: Z: Current Network Drive being associated to this NAS Drive Letter Share W public Ok Exit

Select a share on the NSA and the drive letter on your computer to which you want to map it. The table displays the NSA shares that are already mapped to drive letters on your computer. After you click OK you can see the new drive in Windows Explorer (My Computer) where you can access and use it like your computer's other drives.

2.8 Manage the Device

In the main NAS Starter Utility screen click Manage the Device to log into the NSA's administration screens where you can manage the NSA.

Enter the administrator user name and password and click Login.

Figure 33 Login
ZYXEL NSA221 - Manage the Device - 1

text_image NSA221 Login User name: Password: Remember Me Login Cancel

See Section 3.5 on page 63 for more on the administration screens.

2.9 Configure Network Setting

Use these screens to change the NSA network settings such as the NSA's name, IP address, subnet mask, default gateway, DNS, or PPPoE.

Click Configure network setting in the main utility screen to display the following screen.

Figure 34 NAS Starter Utility > Configure network setting
ZYXEL NSA221 - Configure Network Setting - 1

text_image NSA221 | Configuration Configure Host name and Network settings. NAS Name: nsa221 ● Get IP automatically from DHCP server - recommended ○ Assign IP manually IP Address: 192.168.1.35 Subnet Mask: 255.255.255.0 Default Gateway: 192.168.1.1 ● Use DNS server from DHCP server ○ Assign DNS server manually Primary DNS Server: 172.23.5.1 Secondary DNS Server: 172.23.5.2 PPPoE Next Exit

The following table describes the labels in this screen.

Table 5 NAS Starter Utility > Config

LABELDESCRIPTION
NAS NameSpecify a name to uniquely identify the NSA on your network. You can enter up to 15 alphanumeric characters with minus signs allowed but not as the last character. The name must begin with an alphabetic character (a-z) and is NOT case sensitive.
Get IP automatically from DHCP serverSelect this if the NSA is automatically assigned an IP address from the ISP or a DHCP server in your network.
Assign IP ManuallySelect this if you want to assign the NSA a fixed IP address, subnet mask and default gateway.Note: Do not configure an IP address that is already in use in your network. This results to a network IP address conflict and makes the NSA inaccessible.
Use DNS server from DHCP serverDomain Name System (DNS) is for mapping a domain name to its corresponding IP address and vice versa. Select this if the NSA is automatically given DNS information from the ISP or a DHCP server in your network.

Table 5 NAS Starter Utility > Config

LABELDESCRIPTION
Assign DNS server manuallyIf you were given specific IP address(es) of the DNS server(s), select this and enter the primary and secondary DNS in the corresponding fields.
PPPoEClick this if your Internet connection requires you to enter a user name and password to connect to the Internet.

If your Internet connection requires you to enter a user name and password to connect to the Internet, select Enable PPPoE Connection and enter your user name and password.

Figure 35 PPPoE
ZYXEL NSA221 - Configure Network Setting - 2

text_image NSA221 | PPPoE Configuration Status: Disable IP: N/A Netmask: N/A DNS: N/A ✓ Enable PPPoE Connection Username: Password: Ok Cancel

Web Configurator Basics

3.1 Overview

This chapter describes how to access the NSA web configurator and provides an overview of its screens.

The web configurator is an HTML-based management interface that allows easy NSA setup and management using an Internet browser.

Use Internet Explorer 6.0 or Mozilla Firefox 2.00, or later versions of these browsers. The recommended screen resolution is 1024 by 768 pixels or higher.

In order to use the web configurator you need to allow:

  • Web browser pop-up windows from your device. Web pop-up blocking is enabled by default in Windows XP SP (Service Pack) 2.
  • JavaScript (enabled by default).

3.2 Accessing the NSA Web Configurator

Make sure your NSA is properly connected and that your computer is in the same subnet as the NSA (refer to the Quick Start Guide or the appendices).

3.2.1 Access the NSA Via NAS Starter Utility

If you don't know the IP address of the NSA, then use the NAS Starter Utility's Play Media Files from Home Screen link to find it. Refer to the Quick Start

Guide for how to install and run the NAS Starter Utility. See Chapter 2 on page 27 for more information on the NAS Starter Utility.

Figure 36 NAS Starter Utility Main Screen
ZYXEL NSA221 - Access the NSA Via NAS Starter Utility - 1

text_image ZyXEL NAS Starter Utility Discovery ? Help NSA221 Import files or folders with zPilot Drag and drop files or folders onto zPilot to copy files to the NAS. Media files are automatically sorted into the Music, Photo, and Video shares. Add a network drive to My Computer Make it easy to use shares on the NAS by mapping them to network drives in Windows Explorer (My Computer). Manage the device Create Shares, assign users' privileges, set up network applications and more in Administration. Play media files from Home screen Connect to the Home screen to listen to music, enjoy photo slideshows, or watch video clips through your web browser. Show the directory of the NAS Show the file directory of the NAS in Windows Explorer so you can easily browse and manage the contents. Run the Initialization Wizard Set up the NAS with step-by-step instructions. Configure network setting Configure the Ethernet or PPPoE network only. Name: nsa221 Firmware: V4.00(AFM.0) IP address: 192.168.1.34 Status: ✓ Online NAS Discovery

3.2.2 Web Browser Access

Configure the server name of your NSA using the Network Configuration screen (Section 2.9 on page 44) of the NAS Starter Utility. Open your browser and type in the server name of the NSA ("nsa221" by default).

Figure 37 NSA URL
ZYXEL NSA221 - Web Browser Access - 1

text_image File Edit View History Bookmarks Tools Help nsa221

3.3 Login

The default username and password are 'admin' and '1234' respectively. Enter your username and password. If you use the option to stay logged in for two weeks (assuming you do not log out), make sure you keep your computer secure.

Then click Login. See Chapter 12 on page 289 for how to create other user accounts.

Figure 38 NSA Login Screen
ZYXEL NSA221 - Login - 1

text_image Language : English Enter Username/password and click to login. Username Password (a maximum of 14 alphanumeric, printable characters, no single and double quotes ) □ Keep me logged in for two weeks Login Reset Note: Please turn on the Javascript and ActiveX control setting on Internet Explorer.

If you have not done so yet, you should see a screen asking you to change your password (highly recommended) as shown next. Type a new password (and retype it to confirm) and click Apply or click Ignore.

Figure 39 Change Password Screen
ZYXEL NSA221 - Login - 2

text_image Update Admin Info As a security precaution, it is highly recommended that you change the admin password. New Password: Password (Confirm): ( a maximum of 14 alphanumeric, printable characters, no single and double quotes ) Apply Ignore Note: Once you apply the setting, the page will re-direct to the log-in page immediately.

3.4 Home Screens

All users (including the administrator) first see the Home screen after logging in.

Figure 40 Home
ZYXEL NSA221 - Home Screens - 1

text_image ZyXEL My Favorite Shared Playlist Favorite

Note: If you did not select the option to stay logged in for two weeks when you logged in, the web configurator management session automatically times out if it is left idle for 15 minutes. Simply log back into the NSA if this happens to you.

The main Home screen displays icons for the various features you can access.

Table 6 Main Home Screen Icons

ICONDESCRIPTION
ZYXEL NSA221 - Home Screens - 2Use Music, Photo, and Video to play and organize your music, picture, and video files.
ZYXEL NSA221 - Home Screens - 3
ZYXEL NSA221 - Home Screens - 4
ZYXEL NSA221 - Home Screens - 5Use Favorite to create and edit playlists.
ZYXEL NSA221 - Home Screens - 6Use File Browser to see your files in a tree-folder structure.
ZYXEL NSA221 - Home Screens - 7Administrators can useApplication Zoneto install, access, and manage the NSA’s applications.
ZYXEL NSA221 - Home Screens - 8UseSystemto edit general system settings or log into the administrator advanced configuration screens.

Note: Your browser may need Windows Media Player and VLC plugins installed to play music and video files. To get the VLC plugins, you have to download and install VLC (use the .exe file). To install a VLC plugin for FireFox, when you install VLC, you have to select the Mozilla plugin option. To display your photos as a 3-D wall for quick browsing, install the CoolIris plugin.

The icons at the top-right of the screen are visible from most screens. Use them to navigate between the screens and menus. The following table describes the icons.

Table 7 Global Home Labels and Icons

LABEL/ICONDESCRIPTION
HomeClick this to return to the Home screen.
HelpClick this to open a web help page specific to the screen you are currently configuring.
LogoutClick this at any time to exit the web configurator.

3.4.1 Home Screens

Here are some Home screen descriptions. A music screen is shown here as an example. Other screens work in a similar way.

Figure 41 Music Screen
ZYXEL NSA221 - Home Screens - 1

text_image ZyXEL | Music / All Home Help Logout Welcome, admin A ABCDEFGHIJKLMNOPQRSTUVWXYZ# B Adrift All At Once Angel Anything I'm Not Bring Me Down Dangerous And Sweet Don't Let Me Fall Enemy Go On Hope If I Had Eyes Knock Knock Like A Song Live Like You're... Losing Keys Monsoon Same Girl Skipalong C 1 2 D All Now Playing

This table describes common labels in the Home media screens. Not every item displays in every screen.

Table 8 Home Media Screens

LABELDESCRIPTION
AClick a letter to go to the first item starting with that letter.
BView files. Double-click an item to play it.
CShows which page is displaying and the total number of pages of entries.Click an arrow or type a number to go to another page of entries.

Table 8 Home Media Screens

LABELDESCRIPTION
DSelect the sorting criteria:Artist - Sort music by artist.All - All of the menu's files display here.Genre - Sort music by category.Folder - List the folders containing music files.Album - List the identified music albums.Current Playlist - Show the playing and queued songs.The NSA categorizes files into genres and albums according to the information stored in your files. Files may not appear in the proper folders if they have missing, incorrect or incomplete information.
ThumbnailClick this to view the files as thumbnails.
ListClick this to view the files as a list.
PlayClick this to play the currently selected file. You can also double-click a file to play it.
DeleteSelect an item and click Delete to remove it.
RenameSelect an item and click Rename to change its name.Note: When you change a file name, make sure you keep the file extension unchanged.
Add to Current PlaylistClick this to add the selected music file to the currently playing playlist.
Add to PlaylistClick this to add the selected music file to a playlist.
SearchClick this to look for a file or folder by name.
RefreshClick this to update the display in the screen.
Now PlayingThis link is available when a song is playing. Click it to see details about the song that is currently playing.

3.4.1.1 Now Playing (Music)

A Now Playing link displays when a song is playing. Click it to display a panel like the following. This screen displays the name of the current song and it's play progress and lets you control the playback.

Figure 42 Now Playing
ZYXEL NSA221 - Now Playing (Music) - 1

text_image Jack Johnson - Sleep Through The Static All At Once 3/25 00:00 03:38 Go to Current Playlist >>

3.4.1.2 Slideshow and Coolris (Photos)

In a Photo menu click the SlideShow button to display the menu's files as a slideshow. Move your cursor over the slideshow's screen to display full screen, previous, pause, and next buttons for controlling the slideshow.

Figure 43 Slideshow
ZYXEL NSA221 - Slideshow and Coolris (Photos) - 1

natural_image Duck standing on a grassy field, no visible text or symbols

When the CoolIris plugin is installed in your browser, click the Launch CoolIris button to display your photos as a 3-D wall for quick browsing.

3.4.2 Favorite

Use the Favorite menu to manage your playlists.

3.4.2.1 Shared Playlist

Use Favorite > Shared Playlist to view and play playlists that you created externally (in iTunes, Windows Media Player, VLC media player, or Winamp for example) and saved to the NSA. When using zPilot to move files to the NSA, playlists are automatically put into the music share.

3.4.2.2 My Favorite

Use Favorite > My Favorite to create, edit, and play playlists. These playlists are specific to the NSA and cannot be used in external music players.

Figure 44 Favorite > My Favorite
ZYXEL NSA221 - My Favorite - 1

text_image ZyXEL | Favorite / My Favorite Welcome, steve test example my-playlist My Favorite

This table describes labels in this menu.

Table 9 Favorite > My Favorite

LABELDESCRIPTION
NewClick this to create a new playlist.
EditDouble-click a playlist or select it and click Edit to go to a screen where you can remove songs from the playlist.
Delete AllWithin a playlist click Delete All to remove all of the playlist's songs.

3.4.3 File Browser

Click File Browser to open the following screen. Use the file browsing screens to play, open, upload, and download files. A share is a set of user access permissions for a specific folder on a volume (gives someone access to a folder). It is equivalent to the Windows concept of a shared folder, but the access rights are independent of the folder (you configure the share and the folder separately). You

can map a share to a network drive for easy and familiar file transfer for Windows users.

  • A folder icon with a hand indicates a share.
  • The administrator owns and manages the public shares.
  • Double-click a media file to open it. Double-click other types of files to be able to save them.
  • Click to the right of a file or folder name to select it.
  • Use the [SHIFT] key to select a range of entries. Hold down the [CTRL] key to select multiple individual entries.
  • Drag and drop files to open a screen that lets you choose whether to copy or move them.
  • You can upload files of up to 2 GB in size.
  • You can download individual files of up to 4 GB in size with Mozilla Firefox and Internet Explorer 7 and later or up to 2 GB in size with Internet Explorer 6.

Figure 45 File Browser
ZYXEL NSA221 - File Browser - 1

text_image ZyXEL | File Browser Home ? Help E Logout Welcome,steve NSA221 music photo 2010-02-05 public video 2010-02-05 public Name Size Last Modified 8-9.xls 49.96 KB 05-02-2010 09:05 ADP97007.doc 42.88 KB 05-02-2010 09:04 file_of_dot_media_ 1.21 KB 05-02-2010 12:06 imp_acnt.csv 17.99 KB 05-02-2010 09:07 monoslideshow2.0.zip 478.09 KB 05-02-2010 09:06 training.txt 263.00 Bytes 05-02-2010 12:09

The following table describes the labels in this screen.

LABELDESCRIPTION
UpClick this to go to the next higher layer in the share's folder tree.
NameThis column identifies the names of folders and files in the share. Click a file's file name to open the file or save it to your computer. Click a folder's name to display the folder's contents.
SizeThis column displays a file's size in bytes.
Last ModifiedThis column displays the last time the file or folder was changed (in year-month-day hour: minute: second format).
Create New FolderClick this to open the following screen where you can create a new folder within the share.ZYXEL NSA221 - File Browser - 2Specify a name to identify the folder. See Section 3.4.4 on page 59 for more information on folder names. ClickApplyto create a folder or clickCloseto exit this screen.
Configure ShareSelect a share and click this link to open a screen where you can see and configure share management details.
UploadClick this to open the following screen where you can add files to the share.ZYXEL NSA221 - File Browser - 3Use theBrowsebutton to locate your file/s and clickApplyto upload the file. ClickCancelto close this screen.Note: Do not refresh the screen while an upload is going on.
DownloadSelect a file and click this to save the file to your computer.Note: Do not refresh the screen while a download is going on.
RestoreWhen you are in a recycle bin folder, select a folder or file and click this to restore it.

3.4.3.1 Configure Share Screen

In the File Browser screen, select a share and click Configure Share to open the following screen where you can see and configure share management details.

Figure 46 File Browser > Configure Share
ZYXEL NSA221 - Configure Share Screen - 1

text_image Configure Share Share Name admin Volume HomeDisk Make this share owned by admin Enable This Share Enable Recycle Bin Publish this share to Media Server Publish this share to Web Share Access Keep it private to owner Apply Cancel

The following table describes the labels in the this screen.

Table 11 File Browser > Configure Share

LABELDESCRIPTION
Share NameConfigure a name to identify this share. Type a share name from 1 to 239 single-byte (no Chinese characters allowed for example) ASCII characters. The name cannot be the same as another existing local share. See Section 3.4.4 on page 59 for more information on share names. This is not configurable for the NSA's default admin, music, photo, public, and video shares.
VolumeThis shows the volume the share is on. It is read-only.
Make this share owned bySelect the administrator or user account that is to own (manage) this share. The share owner controls access rights to the share. This is not configurable for the NSA's default admin, music, photo, public, and video shares.
Enable This ShareSelect this option to allow users to access this share. When this option is not selected, you cannot see and access this share.
Enable Recycle BinSelect this option to keep deleted items in a recycle bin. When you delete an item, a recycle folder is created within the share, and the deleted item is stored in the recycle bin. Later if you want to retrieve a deleted item, you can select the item from the recycle folder and move/copy the item to another share.
Publish this share to Media ServerSelect this option to make the share's files available to media clients.
Publish this share to WebSelect this option to let people use a web browser to access this share's files without logging into the Home screens.
Share AccessSelect who can access the files in the share and how much access they are to be given. If you publish the share to the media server or the web, all users will have at least read-only access to the share, regardless of what you configure here. This is not configurable for the NSA's default admin, music, photo, public, and video shares.SelectKeep it private to ownerto allow only the share owner to read files in the share, delete files in the share and save files to the share.SelectMake it publicto allow anyone (with or without a user account on the NSA) to read files in the share, delete files in the share and save files to the share.SelectAdvancedto select which individual users can read the share's files, which users can delete the share's files, and which users are blocked from doing either.
ApplyClick this to save your changes.
CancelClick this to return to the previous screen without saving.

3.4.4 Share and Folder Names

The name can only contain the following characters:

- Alphanumeric (A-z, 0-9) and Unicode.

The NSA allows FTP access to shares, folders or files with names encoded in the UTF-8 (8-bit UCS/Unicode Transformation Format) format. So your FTP client must support UTF-8 in order to access shares, folders or files on the NSA with Unicode names.

  • Spaces
  • _ [underscores]
    • . [periods]
  • [dashes]

Other limitations include:

  • All leading and trailing spaces are removed automatically.
  • Multiple spaces within names are converted to a single space.
  • Share names must be unique (they cannot be the same as other share names).
  • The NSA creates automatic volume names for external (USB) disk volumes. These are a type of share, so the share name you configure cannot conflict with the external (USB) disk volume names. "ExtVol1" or "ExtVol2" are examples of external (USB) disk volume names.
  • Folder names must be unique (they cannot be the same as other folder names).
  • The minimum character length of a name is one character, that is a name cannot be blank.

  • The maximum character length of share name is 239 characters.

  • Unicode is supported for share names, although your FTP client must support UTF-8. Full support should be available in all Windows versions after Windows 2000.

3.4.5 Application Zone

Administrators can click Application Zone to go to a screen where you can enable or disable various applications for file sharing and downloading.

Figure 47 Application Zone
ZYXEL NSA221 - Application Zone - 1

text_image ZyXEL | Application Zone Home ? Help E Logout Welcome, admin Name Description Management Page Broadcatching Broadcasting has the NSA download frequently updated digital contents I Applications > Broadcasting Copy/Sync Button The COPY/SYNC button on the front panel allows you to copy or synchron Applications > Copy/Sync Button Download Service Download service allows you to download files from the Internet directly to Applications > Download Service FTP Server Use FTP or FTPES (FTP over Explicit TTL/SSL) to upload files to the NSA and Applications > FTP Server FTP Uploadr The FTP Uploadr feature uploads files stored in the NSA to FTP servers. Flickr Uploadr The auto upload feature uploads media files stored in the NSA to the Flickr Media Server Lets anyone on your network play video, music, and photos from the NSA Applications > Media Server Print Server Connect a printer to the NSA's USB port to let multiple computers on your n Applications > Print Server Web Publishing Web publishing lets you 'publish' shares (containing folders and files) on th Youtube Uploadr The auto upload feature uploads media files stored in the NSA to the Youtu iTunes Server Let anyone on your network use iTunes to play music and video files in the Applications > Media Server

The following table describes the labels in the this screen.

Table 12 Application Zone

LABELDESCRIPTION
NameThis is the name of the application.
DescriptionThis is a brief description of the application. See Chapter 9 on page 173 for more information.
Management PageClick this link to go the application's management page where you can configure settings for it. See Chapter 9 on page 173 for more information.
EnableSelect a disabled application and click this to turn on the application. Some applications are always enabled and cannot be disabled.
DisableSelect an enabled application and click this to turn off the application. Select the Flickr or Youtube Uploadr entry and click this to cancel all uploading. Some applications are always enabled and cannot be disabled.
PauseSelect the Flickr or Youtube Uploadr entry and click this to pause current uploading. Resume will resume current uploading.
ResumeSelect the Flickr or Youtube Uploadr entry and click this to resume current uploading.

3.4.6 System Settings

Click System > Settings to open the following screen. Use this screen to change general settings and an account password.

Figure 48 System > Settings
ZYXEL NSA221 - System Settings - 1

text_image ZyXEL | System / Settings Welcome, admin Music Setting Double Click Behavior Setting Replace current playlist and start to play Append to current playlist Photo Slideshow Ken Burns On Off Slide Interval 3 Second(s) Change Password Account Name admin Old Password New Password Password (Confirm) System Language Language English System Administration Go to system administration page. Apply Reset Cancel

The following table describes the labels in this screen.

Table 13 System > Settings

LABELDESCRIPTION
Double Click Behavior SettingSelectReplace current playlist and start to playto have double clicking a song cause the NSA to immediately stop any currently playing song and start playing the double-clicked song.SelectAppend to current playlistto have double clicking a song add a song to the end of the current playlist.
Ken BurnsSelectYesto have the NSA automatically pan and zoom photos in slideshows. SelectNoto display photos in slideshows normally.
Slide IntervalSelect how long to display each image in a slideshow before changing to the next.
Account NameType the user name of the account for which you want to change the password.
Old PasswordType the user's current password.
New PasswordCreate a new password for the user. You can type from one to 14 single-byte (no Chinese characters allowed for example) ASCII characters.
Password (Confirm)You must type the exact same password that you just typed in the above field.
LanguageSelect the web configurator language from the drop-down list box.
Go to system administration pageThis link appears when you are logged in as the administrator. Click it to open the advanced administration screens. SeeSection 3.5 on page 63for more on the advanced administration screens.
ApplyClick this to save your changes.
ResetClick this to refresh the screen.
CancelClick this to exit the screen without saving your changes.

3.5 Administration Screens

The System > Administration link displays when you log in as the administrator. Click System > Administration in the Home screen to open the advanced administration screens.

The Status screen is the first advanced administration screen that displays.

Figure 49 Status
ZYXEL NSA221 - Administration Screens - 1

text_image ZyXEL 1 Language: English 2 Status 3 System Information Server Name nsa221 Model Name NSA221 Firmware Version 400AFM0b2p2 MAC Address 00:A0:C5:01:35:51 Media Server Status Enabled FTP Server Status Enabled Web Publishing Status Disabled UPS N/A CPU Usage 20% CPU Temperature 28°C (82.40°F) FAN Speed 0 RPM Memory Usage 24% Used, 60MB/250MB Volume Status Internal Volume Status Name Configuration Disk(s) Disk Usage Healthy HomeDisk RBCD RBCD disk1 0.52% (2.40 GB) "JBOD" 465.14 GB Total 99.48% Free External Volume Status Name File System Disk(s) Disk Usage Message Ready

3.5.1 Global Administration Icons

The icons and language label at the top-right of the screen (1) are visible from most of the administration screens. The following table describes the 'global' icons and labels.

Table 14 Global Labels and Icons

LABEL/ICONDESCRIPTION
LanguageSelect the web configurator language from the drop-down list box.
HelpClick this to open web help specific to the screen you are in.
AboutClick this to view the model name, firmware version and copyright.
HomeClick this to return to the Home screens.
LogoutClick this at any time to exit the web configurator. This is the same as clicking the Logout link at the bottom of the navigation panel.

3.5.2 Navigation Panel

The navigation panel on the left of the screen (2) contains screen links. Click a link to display sub-links. There are no sub-links for the Status screen. Certain screens also contain hyper links that allow you to jump to another screen.

The following table describes the navigation panel screens.

Table 15 Screens Summary

LINKSCREENFUNCTION
StatusThis screen shows system information, the status of the volumes, and the users who are currently using the NSA.
System SettingServer NameSpecify the NSA's server name and workgroup name.
Date & TimeChose a time zone and/or allow the NSA to synchronize with a time server.
StorageVolumeView volume and disk information and create and edit volumes. A volume is a storage area that can span one or more internal disks or a single external (USB) disk.
NetworkTCP/IPAssign the NSA a dynamic or static IP address and DNS information.
UPnP Port MappingConfigure your Internet gateway to allow access from the WAN (Internet) to services on the NSA.
PPPoEConfigure PPPoE settings for a direct Internet connection.
ApplicationsFTP ServerEnable FTP file transfer to/from the NSA, set the number of FTP connections allowed, an FTP idle timeout, and the character set.
Media ServerEnable or disable the sharing of media files and select which shares to share.
Download ServiceHave the NSA handle large file downloads.
Web PublishingLet people use a web browser to access files in shares without logging into the Home screens.
BroadcastingSubscribe the NSA to feeds to download frequently updated digital content like TV programs, radio talk shows, Podcasts (audio files), YouTube videos, or even BitTorrents.
Print ServerView and manage the NSA's list of printers and print jobs.
Copy/Sync ButtonCopy or synchronize files between a USB device and the NSA.
PackageSet up more useful applications in your NSA. The NSA can download multiple packages/files at once and automatically goes through all the installation steps.
Auto Upload - Flickr/YouTubeUpload files in selected shares to your Flickr and/or YouTube accounts.
Auto Upload - FTP UploadrUpload files in selected shares to FTP servers.
SharingUsersView, create and edit administrator and user accounts to let people use the NSA.
GroupsView, create and edit groups. Groups allow you to organize users into specific groups. You can create shares accessible only by the group members.
SharesView, create and edit shares. Shares are shared folders to which you can allow specific users read/write access rights.
MaintenancePowerConfigure power saving settings for the NSA and have the NSA turn itself off and on or reboot according to the schedules you configure.
LogView the NSA's logs and configure how you want to receive the log reports.
ConfigurationBack up and/or restore the NSA configuration file.
SSLConfigure HTTPS and the NSA's SSL certificate.
FW UpgradeUpload/upgrade new firmware to your NSA.
ShutdownRestart the NSA or shut it down.
LogoutClick this to exit the web configurator. This is recommended to prevent unauthorized administrator access to the NSA.

3.5.3 Main Window

The main window (3) shows the screen you select in the navigation panel. It is discussed in the rest of this document.

The Status screen is the first administration screen to display. See Chapter 5 on page 137 for more information about the Status screen.

3.5.4 Status Messages

The message text box at the bottom of the screen (4) displays status messages as you configure the NSA.

3.5.5 Common Screen Icons

The following table explains some icons that appear in several configuration screens.

Table 16 Common Configuration Screen Icons

ICONDESCRIPTION
ZYXEL NSA221 - Common Screen Icons - 1EditClick this to go to a screen where you can change the configuration settings of an entry.
ZYXEL NSA221 - Common Screen Icons - 2DeleteClick this to delete an entry from the list.
ZYXEL NSA221 - Common Screen Icons - 3EditClick this to jump to related item's configuration screen.
ZYXEL NSA221 - Common Screen Icons - 4RefreshClick this to refresh the data for the field or value with which it is associated.
ZYXEL NSA221 - Common Screen Icons - 5UserSee the chapter on user accounts for detailed information on variants of this icon.
[7BWA]ShareSee the chapter on shares for detailed information on variants of this icon.
ZYXEL NSA221 - Common Screen Icons - 6HealthyThis represents a healthy volume.
[γTWC]DegradedThis represents a degraded RAID 1 volume. Replace the faulty disk. If the replacement disk does not contain any partition, the NSA automatically restores the volume. If the replacement disk already contains a volume, you need to delete the volume and then click the Repair icon to fix the degraded RAID volume.
ZYXEL NSA221 - Common Screen Icons - 7DownThis represents a down volume.
ZYXEL NSA221 - Common Screen Icons - 8Scan DiskClick this to scan a hard disk for file system errors.
ZYXEL NSA221 - Common Screen Icons - 9EjectClick this before you remove an external hard drive so that you do not lose data that is being transferred to or from that hard drive.
ZYXEL NSA221 - Common Screen Icons - 10LocateClick this to cause the LED on the external storage device to blink.
ZYXEL NSA221 - Common Screen Icons - 11RepairIf you replace a faulty disk with a disk that contains a volume, you need to delete the volume and then click this to fix the degraded RAID volume.

3.5.6 Session Example (Windows)

Open Windows Explorer and type two back slashes followed by the NSA name or IP address. Initially you can only read and write to the Public, Video, Music, and Photo folders until you create other shares on the NSA. This session is then displayed as shown in the following figure.

ZYXEL NSA221 - Session Example (Windows) - 1

text_image NSA File Edit View Favorites Tools Help Address \\nsa Network Tasks Add a network place View network connections Set up a wireless network for a home or small office Search Active Directory Show icons for networked UPnP devices Name admin Jimmy music photo public video Printers and Faxes

Tutorials

4.1 Overview

This chapter provides tutorials that show how to use the NSA.

  • Creating a Volume, see page 69
  • Deleting a Volume, see page 72
  • File Sharing Tutorials, see page 73
  • Download Service Tutorial, see page 83
  • Broadcatching Tutorial, see page 99
    • Copy and Flickr Auto Upload Tutorial, see page 104
  • FTP Uploadr Tutorial, see page 105
  • Web Configurator's Security Sessions, see page 110
    • Using FTPES to Connect to the NSA, see page 122
    • How to Use the BackupPlanner, see page 123

4.2 Creating a Volume

This section shows you how to create a volume on your NSA.

Creating a volume deletes all existing data in the hard disk. Make sure you have a backup of your existing data before following the steps in this section.

Your NSA has two bays for SATA (Serial Advanced Technology Attachment) hard disks. The JBOD storage method is used if you are using a single hard disk for your NSA.

This JBOD volume shows up in the Storage > Volume screen (Section 7.4 on page 153) as follows.

ZYXEL NSA221 - Creating a volume deletes all existing data in the hard disk. Make sure you have a backup of your existing data before following the steps in this section. - 1

text_image Storage - Volume Internal Volume Status Volume Disk Configuration Disk(s) Capacity Actions Healthy Volume1 RBCD RBCD disk1 0.11% (523.01 MB) Used 465.14 GB Total 99.89% Free Create an Internal Volume External Volume Status Volume File System Disk(s) Capacity Actions There are currently no volumes. Create an External Volume

4.2.1 Creating a RAID 1 Volume

This storage method allows recovery of data if your hard disk fails. To create a RAID 1 volume, you must install two SATA hard disks in your NSA. There are two ways to create a RAID 1 volume:

  • Click the Migrate button - If you already have a SATA hard disk with a volume and you later install a second SATA hard disk in your NSA, use the Migrate button to convert the existing JBOD volume to a RAID 1 volume.
  • Click the Create a SATA volume button - Use this if there are no existing volumes in your NSA.

4.2.2 Migrate Button

Do the following steps to create a RAID 1 volume.

1 Once you install a second SATA hard disk in the NSA, the Storage > Volume screen shows the Migrate button.

ZYXEL NSA221 - Migrate Button - 1

text_image Storage - Volume Internal Volume Status Volume Disk Configuration Disk(s) Capacity Actions Healthy V RBCD MBCD Disk Capacity (JBOD) disk2 74.00 GB Total 1.98% (1.47 GB) Used 98.02% Free Create an Internal Volume

2 Click the Migrate button and you can see the following progress bar. Wait for the RAID 1 volume to be created. This may take quite a while depending on how much data you have in the original volume.

ZYXEL NSA221 - Migrate Button - 2

bar | Progress status | Percentage | | --------------- | ---------- | | progress status | 20% |

4.2.3 Create an Internal Volume Button

If you do not have an existing volume in the Storage > Volume screen, do the following steps to create a RAID 1 volume.

1 In the Storage > Volume screen, click Create an Internal Volume.

ZYXEL NSA221 - Create an Internal Volume Button - 1

text_image Storage - Volume Internal Volume Status Volume Disk Configuration Disk(s) Capacity Actions There are currently no volumes. Create an Internal Volume External Volume Status Volume File System Disk(s) Capacity Actions There are currently no volumes. Create an External Volume

2 In the Disk Configuration screen, you can select the storage method.

  • Type in the Volume Name for your RAID 1 volume. The volume name can be 1 to 31 characters (a-z, 0-9, " " [spaces], "_", and ".").
  • Choose RAID 1 and click Apply.

This deletes all existing data in the SATA hard disk. Make sure you have a backup of any existing data in the hard disk.

ZYXEL NSA221 - Create an Internal Volume Button - 2

text_image Disk Configuration Volume Name RAID 1_Example performance but does not deliver fault tolerance. If one drive falls then all data in the array is lost. RAID1 RBCD RBCD RBCD Provides disk mirroring. Level 1 provides twice the read transaction rate of single disks and the same write transaction rate as single disks. Apply Cancel

The NSA starts creating the volume and you can see the following progress bar. Wait for the RAID 1 volume to be created.

ZYXEL NSA221 - Create an Internal Volume Button - 3

bar | Progress status | Value | | --------------- | ----- | | Progress | 22% |

3 The Storage > Volume screen displays with your RAID 1 volume.

ZYXEL NSA221 - Create an Internal Volume Button - 4

text_image Internal Volume Status Volume Disk Configuration Disk(s) Capacity Actions Resync 0.1% RAID 1_Example ABCD disk1 0.11% (523.03 MB) Used Data Protection (RAID1) disk2 465.14 GB Total 99.89% Free Create an Internal Volume External Volume Status Volume File System Disk(s) Capacity Actions There are currently no volumes.

4.3 Deleting a Volume

Delete an existing volume in your NSA by doing the following steps.

1 In the Storage > Volume screen, select the volume you want to delete and click the delete icon.

ZYXEL NSA221 - Deleting a Volume - 1

text_image Storage - Volume Internal Volume Status Volume Disk Configuration Disk(s) Capacity Actions Healthy Volume1 ABCD disk1 0.11% (523.01 MB) Used 465.14 GB Total 99.89% Free Create an Internal Volume External Volume Status Volume File System Disk(s) Capacity Actions There are currently no volumes. Create an External Volume

2 A confirmation window appears as follows. Click Yes.

ZYXEL NSA221 - Deleting a Volume - 2

text_image Delete Volume 'Volume 1' ALL Data On this Volume will be DELETED. Are you sure you want to DELETE this Volume? Yes No

This deletes all existing data in the volume. Make sure you have a backup of any existing data in the hard disk.

4.4 File Sharing Tutorials

The following sections cover using the NSA for file sharing. This chapter assumes you have already followed the Quick Start Guide instructions to perform initial setup and configuration (so you have a working volume). See the rest of this User's Guide for details on configuring the NSA's various screens.

4.4.1 Creating a User Account

Bob wants to create accounts for his sons Jimmy and Kevin. This is how he would do it.

1 Log into the NSA web configurator (see Section 3.3 on page 48) and click System > Administration to go to the configuration screens.

ZYXEL NSA221 - Creating a User Account - 1

text_image Settings Administration System

2 Click Sharing > Users to open the Users screen. Then click Add User.

ZYXEL NSA221 - Creating a User Account - 2

text_image Users Add User Search Edit User Delete User Info Display Number 20 Go to Page 1 Page 1 Of 1 User Type Username Bob admin Page 1 Of 1

3 Configure the screen as follows and write down the username and password to give to Jimmy. If the username and password are the same as Jimmy's Windows login, Jimmy will not need to enter a username and password when he logs into his share from his computer. Set the Account Type to User so Jimmy doesn't get to configure the whole NSA. Click Apply to create the account.

ZYXEL NSA221 - Creating a User Account - 3

text_image Add User Username Jimmy New Password **** Password (Confirm) **** Account Type Administrator User Available Group(s) children family Group Membership Add Selected Group(s) → Group Membership ← Remove Selected Group(s) Apply Cancel

4 The account now displays in the Users screen.

ZYXEL NSA221 - Creating a User Account - 4

text_image Page 1 Of 1 User Type Username Bob Jimmy admin Page 1 Of 1

Now that Bob has created Jimmy's account, he can go through the steps again to create another account for Kevin. After both accounts are created, he can go to Section 4.4.2 on page 76 to create shares for Jimmy and Kevin.

4.4.2 Creating a Share

Suppose Bob has already created separate accounts for his sons Jimmy and Kevin. Now Bob wants to create a share for each son. He also wants to make sure that each son can only access his own share (to keep them from deleting each other's files). This is how he would do it.

1 In the NSA's administration web configurator screens, click Shares > Add Share. Click Add Share to create a new share.

ZYXEL NSA221 - Creating a Share - 1

text_image Shares Add Share Recycle Bin Edit Share Delete Share Browser Status Share Type Share Name Share Path Share Owner Permission Type pre-defined video volume/video admin public pre-defined photo volume/photo admin public pre-defined music volume/music admin public built-in public volume/public admin public built-in admin volume/admin admin private

2 Specify a name for the share and select which volume it should be on. Configure the screen as follows. Then click Edit.

ZYXEL NSA221 - Creating a Share - 2

text_image Add Share Share Name Jimmy Volume volume ( 183.26 GB ) Make this share owned by admin Enable This Share Enable Recycle Bin Publish this share to Media Server Publish this share to Web Share Access Advanced Edit Apply Cancel

3 Configure the screen as follows to give Jimmy full access right to the share. Then click Apply to create the share.

ZYXEL NSA221 - Creating a Share - 3

text_image Share Access Configuration Available User(s)/Group(s) Bob Kevin anonymous-ftp everyone children family Authority : Full Jimmy admin Note: You may select multiple users/groups by using Ctrl + Click. Apply Cancel

Now that Bob has created Jimmy's share, he can go through the steps again to create another share for Kevin.

4.4.3 Creating a Group

After creating user accounts for Jimmy and Kevin, Bob wants to create a group for his sons and another one for the parents. Bob can assign access rights to his sons' group for certain shares such as a cartoons share and allow only the parents' group to access the scary movie share. This is how he would create the group.

1 In the NSA's administration web configurator screen, click Groups > Add Group.

ZYXEL NSA221 - Creating a Group - 1

text_image Groups Add Group Search Edit Group Delete Selected Group(s) Display Number 20 Go to Page 1 Page 1 Of 1 Status Group Name Page 1 Of 1

2 Specify a name for the group. Select the user(s) you want to add to the group from the Available User(s) list and click Add Selected User(s). Configure the screen as follows. Then click Apply to create the group.

ZYXEL NSA221 - Creating a Group - 2

text_image Add a New Local Group Group Name Children Available User(s) Group Membership Bob admin Simmy Kimv Group Membership Add Selected User(s) → Remove Selected User(s) Apply Cancel

Now that Bob has created a group for Jimmy and Kevin, he can go through the steps again to create another group for the parents. Then he can see the rest of the tutorials for how to use the groups in assigning access rights to shares.

4.4.4 Accessing a Share From Windows Explorer

If you map a NSA share (where data is stored) to a Windows network drive, you can use Windows Explorer to transfer files to and from the NSA as if it was another folder on your computer. Here he maps Jimmy's share to Jimmy's computer.

1 Start Windows Explorer and go to the NSA's server name ("nsa221" is the default) or IP address.
2 Click Tools > Map Network Drive.

ZYXEL NSA221 - Accessing a Share From Windows Explorer - 1

text_image NSA File Edit View Favorites Tools Help Address \nsa Folders Map Network Drive... Disconnect Network Drive... Synchronize... Folder Options...

3 Select the network drive that you want to map the NSA to from the Drive list box. This example uses I. Then browse to and select the share on the NSA. Click Finish.

ZYXEL NSA221 - Accessing a Share From Windows Explorer - 2

text_image Map Network Drive Windows can help you connect to a shared network folder and assign a drive letter to the connection so that you can access the folder using My Computer. Specify the drive letter for the connection and the folder that you want to connect to: Drive: I: Folder: Browse... Example: \\server\share ✓ Reconnect at logon Connect using a different user name. Sign up for online storage or connect to a network server. < Back Finish Cancel

ZYXEL NSA221 - Accessing a Share From Windows Explorer - 3

text_image Browse For Folder Select a shared network folder Nsa Nsa Nsa admin Jimmy music photo public video Printers and Faxes Make New Folder OK Cancel

4 Enter the username and password for Jimmy's account and click OK. You do not need to do this if the username and password are the same as Jimmy's Windows login.

ZYXEL NSA221 - Accessing a Share From Windows Explorer - 4

text_image Connect to nsa localdomain Connecting to nsa User name: Password: Remember my password OK Cancel

5 After the mapping is done, you can then simply copy and paste or drag and drop files from/to your local computer's drives to or from this network folder. Just like the NSA's share was another folder on your computer.

ZYXEL NSA221 - Accessing a Share From Windows Explorer - 5

text_image File Edit View Favorites Tools Help Address I:\ Folders Desktop My Computer ZyXEL_XP (C:) ZyDATA (D:) ZyXEL_Vista (E:) DVD Drive (F:) jasmine (G:) Jimmy on 'NSA (Nsa)' (I:) zytw on 'zyxel.com' (L:) temp on 'zyxel.com\zytw' (T:) TW-archive on 'tw1477-testpc' (Y:) TWBackup on 'tw1477-testpc' (Z:) Control Panel

Now that Bob has mapped Jimmy's share to Jimmy's computer, he can go through the steps again to map Kevin's share to Kevin's computer.

4.4.5 Accessing a Share Using FTP

You can also use FTP to access the NSA. Suppose Jimmy is temporarily using a different computer and wants to access his share without mapping it to the computer. This is how he would do it.

1 Open the FTP client (Windows Explorer is used here) and type "ftp://username@server" where "username" is the account's username and "server" is the NSA's IP address or server name.

ZYXEL NSA221 - Accessing a Share Using FTP - 1

text_image File Edit View Favorites Tools Help Address ftp://Jimmy@nsa Folders Desktop My Documents My Computer

2 Enter your password and click Login.

ZYXEL NSA221 - Enter your password and click Login. - 1

text_image Log On As Could not login to the FTP server with the user name and password specified. FTP server: nsa User name: Jimmy Password: ••••• After you log on, you can add this server to your Favorites and return to it easily. FTP does not encrypt or encode passwords or data before sending them to the server. To protect the security of your passwords and data, use Web Folders (WebDAV) instead. Learn more about using Web Folders. Log on anonymously Save password Log On Cancel

3 Now you can access files and copy files from/to your local computer's drives to or from this network folder.

ZYXEL NSA221 - Now you can access files and copy files from/to your local computer's drives to or from this network folder. - 1

text_image ftp://nsa/ File Edit View Favorites Tools Help Address ftp://nsa/ Name Size Type Modified music File Folder 9/14/2008 12:33 PM photo File Folder 9/19/2008 10:17 AM public File Folder 8/30/2008 1:57 PM video File Folder 10/9/2008 9:05 AM Other Places Internet Explorer My Documents My Network Places

4.4.6 Accessing a Share Through the Web Configurator

You can browse and access files through the web configurator.

1 Log into the NSA web configurator (see Section 3.3 on page 48) using the appropriate user name and password (this example uses Jimmy's) and click File Browser. Click a share (the Jimmy share in this example) to see the top level of the share's contents.

ZYXEL NSA221 - Accessing a Share Through the Web Configurator - 1

text_image ZyXEL | File Browser Welcome,Jimmy NSA221 Jimmy Camp Games Homework music photo public video Jimmy Name Size Last Modified Camp 10-02-2010 15:02 Games 10-02-2010 15:02 Homework 10-02-2010 15:01

2 Click a folder's file name to browse the folder. You can open files or copy them to your computer. You can also create new folders and upload additional files to the share.
3 Click the logout icon when your are done.

4.5 Download Service Tutorial

This tutorial covers using the NSA to download a file from the Internet. Use this same procedure for BitTorrent downloads as well as regular HTTP (web) and FTP downloads. See Section 9.11.2 on page 207 for more on the download service.

1 Open your Internet browser (this example uses Internet Explorer).
2 Find a download link for the file you want. In this example, www.zyxel.com has a Download Now link for downloading a datasheet for ZyXEL's GS-2024 (a device for making phone calls over the Internet).

ZYXEL NSA221 - Copying/Pasting a Download Link - 1

text_image Download Library USER'S GUIDE Model: GS-2024 Version: 3.80 Language: English OS: N/A Release Date: 06-20-2008 Size: 7 MB Description: error correction Download Now

Note: Make sure the link opens either the file you want or a pop-up window about how to handle the file.

Note: It is also OK for the link to open a .torrent file. If you are redirected to a screen that says the download should start in a few seconds, there may be a link to click if the download does not start automatically. See if that link opens the file or the pop-up window.

3 Right-click the download link and select Copy Shortcut in Internet Explorer (or Copy Link Location in Firefox).

ZYXEL NSA221 - Copying/Pasting a Download Link - 2

text_image Description: error correction Download Open Open in New Tab Open in New Window Save Target As... Print Target Cut Copy Copy Shortcut Paste

4 Log into the NSA web configurator (see Section 3.3 on page 48) using the administrator account and click Application Zone and the Application Zone > Download Service link.

ZYXEL NSA221 - Copying/Pasting a Download Link - 3

text_image ZyXEL | Application Zone Home ? Help E Logout Welcome, admin Name Description Management Page Broadcatching Broadcasting has the NSA download frequently updated digital contents Applications > Broadcasting Copy/Sync Button The COPY/SYNC button on the front panel allows you to copy or synchron Applications > Copy/Sync Button Download Service Download service allows you to download files from the Internet directly Applications > Download Service FTP Server Use FTP or FTPES (FTP over Explicit TTL/SSL) to upload files to the NSA:A Applications > FTP Server FTP Uploadr The FTP Uploadr feature uploads files stored in the NSA to FTP servers. Flickr Uploadr The auto upload feature uploads media files stored in the NSA to the Flickr Applications > Auto Upload > FTP Uploadr Media Server Lets anyone on your network play video, music, and photos from the NSA Applications > Auto Upload > Flickr/YouTub Print Server Connect a printer to the NSA's USB port to let multiple computers on your Applications > Media Server Web Publishing Web publishing lets you 'publish' shares (containing folders and files) on Youtube Uploadr The auto upload feature uploads media files stored in the NSA to the Your Applications > Auto Upload > Flickr/YouTub iTunes Server Let anyone on your network use iTunes to play music and video files in th

5 Click Add.

ZYXEL NSA221 - Copying/Pasting a Download Link - 4

text_image Download Service Download service allows you to download files from the Internet directly to the NSA. Enable Download Service Apply Enable Download Notify Apply Add Preferences Refresh Delete Pause Resume Task Info Active (0) Inactive (1) Completed (7) Error

6 Right-click the URL field and select Paste.

ZYXEL NSA221 - Right-click the URL field and select Paste. - 1

text_image Add Download Task From URL Source URL Torrent File Undo Cut Browse... Location of Downloaded Files Paste Delete Admi Download Move completed downloads to public Select All / Edit Note: 1. BitTorrent jobs are stored in /public/incoming. 2. HTTP/FTP jobs are stored in /public. 3. All jobs triggered by RSS channels create the subfolder in /public using the channel name where it store all files downloaded from that channel. Caution: Do not use the NSA for illegal downloads. Illegal downloading or sharing of files can result in severe civil and criminal penalties. You are subject to the restrictions of copyright laws and any other applicable laws and will bear the consequences of any infringements thereof. ZyXEL takes NO responsibility or liability for your use of the download service feature. Apply Cancel

7 The URL displays in the URL field. Click Apply.

ZYXEL NSA221 - The URL displays in the URL field. Click Apply. - 1

text_image Add Download Task From URL Source URL 941_20080620_3.80-GS-2024_eWC-UG_v3-80_Ed1_2008-06-19.pdf&model=GS-2024# Torrent File Browse... Location of Downloaded Files Share Path Put incomplete downloads in admin /download Move completed downloads to public / Edit Note: 1. BitTorrent jobs are stored in /public/incoming. 2. HTTP/FTP jobs are stored in /public. 3. All jobs triggered by RSS channels create the subfolder in /public using the channel name where it store all files downloaded from that channel. Caution: Do not use the NSA for illegal downloads. Illegal downloading or sharing of files can result in severe civil and criminal penalties. You are subject to the restrictions of copyright laws and any other applicable laws and will bear the consequences of any infringements thereof. ZyXEL takes NO responsibility or liability for your use of the download service feature. Apply Cancel

8 After a few moments, the download task appears in the Download Service screen's Active tab.

The download appears in the Completed tab when it is done. By default the NSA stores all downloads in the admin share's download folder. See Section 4.4.4 on page 78, Section 4.4.5 on page 80, or Section 4.4.6 on page 82 for how to access a share.

In addition to copying and pasting a download link to the Download Service screen, you can also install a link capture browser plugin in your web browser. Use the plugin to easily add a download link to the NSA's download service. See Section 9.11.3 on page 207 for more on the link capture browser plugin.

Note: At the time of writing the plugin supports Internet Explorer 6.0/7.0 and Mozilla Firefox 2.0/3.0; it does not support Windows 7.

Internet Explorer

1 Open the folder containing the link capture browser plugin.
2 Double-click on the plugin to display the following screen. Click I Agree to begin installation.

ZYXEL NSA221 - Internet Explorer - 1

text_image NSA Link Capture IE Plugin Setup License Agreement Please review the license terms before installing NSA Link Capture IE Plugin. Press Page Down to see the rest of the agreement. End-User License Agreement for iLink Capturei" WARNING: ZyXEL Communications Corp. IS WILLING TO LICENSE THE ENCLOSED SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT. PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM. IF YOU DO NOT AGREE TO THESE TERMS, THEN ZyXEL, INC. IS UNWILLING TO LICENSE THE SOFTWARE TO YOU, IN WHICH EVENT YOU SHOULD RETURN THE UNINSTALLED SOFTWARE AND PACKAGING TO THE PLACE FROM WHICH IT WAS ACQUIRED, AND YOUR MONEY WILL BE REFUNDED. If you accept the terms of the agreement, click I Agree to continue. You must accept the agreement to install NSA Link Capture IE Plugin. Nullsoft Install System v2.35 I Agree Cancel

3 Select a location to save the plugin and click Install. Close the screen once the installation is complete.

ZYXEL NSA221 - Internet Explorer - 2

text_image NSA Link Capture IE Plugin Setup Choose Install Location Choose the folder in which to install NSA Link Capture IE Plugin. Setup will install NSA Link Capture IE Plugin in the following folder. To install in a different folder, click Browse and select another folder. Click Install to start the installation. Destination Folder C:\Program Files\ZyXEL\Link Capture Browse... Space required: 25.0KB Space available: 30.4GB Nullsoft Install System v2.35 < Back Install Cancel

4 Open Internet Explorer and locate a download link. In this example, www.zyxel.com has a Download Now link for downloading a user's guide for ZyXEL's NBG410W3G (a 3G wireless router). Right-click on the download link and select NSA Setting.

ZYXEL NSA221 - Internet Explorer - 3

text_image Download Library USER'S GUIDE Model: NBG410W3 Version: 4-03_ed1 Language: English OS: N/A Release Date: 06-06-2008 Size: 10 MB Description: Open Open in New Window Save Target As... Print Target Cut Copy Copy Shortcut Paste Add to Favorites... NSA Setting Send to NSA Properties Download Now

5 Enter the NSA's web address (nsa221 by default) and click Apply. A warning message displays asking for confirmation. Click OK to apply the setting.

ZYXEL NSA221 - Internet Explorer - 4

text_image NSA Link Capture - Microsoft Internet Explorer provided by Z... NSA Domain Name/IP Address nsa Apply

Firefox

1 Open Firefox.
2 Open the folder containing the link capture browser plugin.
3 To install the plugin, drag and drop the plugin to Firefox.

ZYXEL NSA221 - Firefox - 1

text_image Mozilla Firefox File Edit View History Bookmarks Tools Help Yahoo!奇摩字典 Gmail ZyXEL NSA (Untitled) Firefox File Edit View Favorites Tools Help Address:\Jasmine\NSA\Firmware\3.00(AFB_0)b2_with_LinkCapture\linkcapture\Firefox Go Name: install.xpi Size Type 17 KB XPI File Firefox install.xpi XPI File Modified: 7/16/2008 2:13 PM Size: 16.4 KB Attributes: (normal) Type: XPI File Size: 16.4 KB 16.4 KB My Computer

4 The following screen displays. Click Install Now.

ZYXEL NSA221 - Firefox - 2

text_image Software Installation Only install add-ons from authors whom you trust. Malicious software can damage your computer or violate your privacy. You have asked to install the following item: install.xpi (Author not verified) file:///D:/My%20Documents/NSA/Firmware/3.00(AFB.0)b2_with_Link Install Now Cancel

5 You need to restart Firefox after the installation.

ZYXEL NSA221 - Firefox - 3

text_image Add-ons Get Add-ons Extensions Themes Plugins Installation i Restart Firefox to complete your changes. Restart Firefox Link Capture 0.1 Restart to complete the installation.

6 When Firefox restarts, a message displays to show the installation succeeded. The plugin is installed as an extension in Add-ons. Click Options to configure the NSA's web address.

ZYXEL NSA221 - Firefox - 4

text_image Add-ons Get Add-ons Extensions Themes Plugins 1 new add-on has been installed. Link Capture 0.1 Adds a context menu item to automatically send URLs to the NSA's Download Service Options Disable Uninstall Find Updates

7 Enter the NSA's web address (nsa221 by default) and click OK.

ZYXEL NSA221 - Firefox - 5

text_image NSA Link Capture NSA Domain Name/IP Address nsa OK Cancel

Once you install the plugin, you may begin sending download links to the NSA from your web browser. This example shows how to send a download link to the NSA's download service using the link capture browser plugin.

1 Open your Internet browser (this example uses Firefox).
2 Find a download link for the file you want. In this example, www.zyxel.com has a Download Now link for downloading a user's guide for ZyXEL's P-660W-T1 (an ADSL router).

ZYXEL NSA221 - Using the Link Capture Browser Plugin - 1

text_image Download Library USER'S GUIDE Model: P-660W-T1 v2 Version: 3-40v2 Language: English OS: N/A Release Date: 06-27-2008 Size: 8 MB Description: Download Now

3 Right-click on the download link and select Send to NSA.

ZYXEL NSA221 - Using the Link Capture Browser Plugin - 2

text_image Download Now Open Link in New Window Open Link in New Tab Bookmark This Link Save Link As... Send Link... Copy Link Location Send to NSA Properties

4 The login screen shows up. Enter your NSA's login information and click Login to send the link to the download service. A confirmation message displays.

ZYXEL NSA221 - Using the Link Capture Browser Plugin - 3

text_image http://nsa-ja - Mozilla Firefox Successfully added file "http://www.zyxel.com /web/support_download_detail.php?file=200708311348412007083113351820040811211941_ P-660W-Tv2_UG_V3-40_Ed2_2008-06-25.pdf&model=P-660W-T1%20v2" to download service

5 Log into the NSA web configurator (see Section 3.3 on page 48) using the administrator account and click Application Zone and the Application Zone > Download Service link.

ZYXEL NSA221 - Using the Link Capture Browser Plugin - 4

text_image ZyXEL | Application Zone Welcome, admin Name Description Management Page □ Broadcasting Broadcasting has the NSA download frequently updated digital contents Applications > Broadcasting □ Copy/Sync Button The COPY/SYNC button on the front panel allows you to copy or synchron Applications > Copy/Sync Button □ Download Service Download service allows you to download files from the Internet directly to Applications > Download Service □ FTP Server Use FTP or FTPES (FTP over Explicit TTL/SSL) to upload files to the NSA: Applications > FTP Server □ FTP Uploadr The FTP Uploadr feature uploads files stored in the NSA to FTP servers. Applications > Auto Upload > FTP Uploadr □ Flickr Uploadr The auto upload feature uploads media files stored in the NSA to the Flickr □ Media Server Lets anyone on your network play video, music, and photos from the NSA Applications > Auto Upload > Flickr/YouTub □ Print Server Connect a printer to the NSA's USB port to let multiple computers on your Applications > Media Server □ Web Publishing Web publishing lets you 'publish' shares (containing folders and files) on □ Youtube Uploadr The auto upload feature uploads media files stored in the NSA to the You Applications > Auto Upload > Flickr/YouTub □ iTunes Server Let anyone on your network use iTunes to play music and video files in th

6 The download task appears in the Download Service screen's Active or Queue tab. It may appear in the Completed tab if the NSA already finished downloading the file or it may appear in the Error tab if the NSA failed to download the file.

By default the NSA stores all downloads in the admin share's download folder. See Section 4.4.4 on page 78, Section 4.4.5 on page 80, or Section 4.4.6 on page 82 for how to access a share.

4.5.4 Configuring the Download Service Preferences

Once you added a list of download tasks to the NSA (see Section 4.5.1 on page 83 and Section 4.5.3 on page 91), you can have the NSA download files during a specific time period of the day. You can also configure the BitTorrent settings to control bandwidth and optimize download efficiency.

Say you have the NSA turned on all the time, but you only want the NSA download files at night. Here is how you use the download period control feature to set the time range.

1 Click Applications > Download Service > Preferences to open the General Settings screen.
2 Select Enable Download Period Control and use the arrows to adjust the time period from 23:30 to 09:00. Click Apply to save your changes. The NSA only downloads files within this 9.5-hour period every day.

ZYXEL NSA221 - Configuring the Download Service Preferences - 1

text_image Preferences General Settings BitTorrent Location of Downloaded Files Share Path Put incomplete downloads in admin /download Move completed downloads to admin /download Edit Note: 1. BT Jobs will be stored in /admin/download/incoming 2. HTTP/FTP Jobs will be stored in /admin/download 3. Jobs triggered by RSS Channel will create the Channel Name to /admin/download Download Period Control Enable Download Period Control Download Service is active in the specified time period (hh:mm - hh:mm) 23 30 09 00 Apply Reset Cancel

Note: If you configure the Power On/Off Schedule feature in the Power Management screen, make sure your active download period does not conflict with the power-off period.

Note: If power failure occurs during the active download period, the NSA will verify whether the downloaded files were damaged. If a file is corrupted, the NSA will download the file again. If the file is intact but not completely downloaded, the NSA will resume the download task after it restarts.

3 When it is not the download time, you see a message in the Download Service screen, indicating the active download period.

ZYXEL NSA221 - Configuring the Download Service Preferences - 2

text_image Download Service Download service allows you to download files from the Internet directly to the NSA. Enable Download Service Apply Enable Download Notify Apply Add Preferences Refresh Delete Pause Resume Task Info :Downloading :Seeding Note : Download Service is not active. It will be active between 23:30 - 09:00. Active (U) Inactive (I) Completed (J) Error (O) Status Name Complete(%) Seeds Peers Download Speed Upload Speed Time Left Priority

Click Applications > Download Service > Preferences > BitTorrent to open the following screen. Enter the information below and then click Apply.

ZYXEL NSA221 - Configuring the Download Service Preferences - 3

text_image Preferences General Settings BitTorrent Note: For Distributed Hash Table (DHT) support, the BitTorrent service will also attempt to open the following UDP port: 9089 Port Number 9090 Max. Download Rate 0 KB/s (0=No Limit) Max. Upload Rate 20 KB/s (0=No Limit) Maximum Number of Active Torrents 3 Maximum Number of Seeding Jobs 1 Maximum Number of Active Connections 500 Keep Sharing While: ✓ Upload/Download Ratio is ≡ 100 % (Enter -1 for unlimited ratio. Enter 0 to ignore ratio.) ☐ Or Seeding Time is ≡ 0 minutes (Enter -1 for unlimited seeding time. Enter 0 to ignore seeding time.) Edit IP Filter Apply Reset Cancel

Here is a list of BitTorrent settings you want to configure for your NSA:

- Limit the maximum upload rate to 20 KB/s.

Enter this value in the Max. upload rate field.

- Actively download three torrent files but only upload one at a time.

Enter 3 in the Maximum Number of Active Torrents field and enter 1 in the Maximum Number of Seeding Jobs field.

- Keep sharing until the NSA has shared equal or greater amount of the downloaded files.

Select the check box and enter 100 in the Upload/Download Ratio field.

- Click Edit IP Filter. Use an online IP filter table from http://www.bluetack.co.uk/config/level1.gz for example to protect BitTorrent downloads.

Enter the URL in the Update IP Filter from the Internet Every Week field.

ZYXEL NSA221 - Configuring the Download Service Preferences - 4

text_image Edit IP Filter Enable IP Filter ( Last Update Time : N/A ) Update IP Filter Table File from the Internet Every Week URL http://www.bluetack.co.uk/config/level1.gz Upload IP Filter Table Browse... Upload Download Current IP Filter Table Note: Please upload your list( *.txt, *.dat, *.gz, *.tgz or *.tar.gz ) here. It will be saved as /admin/download/ipfilter.dat. Apply Cancel

4.5.5 Using Download Service Notification

Use an RSS feed reader on your computer to keep track of files the NSA has downloaded. The following examples show how to subscribe to the NSA's download service notifications. See Section 9.11.4 on page 208 for more on download service notifications.

Some RSS readers may not support the NSA's download service notifications. For example, Google Reader cannot support this feature if the NSA has a private IP address.

Note: It is recommended to subscribe to the download service notifications using the built-in reader in Internet Explorer 7 or higher, or Firefox.

You have to activate this feature in the Download Service screen. Click Applications > Download Service to open the following screen. Select Enable Download Notify and click Apply.

ZYXEL NSA221 - Using Download Service Notification - 1

text_image Download Service Download service allows you to download files from the Internet directly to the NSA. Enable Download Service Apply Enable Download Notify Apply Add Preferences Refresh Delete Pause Resume Task Info

Internet Explorer 7 Example

1 After you activate download service notification, click the RSS feed icon.

ZYXEL NSA221 - Internet Explorer 7 Example - 1

text_image Download Service Download service allows you to download files from the Internet directly to the NSA Enable Download Service Apply Enable Download Notify Apply Add Preferences Refresh Delete Pause Resume Task Info

2 The following screen displays. Select Subscribe to this feed.

ZYXEL NSA221 - Internet Explorer 7 Example - 2

text_image Download Notify - Windows Internet Explorer http:// 45/zyxel/cgi-bin/dlnotify File Edit View Favorites Tools Help Download Notify Download Notify You are viewing a feed that contains frequently updated content. When you subscribe to a feed, it is added to the Common Feed List. Updated information from the feed is automatically downloaded to your computer and can be viewed in Internet Explorer and other programs. Learn more about feeds. Subscribe to this feed

3 The following screen displays. Click Subscribe.

ZYXEL NSA221 - Internet Explorer 7 Example - 3

text_image Internet Explorer Subscribe to this Feed When you subscribe to a feed, it is automatically added to the Favorites Center and kept up to date. Name: Download Notify Create in: Feeds New folder Subscribe Cancel Your computer will periodically check online for updates to subscribed feeds, even when Internet Explorer is not running. What's a feed?

4 Click the Favorite icon on your browser and select the Feeds tab to check the updates of your NSA's download list.

ZYXEL NSA221 - Internet Explorer 7 Example - 4

text_image Download Notify - Windows Internet Explorer http:// .45/zyxel/cgi-bin/dlnotify File Edit View Favorites Tools Help Download Notify Favorites Feeds History Microsoft Feeds Download Notify

Firefox Example

1 After you activate download service notification, click the RSS feed icon.

ZYXEL NSA221 - Firefox Example - 1

text_image Download Service Download service allows you to download files from the Internet directly to the NSA. Enable Download Service Apply Enable Download Notify Apply Add Preferences Refresh Delete Pause Resume Task Info

2 The following screen displays. Select Live Bookmarks from the drop-down list and click Subscribe Now.

ZYXEL NSA221 - Firefox Example - 2

text_image Download Notify - Mozilla Firefox File Edit View History Bookmarks Tools Help http:// .45/zyxel/cgi-bin/dlnotify Subscribe to this feed using Live Bookmarks Always use Live Bookmarks to subscribe to needs. Subscribe Now

3 The following screen displays. Select Bookmarks Menu and click Add.

ZYXEL NSA221 - Firefox Example - 3

text_image Add Live Bookmark Name: Download Notify Create in: Bookmarks Menu Add Cancel

4 From the Firefox's Bookmarks Menu, select Download Notify to check the updates of your NSA's download list.

ZYXEL NSA221 - Firefox Example - 4

text_image Download Notify - Mozilla Firefox File Edit View History Bookmarks Tools Help Bookmark This Page Ctrl+D Subscribe to This Page... Bookmark All Tabs... Ctrl+Shift+D Organize Bookmarks... Ctrl+Shift+B Bookmarks Toolbar Get Bookmark Add-ons Download Notify File1.txt File2.txt Open "Download Notify" Open All in Tabs Share path: admin/download

4.6 Broadcasting Tutorial

Use broadcasting to have the NSA download frequently updated digital content like TV programs, radio talk shows, Podcasts (audio files), and blogs. This example shows how to subscribe the NSA to the CNET TV Internet television channel. See Section 9.8 on page 194 for more on the broadcasting service.

1 Open your Internet browser (this example uses Firefox).
2 Find the link for the RSS feed containing the channel you want to add. In this example, http://reviews.cnet.com/4520-11455_7-6333605-1.html has an RSS link for subscribing to the CNET Live podcast. However this is not the link for the actual RSS feed. Click the link to go to another screen that has RSS feed links.

ZYXEL NSA221 - Broadcasting Tutorial - 1

text_image CNET Podcast Central - CNET.com - Windows Internet Explorer http://www.cnet.com/1990-11455_1-6333605-1.html File Edit View Favorites Tools Help CNET Podcast Central - CNET.com CNET LIVE CNET live features hosts Brian Cooley and Tom Merritt sharing their expertise and having fun doing it. The two tech experts take calls, emails, and video questions, in order to help viewers get the most out of their technology. The show also features regular segments like Insider Secrets, Free Download of the Week, and best of the Web, helping viewers keep on top of the latest tech trends. Hosted by: Brian Cooley Brian Cooley is CNET's senior pundit, seen frequently on CNN, ABC News, CNBC as well on the TV screens in most major tech retailers around the U.S. He also hosts CNET's Car Tech videos. SUBSCRIBE NOW! Subscribe to this podcast using an RSS reader other than iTunes Subscribe to this podcast using iTunes View the latest episode Related links: CNET Live CNETs CNETs CNETs CNETs CNETs CNETs CNETs CNETs CNETs CNETs CNETs CNETs CNETs CNETs CNETs CNETs CNETs CNETs CNETs CNETs CNETs CNETs CNETs CNETs CNETs CNETs CNETs CNETs CNETs CNETs CNETs CNETs CNETs CNETs

Note: Make sure the link goes to the actual RSS feed instead of to another list of links or information about the channel.

One way to test this is by clicking the link. Clicking an actual RSS feed link opens a screen of XML code (in browsers without an RSS feed aggregator) or a window where you can add the RSS feed (in browsers with an RSS feed aggregator).

3 Right-click the download link and select Copy Link Location in Firefox (or Copy Shortcut in Internet Explorer).

ZYXEL NSA221 - Broadcasting Tutorial - 2

text_image CNET Live - powered by FeedBurner - Windows Internet Explorer http://feeds.feedburner.com/cnet/cnetlive?tag=podc_bg%3bpodc_Itside File Edit View Favorites Tools Help CNET Live - powered by FeedBurner A podcast is rich media, such as audio or video, distributed via RSS. Feeds like this one provide updates whenever there is new content. FeedBurner makes it easy to receive content updates in popular podcatchers. Learn more about syndication and FeedBurner... Subscribe Now! ...with web-based podcatchers. Click your choice below: + MY Yahoo! + neusgator + netvibes + Google + Pageflakes + ODEO + Podnova ...with iTunes: Add to iTunes ...with something else (copy this address): http://cnetlivepodcast.cnettv.com/ Get more info on other podcatchers: GET JUICE GET FIREANT doppler NIRIIG UNPODDER GET CIE P O D View Feed XML Embed t Open Open in New Tab Open in New Window Save Target As... Print Target Cut Copy Shortcut Copy Shortcut Add to Favorites... Properties Current Feed Content December 11, 2008 Posted: Thu, 11 Dec 2008 02:32:14 PST Play Now

4 Log into the NSA web configurator (see Section 3.3 on page 48) using the administrator account and click Administration > Applications > Broadcatching.
5 Click Add Channel.

ZYXEL NSA221 - Broadcasting Tutorial - 3

text_image Broadcasting Add Channel Delete Channel Refresh Channel Edit Channel Channel Name Item Name Published Date Description Actions :Completed :Seeding :Downloading :Queued :Paused :Error :Missing File :Start downloading :Delete Item

6 Right-click the URL field and select Paste.

ZYXEL NSA221 - Broadcasting Tutorial - 4

text_image Subscribe to Channel Feed Please enter the url address of the feed you want to subscribe to Undo Cut Conv Paste Delete Policy Download Policy Download All Items Delete Policy Manual Keep last Select All DownloadHelper

7 The URL displays in the URL field.
8 Select a policy for what items to download. This example uses Manually Choose Items for Download so you will be able to select individual items to download later.
9 Select a policy for what items to delete. This example keeps the most recent 10 items.
10 Click Apply.

ZYXEL NSA221 - Broadcasting Tutorial - 5

text_image Subscribe to Channel Feed Please enter the url address of the feed you want to subscribe to http://feeds.feedburner.com/cnet/cnetlive?formal=xml Download Policy Manually Choose Items for Download Delete Policy ○ Manual ● Keep last 10 of items Location of Downloaded Files Share Path Put incomplete downloads in admin /download Move completed downloads to public / Edit Note: 1. BitTorrent jobs are stored in /public/incoming. 2. HTTP/FTP jobs are stored in /public. 3. All jobs triggered by RSS channels create the subfolder in /public using the channel name where it store all files downloaded from that channel. Apply Cancel

11 After a few moments, the channel appears in the Broadcasting screen where you can select items you want to download. The NSA saves the items you download in a folder named after the channel. By default, the channel folders are created in the admin share's download folder. The NSA's media server feature makes it easy for users on your network to play the broadcasting files you download. See Section 9.11.1 on page 205 for more on the media server.

4.7 Printer Server Tutorial

Do the following to have the NSA let computers on your network share a printer. See www.zyxel.com for a list of compatible printers.

1 Make sure the NSA is on and the SYS light is on steady (not blinking).
2 Use a USB cable to connect the printer's USB port to one of the NSA's USB ports. Make sure the printer is also connected to an appropriate power source.

ZYXEL NSA221 - Printer Server Tutorial - 1

flowchart
graph TD
    A["Desktop Computer"] --> B["Switch"]
    C["Desktop Computer"] --> B
    D["Desktop Computer"] --> B
    B --> E["USB PRINTER"]
    E --> F["Printer"]
    B --> G["NSA"]

3 Turn on the printer.
4 The NSA detects the printer after a few moments.

5 On your computer, open your CIFS file sharing program (Windows Explorer for example) and browse to the NSA. Double-click the printer's icon.

ZYXEL NSA221 - Printer Server Tutorial - 2

text_image 192.168.1.2 File Edit View Favorites Tools Help Back Search Folders Address 192.168.1.2 192.168.1.2 Select an item to view its description. Name Comment admin Canon_PRT_1 music photo public USB-Card-IntelligentStick-1-001 Canon_PRT_1

6 If you get a warning screen, click the option that lets you continue (Yes in this example).

ZYXEL NSA221 - Printer Server Tutorial - 3

text_image Printers Before you can use the printer '\192.168.1.2\Canon_PRT_1,' it must be set up on your computer. Do you want Windows to set up the printer and continue this operation? Yes No

7 If your computer does not already have the printer's driver installed, you will need to install it. In this example, click OK.

ZYXEL NSA221 - Printer Server Tutorial - 4

text_image Connect to Printer The server on which the printer resides does not have the correct printer driver installed. If you want to install the driver on your local computer, click OK, OK Cancel

8 Use the wizard screens to install the printer driver on the computer. You may need to get the file from the printer's CD or the printer manufacturer's website (the driver is not installed on the NSA).

Note: You must install the printer driver on each computer that will use the printer.

ZYXEL NSA221 - Printer Server Tutorial - 5

text_image Add Printer Wizard Select the manufacturer and model of your printer. If your printer came with an installation disk, click Have Disk. If your printer is not listed, consult your printer documentation for a compatible printer. Manufacturers: Agfa Alps Apollo Apple APS-PS AST AT&T Printers: AGFA-AccuSet v52.3 AGFA-AccuSetSF v52.3 AGFA-AccuSet 800 AGFA-AccuSet 800SF v52.3 AGFA-AccuSet 800SF v2013.108 AGFA-AccuSet 1000 AGFA-AccuSet 1000SF v52.3 Have Disk... OK Cancel

After the driver installation finishes, the computer is ready to use the printer. Select the printer in an application to use it to print. Browse to the NSA using a CIFS program (like Windows Explorer) and double-click the printer's icon to open the printer's queue of print jobs.

ZYXEL NSA221 - Printer Server Tutorial - 6

text_image Canon_PRT_1 on 192.168.1.2 Printer Document View Help Document Name Status Owner Pages Size Subm

Note: Repeat steps 5 to 8 on your other computers so they can also use the printer.

4.8 Copy and Flickr Auto Upload Tutorial

Amy received some photos taken during her best friend's wedding and saved the files on a USB disk. She wants to save a copy of the photos in the NSA and upload the photos to her Flickr account.

Amy has to activate the NSA's auto upload feature. See Section 11.4 on page 274 for more details on setting up a Flickr account for auto upload. In this example Amy select the NSA's photo share for auto upload.

This is how Amy would transfer the files from her USB disk to the NSA.

1 Click Applications > Copy/Sync Button in the navigation panel to open the screen.
2 Configure the copy settings as shown and click Apply.

ZYXEL NSA221 - Copy and Flickr Auto Upload Tutorial - 1

text_image Applications - Copy/Sync Button Copy Settings Press and release the button to copy data between the USB storage and copy target. Copy Target photo USB Volume WD-1600BEV-External-1 Copy Direction USB -> NSA Create a New Folder for Copied Files Backup Files to be Replaced Apply Reset

3 Press and release the COPY/SYNC button on the NSA's front panel to start copying files.
4 The copied files can be found in a new folder in the photo share. The name of this folder is the date (yyyy-mm-dd) and time (hh-mm-ss) when the folder is created.

ZYXEL NSA221 - Copy and Flickr Auto Upload Tutorial - 2

text_image Share Browsing Create Folder Upload Rename Delete Move Copy Current Location: /photo Type Name Size Modified Date .. wallpaper 2008-07-30_16-00-10 070804102644638.jpg NTR_ChildMana_char01.jpg NTR_ChildMana_char02.jpg NTR_ChildMana_char03.jpg test.jpg 132.74 KB 2008-07-21 16:39:29 113.22 KB 2008-07-21 16:39:32 285.01 KB 2008-07-21 16:36:51 337.66 KB 2008-07-21 16:36:53 494.30 KB 2008-07-21 16:36:55 137.37 KB 2008-07-21 16:39:30 Close

5 The NSA also automatically uploads the copied files to Flickr.

ZYXEL NSA221 - Copy and Flickr Auto Upload Tutorial - 3

text_image Applications - Auto Upload - Flickr/YouTube Flickr/YouTube Disable Pause Config Status grain Service Name Account Information Username ckbc_jiwen Photo Space Usage 0% (0.00 Bytes) Used 102.40 MB Total 100.00% Free Video Files Usage Uploaded 0 Remain 2 Enabled YouTube Username ckbcjiwen

4.9 FTP Uploadr Tutorial

FTP Uploadr can automatically upload files saved on the NSA to a remote FTP server. Amy wants to share files on her NSA with Susan. They each have an NSA

at home, so Susan has to set her NSA as an FTP server for Amy to automatically send files using FTP Uploadr.

ZYXEL NSA221 - FTP Uploadr Tutorial - 1

flowchart
graph LR
    A["Amy's NSA"] --> B["Document icon"]
    B --> C["Susan's NSA"]

To set the NSA as an FTP server, click Applications > FTP to open the FTP screen. Select Enable FTP and click Apply.

ZYXEL NSA221 - FTP Uploadr Tutorial - 2

text_image FTP Enable FTP Connection Limit 10 Connection Limit: 20 Idle Timeout 15 minutes Max timeout: 300 minutes Port Number 21 Enable Anonymous FTP Access Customize the port range for data transfer. Note: To configure a share to allow anonymous FTP access go to the configure shares page and modify a share's access rights to allow the user 'Anonymous FTP'. Character Set [UTF-8] Apply Reset

Susan also has to create a user account and share on her NSA for Amy to upload files. The share is used for files uploaded from Amy's NSA. Amy will then use the following information to configure FTP Uploadr on her NSA.

Table 17 FTP Uploadr Tutorial: FTP Server Information

FTP Domain Name or IP Addressexample2.com
FTP User NameAmy
FTP Passwordxxxxx
Share (Remote Path)Amy

This is how Amy would set up the NSA's FTP Uploadr.

1 Click Applications > Auto Upload > FTP Uploadr to open the FTP Uploadr screen. Select Enable FTP Uploadr and click Apply to turn on FTP Uploadr.

ZYXEL NSA221 - FTP Uploadr Tutorial - 3

text_image FTP Uploadr Enable FTP Uploadr Apply Add Server Preferences Edit Server Delete Selected Server(s) Server Information Domain Name/IP Address Port Number Remote Path Account Name Description

2 Click Add Server.

ZYXEL NSA221 - FTP Uploadr Tutorial - 4

text_image FTP Uploadr Enable FTP Uploadr Apply Add Server Preferences Edit Server Delete Selected Server(s) Server Information Domain Name/IP Address Port Number Remote Path Account Name Description Currently, there are no servers.

3 Enter the information as describe in Table 17 on page 106. Click Apply to add the server.

ZYXEL NSA221 - FTP Uploadr Tutorial - 5

text_image Add Server Domain Name/IP Address example2.com Account Name Amy Password ****** Port Number 21 Remote Path /Amy Description Send to Susan Test Connection Apply Cancel

4 In the FTP Uploadr screen, click Preferences to configure the auto upload settings.

ZYXEL NSA221 - FTP Uploadr Tutorial - 6

text_image FTP Uploadr Enable FTP Uploadr Apply Add Server Preferences Edit Server Delete Selected Server(s) Server Information Domain Name/IP Address Port Number Remote Path Account Name Description example2.com 21 /Amy Amy Send to Susan

5 Amy wants to share video files with Susan. In the Preferences screen, click the Add button and select video from the Shares drop-down list box, enter a forward slash in the Path field and click Apply to add the share to the Folder Watch List.

ZYXEL NSA221 - FTP Uploadr Tutorial - 7

text_image Folder Watch List Status Share Name Path Action There are currently no folders on the watch list. Add Watch Folder Share video Path / Browse ... Add Settings Apply Cancel Grace Period The time the system will wait before a newly added file is saved in a watched folder. Grace Period 15 minutes Bandwidth Limit Max. upload rate 0 KB/s (0=No Limit) Apply Reset Close

6 Amy also set the Bandwidth Limit to 20KB/s so that the upload doesn't slow down her Internet connection.

ZYXEL NSA221 - FTP Uploadr Tutorial - 8

text_image Folder Watch List Status Share Name Path Action video / Add Settings Grace Period The time the system will wait before a newly added file is saved in a watched folder. Grace Period 15 minutes Bandwidth Limit Max. upload rate 20 KB/s (0=No Limit) Apply Reset Close

Now Amy has set up FTP Uploadr to send files to Susan's NSA. Every time Amy adds new files or renames files in the video share, these new or modified files will be uploaded automatically to the Amy share on Susan's NSA.

Similarly, Susan can go through the steps described above to configure FTP Uploadr on her NSA. Once Susan completes the setup, Amy can also receive files from Susan's NSA.

ZYXEL NSA221 - FTP Uploadr Tutorial - 9

flowchart
graph TD
    A["Amy's NSA"] --> B["Document"]
    B --> C["Susan's NSA"]
    C --> B
    B --> A

4.10 Web Configurator's Security Sessions

These tutorials show you how to configure security for the NSA's Web Configurator sessions. You will customize the NSA's self-signed SSL certificate and distribute it to your users.

4.10.1 Customizing the NSA's Certificate

1 Click Maintenance > SSL and then select Edit a self-signed CA certificate and click Edit.

ZYXEL NSA221 - Customizing the NSA's Certificate - 1

text_image Maintenance - SSL Force HTTPS (TLS/SSL) Connections ⚠️ Caution: Modifications of TLS/SSL certificate settings will restart network services. □ Force HTTPS Apply Install System Default CA This action will install the system default CA in the trusted CA list of your browser Step1 Download the default CA file Download Step2 Double click on the CA file to install it into your browser Modify the Existing Certificate ⚠️ Caution: Modifications of TLS/SSL certificate settings will restart network services. ● Edit a self-signed CA certificate Step1 Edit the Self-signed Certificate Edit Step2 Download the self-signed CA file Download Step3 Double click on the CA file to install it into your browser ○ Create a Certificate To Be Authorized By My Own Certificate Authority

2 Next, let's modify the certificate by changing the Common Name to this NSA's host name of "nsa", the Organization to "Test" and the Key Length to 2048.

ZYXEL NSA221 - Customizing the NSA's Certificate - 2

text_image Edit the Self-signed Certificate Common Name Host IP Address Host Domain Name nsa Organizational Unit(Optional) Max length: 64 characters Organization(Optional) ZyXEL Max length: 64 characters Country(Optional) Country code only, such as TW, US, JP, etc,... Key Type RSA Key Length 2048 Note: If you choose a large key length, it may take a while to make the certificate file. Apply Cancel

3 The NSA restarts its network services and returns you to the login screen.

ZYXEL NSA221 - Customizing the NSA's Certificate - 3

text_image ZyXEL Restarting Network Services ... Current Status: Waiting for new network settings to apply... The NSA Server will restart network services. After services have been restarted you can begin accessing the system using the new network host settings. This page will TRY to automatically redirect you to the web configurator using the new network settings when it is available. If you are not redirected please do so manually by clicking the link below or typing the new host address in your browser's address bar. If you continue to have problems connecting, please use the NSU (NAS Starter Utility) tool to discover it.

4.10.2 Downloading and Installing Customized Certificate

1 Log in and return to Maintenance > SSL. Under Modify the Existing Certificate, click Download.

ZYXEL NSA221 - Downloading and Installing Customized Certificate - 1

text_image Maintenance - SSL Force HTTPS (TLS/SSL) Connections ⚠ Caution: Modifications of TLS/SSL certificate settings will restart network services. □ Force HTTPS Apply Install System Default CA This action will install the system default CA in the trusted CA list of your browser Step1 Download the default CA file Download Step2 Double click on the CA file to install it into your browser Modify the Existing Certificate ⚠ Caution: Modifications of TLS/SSL certificate settings will restart network services. ● Edit a self-signed CA certificate Step1 Edit the Self-signed Certificate Edit Step2 Download the self-signed CA file Download Step3 Double click on the CA file to install it into your browser ○ Create a Certificate To Be Authorized By My Own Certificate Authority

2 Save the file to your computer.

ZYXEL NSA221 - Downloading and Installing Customized Certificate - 2

text_image Opening CA.cer You have chosen to open CA.cer which is a: CER file from: http://172.23.37.52 What should Firefox do with this file? Open with Browse... Save File Do this automatically for files like this from now on. OK Cancel

3 Find the certificate file on your computer and double-click it.

ZYXEL NSA221 - Downloading and Installing Customized Certificate - 3

text_image My Computer My Network Places CA

4 Install the certificate. The rest of the steps in this section are an example of installing a certificate in Windows. See Appendix D on page 399 for other examples. In the Certificate dialog box, click Install Certificate.

ZYXEL NSA221 - Downloading and Installing Customized Certificate - 4

text_image Certificate General Details Certification Path Certificate Information This CA Root certificate is not trusted. To enable trust, install this certificate in the Trusted Root Certification Authorities store. Issued to: nsa Issued by: nsa Valid from 12/15/2008 to 12/15/2011 Install Certificate... Issuer Statement OK

5 In the Certificate Import Wizard, click Next.

ZYXEL NSA221 - Downloading and Installing Customized Certificate - 5

text_image Certificate Import Wizard Welcome to the Certificate Import Wizard This wizard helps you copy certificates, certificate trust lists, and certificate revocation lists from your disk to a certificate store. A certificate, which is issued by a certification authority, is a confirmation of your identity and contains information used to protect data or to establish secure network connections. A certificate store is the system area where certificates are kept. To continue, click Next. < Back Next > Cancel

6 Leave Automatically select certificate store based on the type of certificate selected and click Next.

ZYXEL NSA221 - Downloading and Installing Customized Certificate - 6

text_image Certificate Import Wizard Certificate Store Certificate stores are system areas where certificates are kept. Windows can automatically select a certificate store, or you can specify a location for Automatically select the certificate store based on the type of certificate Place all certificates in the following store Certificate store: Browse... < Back Next > Cancel

7 In the Completing the Certificate Import Wizard screen, click Finish.

ZYXEL NSA221 - Downloading and Installing Customized Certificate - 7

text_image Certificate Import Wizard Completing the Certificate Import Wizard You have successfully completed the Certificate Import Wizard. You have specified the following settings: Certificate Store Selected Automatically determined by t Content Certificate < Back Finish Cancel

8 If you are presented with another Security Warning, click Yes.

ZYXEL NSA221 - Downloading and Installing Customized Certificate - 8

text_image Security Warning You are about to install a certificate from a certification authority (CA) claiming to represent: nsa Windows cannot validate that the certificate is actually from "nsa .". You should confirm its origin by contacting" nsa .". The following number will assist you in this process: Thumbprint (sha1): 5C724356 F29DC87B 3B4B60F9 9CA28163 81A99FD4 Warning: If you install this root certificate, Windows will automatically trust any certificate issued by this CA. Installing a certificate with an unconfirmed thumbprint is a security risk. If you click "Yes" you acknowledge this risk. Do you want to install this certificate? Yes No

9 Finally, click OK when presented with the successful certificate installation message.

ZYXEL NSA221 - Downloading and Installing Customized Certificate - 9

text_image Certificate Import Wizard The import was successful. OK

4.10.3 Turn on the NSA's Web Security

Now that you have customized the NSA's certificate and installed it in your computer, you can turn on security for your Web Configurator sessions. This example uses Firefox 3.0. See Appendix D on page 399 for more information on browsers and certificates.

1 Close your web browser and open it again to reset its session with the NSA. Log in and click Maintenance > SSL. Select Force HTTPS and click Apply.

ZYXEL NSA221 - Turn on the NSA's Web Security - 1

text_image Maintenance - SSL Force HTTPS (TLS/SSL) Connections ⚠ Caution: Modifications of TLS/SSL certificate settings will restart network services. ✓ Force HTTPS Apply Install System Default CA This action will install the system default CA in the trusted CA list of your browser Step1 Download the default CA file Download Step2 Double click on the CA file to install it into your browser Modify the Existing Certificate ⚠ Caution: Modifications of TLS/SSL certificate settings will restart network services. Edit a self-signed CA certificate Step1 Edit the Self-signed Certificate Edit Step2 Download the self-signed CA file Download Step3 Double click on the CA file to install it into your browser Create a Certificate To Be Authorized By My Own Certificate Authority

2 A warning screen pops up if applying your change may disconnect some users. Click Apply to continue.

ZYXEL NSA221 - Turn on the NSA's Web Security - 2

text_image Warning Confirmation The following users are currently connected. If you decide to continue, they may be disconnected. Type Share Name Username IP Address Web admin .104 CIFS music admin .104 Performing this operation will cause some network services to temporarily disconnect. Apply Cancel

3 The NSA logs you out and automatically redirects your formerly non-secure (HTTP) connection to a secure (HTTPS) connection. Your browser may give you a warning about the device's public key certificate. Add an exception to allow your browser to bypass the warning.

ZYXEL NSA221 - Turn on the NSA's Web Security - 3

Secure Connection Failed

  1. uses an invalid security certificate.

The certificate is not trusted because it is self signed. The certificate is only valid for nsa

(Error code: sec_error_untrusted_issuer)

  • This could be a problem with the server's configuration, or it could be someone trying to impersonate the server.
  • If you have connected to this server successfully in the past, the error may be temporary, and you can try again later.

Or you can add an exception...

4 Click Add Exception.

ZYXEL NSA221 - Click Add Exception. - 1

Secure Connection Failed

  1. uses an invalid security certificate.

The certificate is not trusted because it is self signed. The certificate is only valid for nsa

(Error code: sec_error_untrusted_issuer)

  • This could be a problem with the server's configuration, or it could be someone trying to impersonate the server.
  • If you have connected to this server successfully in the past, the error may be temporary, and you can try again later.

You should not add an exception if you are using an internet connection that you do not trust completely or if you are not used to seeing a warning for this server.

Get me out of here!

Add Exception...

5 Click Get Certificate.

ZYXEL NSA221 - Click Get Certificate. - 1

text_image Add Security Exception You are about to override how Firefox identifies this site. Legitimate banks, stores, and other public sites will not ask you to do this. Server Location: https:// .52/ Get Certificate Certificate Status View... Permanently store this exception Confirm Security Exception Cancel

6 Before you add an exception, verify that the device to which you are trying to connect is providing the correct certificate. Click View.

ZYXEL NSA221 - Click Get Certificate. - 2

text_image Add Security Exception You are about to override how Firefox identifies this site. Legitimate banks, stores, and other public sites will not ask you to do this. Server Location: https:// .52/ Get Certificate Certificate Status This site attempts to identify itself with invalid information. View... Wrong Site Certificate belongs to a different site, which could indicate an identity theft. Unknown Identity Certificate is not trusted, because it hasn't been verified by a recognized authority. ✓ Permanently store this exception Confirm Security Exception Cancel

7 The SHA1 fingerprint must match the NSA's certificate you downloaded from the NSA to your computer. (Double-click the NSA's certificate file and then click Details and look at the Thumbprint). Click Close.

ZYXEL NSA221 - Click Get Certificate. - 3

text_image Certificate Viewer:"nsa" General Details Could not verify this certificate because the issuer is not trusted. Issued To Common Name (CN) nsa Organization (O) Test Organizational Unit (OU) Serial Number 00:A0:4B:C2:35:B0:3D:56:CA Issued By Common Name (CN) nsa Organization (O) Test Organizational Unit (OU) Validity Issued On 12/15/2008 Expires On 12/15/2011 Fingerprints SHA1 Fingerprint 5C:72:43:56:F2:9D:C8:7B:3B:4B:60:F9:9C:A2:81:63:81:A9:9F:D4 FIBF Fingerprint C:\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\DC\nClose

ZYXEL NSA221 - Click Get Certificate. - 4

text_image Certificate General Details Certification Path Show: Field Value Subject nsa Public key RSA (2048 Bits) Subject Key Identifier 61 2e c4 46 89 c2 b9 b9 d8 b3... Authority Key Identifier_KeyID=61 2e c4 46 89 c2 b9 b... Basic Constraints Subject Type=CA, Path Lengt... Thumbprint algorithm sha1 Thumbprint 5c 72 43 56 f2 9d c8 7b 3b 4b ... 5c 72 43 56 f2 9d c8 7b 3b 4b 60 f9 9c a2 81 Edit Properties... Copy to File... OK

8 If the certificate fingerprints match, click Confirm Security Exception, otherwise click Cancel.

ZYXEL NSA221 - Click Get Certificate. - 5

text_image Add Security Exception You are about to override how Firefox identifies this site. Legitimate banks, stores, and other public sites will not ask you to do this. Server Location: https:// .52/ Get Certificate Certificate Status This site attempts to identify itself with invalid information. View... Wrong Site Certificate belongs to a different site, which could indicate an identity theft. Unknown Identity Certificate is not trusted, because it hasn't been verified by a recognized authority. ✓ Permanently store this exception Confirm Security Exception Cancel

9 The login screen displays.

ZYXEL NSA221 - Click Get Certificate. - 6

text_image ZyXEL NSA221 Enter Userm Username Password ( a maximum double quote □ Keep m

Now, anyone who connects to the NSA's Web Configurator screens will automatically do so by HTTPS. Use a secure method to let your users know the correct fingerprint for the NSA's certificate so they can check it before adding a security exception (as in steps 6 to 7 on pages 119 to 120). See the next section for how to use FTPES with the NSA for secure FTP transfers.

4.11 Using FTPES to Connect to the NSA

This section covers how to use FTP over Explicit TLS/SSL with the NSA for secure FTP transfers. Before you go through this section, read Section 4.10 on page 110 to configure HTTPS. This example uses FileZilla.

1 Open FileZilla and click File > Site Manager > New Site.

  • Configure the Host field with the NSA's address.
  • Set the Servertype to FTPES - FTP over explicit TLS/SSL.
  • Configure the account name and password.
  • Click Connect.

ZYXEL NSA221 - Using FTPES to Connect to the NSA - 1

text_image Site Manager Select Entry: My Sites New site General Advanced Transfer settings Charset Host: 192.168.1.35 Port: 21 Servertype: FTPES - FTP over explicit TLS/SSL Logontype: Normal User: Gonzo Password: • Account: Comments: New Site New Folder Rename Delete Copy Connect OK Discard

2 A security warning screen displays. The SHA1 fingerprint must match the NSA's certificate you downloaded from the NSA to your computer. (Double-click the NSA's certificate file and then click Details and look at the Thumbprint). If they match, click OK.

ZYXEL NSA221 - Using FTPES to Connect to the NSA - 2

text_image Unknown certificate The server's certificate is unknown. Please carefully examine the certificate to make sure the server can be trusted. Details Host: 192.168.1.35:21 Valid from: 9/12/2008 Valid to: 9/12/2011 Serial number: 00:8f:2d:37:2c:36:14:e7:37 Public key algorithm: RSA with 1024 bits Fingerprint (MD5): 14:bc:16:d9:61:0d:00:12:a9:66:4a:5f:ab:8c:c4:50 Fingerprint (SHA-1): 62:77:6f:09:cf:4c:12:94:84:38:e7:93:d5:d6:5b:ce:82:46:60:83 Subject of certificate Common name: NSA Organization: ZyXEL Certificate issuer Common name: NSA Organization: ZyXEL Session details Cipher: AES-128-CBC MAC: SHA1 Trust this certificate and carry on connecting? Always trust certificate in future sessions. OK Cancel

The shares and folders to which Gonzo has access display. Now you can use FTP to securely transfer files to or from the NSA. Use a secure method to let your users know the correct fingerprint for the NSA's certificate so they can check it before adding a security exception.

4.12 How to Use the BackupPlanner

Note: The screens and links in this section appear only after you have installed and enabled BackupPlanner. BackupPlanner is an application that you can install using Package Management (see Chapter 10 on page 219.)

Use the NSA's BackupPlanner to have a backup of your files and folders.

Schedule backups for times when the network is not busy (like at night or on weekends). For example, you might do daily backups of important individual files or folders and a weekly general archive. You can save backups to another location so your files can survive even if the original RAID or NSA fails.

4.12.1 Creating an Archive Backup

To backup the NSA every week to a remote NSA:

1 Click Protect > Backup > Add Job.

Figure 50 Protect > Backup
ZYXEL NSA221 - Click Protect &gt; Backup &gt; Add Job. - 1

text_image Protect - Backup Status Auto Upload Flickr/YouTube FTP Uploadr eMule Server Task Search Sharing Users Groups Shares Maintenance Power Management Log Configuration SSL FW Upgrade Shutdown Protect Backup Logout Backup Add Job Edit Job Delete Selected Job(s) Execute Job Now Restore Archive Abort Job Status Job Name Job Description Backup Info Scheduler Info Currently, there are no jobs.

2 Identify the backup job and select Archive.

New files are often added to the shares that you need to back up and existing files are not frequently changed so select Incremental. The NSA does a full backup first and later only copies source files that are new and/or modified since the last backup. This example sets the NSA to do another full backup after every four incremental backups.

Figure 51 Protect > Backup > Add Job: Step 1
ZYXEL NSA221 - Identify the backup job and select Archive. - 1

text_image Protect - Backup Add a new backup Job Step 1 Job Information Job Name: Weekly_backup Job Description: Backup Type Archive Full Incremental Perform a full backup job after 4 increments (Max: 30) Synchronization Next

3 Select the volume1 check box to select all the folders and files.

Select Remote and enter the other NSA's address, username, password, and share name.

If you want to make sure the remote NSA is reachable, click Test Connection.

Figure 52 Protect > Backup > Add Job: Step 2
ZYXEL NSA221 - Identify the backup job and select Archive. - 2

text_image Protect - Backup Add a new backup Job Step 2 Backup Source Volume 1 Volume 1 public video photo music admin private Selected Source Folders Volume 1/ Backup Target Remote Remote NSA Address 192.168.3.2 Username admin Password ****** Share Name Backups Test Connection Local External Previous Next

4 In this example, the target NSA is on the LAN so leave the compression off.

Security is already configured on the target NSA so you can leave the encryption off, too.

Have the NSA keep 3 backups.

Figure 53 Protect > Backup > Add Job: Step 3
ZYXEL NSA221 - Identify the backup job and select Archive. - 3

text_image Protect - Backup Add a new backup Job Step 3 Compression Yes No Encryption Yes No Purge Policy Keep All Old Backup files Keep Only the last 3 backup files(1-30) Keep Backups For day(s)(1-3650) Previous Next

5 Set the frequency to Weekly. Schedule the backup for 5:00 every Saturday morning.

Protect > Backup > Add Job: Step 4
ZYXEL NSA221 - Identify the backup job and select Archive. - 4

text_image Protect - Backup Add a new backup Job Step 4 Scheduler Backup Frequency: Weekly Start Time (hh:mm): 5 : 0 Every how many weeks? 1 (1-52) on every Sunday Monday Tuesday Wednesday Thursday Friday Saturday Previous Done

4.12.2 Creating a Synchronization Backup

To create a synchronization backup:

1 Click Protect > Backup > Add Job.

Figure 54 Protect > Backup
ZYXEL NSA221 - Click Protect &gt; Backup &gt; Add Job. - 1

text_image Protect - Backup Status Auto Upload Flickr/YouTube FTP Uploadr eMule Server Task Search Sharing Users Groups Shares Maintenance Power Management Log Configuration SSL FW Upgrade Shutdown Protect Backup Logout Backup Add Job Edit Job Delete Selected Job(s) Execute Job Now Restore Archive Abort Job Status Job Name Job Description Backup Info Scheduler Info Currently, there are no jobs. Log Log Log Log Log Log Log Log Log Log Log Log

Name the backup job and select Synchronization.

You want only your current set of files in the remote NSA's folder, so you select Mirror to make the target folder identical to the source folder. The NSA deletes any other files in the target folder.

Figure 55 Protect > Backup > Add Job: Step 1
ZYXEL NSA221 - Click Protect &gt; Backup &gt; Add Job. - 2

text_image Protect - Backup Add a new backup Job Step 1 Job Information Job Name: Backup_Sync Job Description: Backup Type Archive Synchronization Publish Mirror Caution: Please make sure that your backup target directory is empty, otherwise all files will be deleted during the first run of the backup job. Next

2 Select the folder that needs to be mirrored (your Private folder in this example) and Remote.

  • Enter the other NSA's address and administrator password.
  • Click Show target content to display the remote NSA's contents.
  • Select the destination on the remote NSA (Backups in this example).
  • Click Next.

Figure 56 Protect > Backup > Add Job: Step 2
ZYXEL NSA221 - Click Protect &gt; Backup &gt; Add Job. - 3

text_image Protect - Backup Add a new backup Job Step 2 Backup Source Volume 1 Volume 1 public video photo music admin Private Selected Source Folders Volume 1/Private/ Backup Target Remote Remote NSA 192.168.1.34 Address (Admin Only) Username admin Password Show target content Target Folder volume1 volume1 Backups Target Folder volume1/Backups/ Local External Previous Next

3 Click OK in the warning dialog box.

Figure 57 Protect > Backup > Add Job: Step 3
ZYXEL NSA221 - Click Protect &gt; Backup &gt; Add Job. - 4

text_image The page at https://172.23.31.119 says: ? You are creating a mirror job. When you run this job, all the file/folders in the target that are different from the source content will be DELETED! Are you sure the target is empty? OK Cancel

4 For this example, assume the connection to the German branch office is a good one and not many files need to be backed up so leave the compression off.

  • Turn on the encryption to protect these sensitive files during the transfer. The final files stored on the remote NSA will be unencrypted (usable).
  • Restrict the bandwidth usage to 256 KB/s to stop the archives from using all of your network connection's available bandwidth.
  • You don't have to configure a purge policy for a synchronization backup.
  • Click Next.

Figure 58 Protect > Backup > Add Job: Step 3
ZYXEL NSA221 - Click Protect &gt; Backup &gt; Add Job. - 5

text_image Add a new backup Job Step 3 Compression Yes No Encryption Use Encrypted Connection Yes No Bandwidth 256 KB/s (0 : No Limit) Purge Policy Keep All Old Backup files Keep Only the last backup files(1-30) Keep Backups For day(s)(1-3650) Previous Next

5 Schedule the backup to occur every morning at 3:00 and click Done.

Figure 59 Protect > Backup > Add Job: Step 4
ZYXEL NSA221 - Click Protect &gt; Backup &gt; Add Job. - 6

text_image Add a new backup Job Step 4 Scheduler Backup Daily Frequency: Start 3:0 Time (hh:mm): Every how many days? 1 Previous Done

You do not need to use a special restore process to use the files a synchronization backup creates. The copy of files that the NSA creates on the other NSA's Backups share can be used directly by anyone with access to that share.

4.12.3 Restoring Archived Files by Backup Job

If you have backup jobs for which the NSA has already performed backups, you can restore the files based on the backup job. Do the following:

1 Click Protect > Backup screen, select a backup job and click Restore Archive.

Figure 60 Protect > Backup
ZYXEL NSA221 - Restoring Archived Files by Backup Job - 1

text_image Backup Add Job Edit Job Delete Selected Job(s) Execute Job Now Restore Archive Abort Job Status^ Job Name Job Description Backup Info Scheduler Info WAITING Weekly_backup Backup Type: incremental Backup Source: /volume2/ Backup Target: 192.168.3.2:Backups/ Frequency: Weekly Last Run Time: 2008-09-08 14:37:25 Last Run Result: success Next Run Time: 2008-09-13 00:00:00

2 Select which backup to use and click Next.

Figure 61 Protect > Backup > Restore Archive: Step 1
ZYXEL NSA221 - Restoring Archived Files by Backup Job - 2

text_image Restore Step 1. Select Restore Point Job Information Job Name: Weekly_backup Job Description: Backup Type: incremental Scheduler every week Information: Restored Time 2008-09-08 14:35:45 2008-09-08 14:37:28 Next

3 Select the files and folders you want to restore and click Next.

Figure 62 Protect > Backup > Restore Archive: Step 2
ZYXEL NSA221 - Restoring Archived Files by Backup Job - 3

text_image Restore Step 2. Please select which file(s)/folder(s) to restore. Folder Chooser Selected Folder / / Gonzo Folder Name / Previous Next

4 Select the original location and click Done.

Figure 63 Protect > Backup > Restore Archive: Step 3
ZYXEL NSA221 - Restoring Archived Files by Backup Job - 4

text_image Restore Step 3. Set a restore target and start restoring ● Original Location ○ Other Location Browse ... Previous Done

5 The NSA restores the files into the share. When it finishes you can access the files.

Figure 64 Protect > Backup > Restore Archive: Progress
ZYXEL NSA221 - Restoring Archived Files by Backup Job - 5

bar Progress | Category | Value (%) | |---|---| | Job Name | test | | Target Path | original location [Volume: volume1] | | Progress | 100% |

4.12.4 Restoring by Backup Files

If you deleted an archive backup job or the NSA or the RAID array containing the backup job failed you cannot restore archived files by the backup job. In this example, the NSA's RAID array failed. You've replaced the hard drives and re-configured the RAID. To restore by backup files:

1 Click Protect > Restore. Specify where the archive files are located. In this example, enter "192.168.3.2" as the IP address, "admin" as the account name, "1234" as the password, and "Backups" as the share name. Click Test Connection. Click Next.

Figure 65 Protect > Restore: Step 1
ZYXEL NSA221 - Restoring by Backup Files - 1

text_image Restore Step 1. Select Restored Source Remote NSA IP 192.168.3.2 Address User admin Password **** Share Backups Test Connection Successfully Name the Remote NSA. Internal or External Volume Browse... Next

2 Select the backup job and backup time and click Next.

Figure 66 Protect > Restore: Step 2
ZYXEL NSA221 - Restoring by Backup Files - 2

text_image Restore Step 2. Select Restore Point Job Name Weekly_backup recycle Restored Time 2008-09-08 14:35:45 2008-09-08 14:37:28 2008-09-08 15:01:30 Previous Next

3 Select everything in the share except the recycle folder. Click Next.

Figure 67 Protect > Restore: Step 3
ZYXEL NSA221 - Restoring by Backup Files - 3

text_image Restore Step 3. Please select which file(s)/folder(s) to restore. Folder Chooser Selected Folder Folder Name /Gonzo/Planning/ /Gonzo/Strategy/ ✓ / ✓ Gonzo + recycle ✓ Planning 2010-2014-Plans.doc ✓ 2009-Plan.doc + Strategy Previous Next

4 Browse to the folder where you want to put the files. Click Done.

Figure 68 Protect > Restore: Step 4
ZYXEL NSA221 - Restoring by Backup Files - 4

text_image Restore Step 4. Set a restore target and start restoring Path for restoring Browse ... Please input encryption password if you have set to this backup job Previous Done

5 The NSA restores the files and you can use them again.

PART II

Technical Reference

Status Screen

5.1 Overview

This chapter describes the Status screen, which is the first advanced administration screen that displays.

5.2 The Status Screen

Click Administration in the Home screens (Section 3.5 on page 63) to open the Web Configurator. You can also view the status screen, by clicking Status on the top-left of the navigation panel.

Figure 69 Status
ZYXEL NSA221 - The Status Screen - 1

bar | Status | Name | Configuration | Disk(s) | Disk Usage | | :--- | :--- | :--- | :--- | :--- | | Healthy | HomeDisk | "JBOD" | disk1 | 465.14 GB Total | | External Volume | HomeDisk | "JBOD" | disk1 | 0.54% (2.53 GB) Used | | Active Sessions | Admin | - | - | 99.46% Free | | Server Name | nsa221 | - | - | - | | Model Name | NSA221 | - | - | - | | Firmware Version | V2010-02-08_01_06_40(AFM.0)b1 | - | - | - | | MAC Address | 00:A0:C5:01:35:51 | - | - | - | | Media Server Status | Enabled | - | - | - | | FTP Server Status | Enabled | - | - | - | | Web Publishing Status | Disabled | - | - | - | | UPS | N/A | - | - | - | | CPU Usage | 18% | - | - | - | | CPU Temperature | 28°C (82.40°F) | - | - | - | | FAN Speed | 0 RPM | - | - | - | | Memory Usage | 16% Used, 42MB/250MB | - | - | - | System Information Type Share Name Username Connected At IP Address Web admin 2010-02-08 13:31:46 192.168.1.33

The following table describes the labels in this screen.

Table 18 Status

LABELDESCRIPTION
StatusClick this to refresh the status screen statistics.
System Information
Server NameThis displays the name which helps you find the NSA on the network. Click the Edit icon to go to the screen where you can configure this.
Model NameThis displays which model this NSA device is.
Firmware VersionThis is the NSA firmware version. Click the Edit icon to go to the Maintenance > FW Upgrade screen from which you can upload/upgrade new firmware.
MAC AddressThis displays the NSA's unique physical hardware address (MAC). You need the MAC address to register the product at myZyXEL.com. Customer support may also request it for troubleshooting purposes.
Media Server StatusThis shows whether the media server function is enabled or disabled. It must be enabled for media clients to play content files stored on the NSA. Click the Edit icon to go to the screen where you can configure this.
FTP Server StatusThis shows whether the FTP server function is enabled or disabled. It must be enabled to use FTP file transfer to/from the NSA. Click the edit icon to go to the screen where you can configure this.
Web Publishing StatusThis shows whether the Web server function is enabled or disabled. It must be enabled to use HTTP to access shares on the NSA. Click the Edit icon to go to the screen where you can configure this.
UPSThis shows the Uninterruptible Power Supply (UPS) capacity. Click the Edit icon to go to the screen where you can configure this.
CPU UsageThis displays a summary of CPU usage by all current processes. Click the Refresh icon to update this display. It also automatically updates itself every 10 seconds. Note: If too many users are using the NSA then the NSA may appear sluggish.
CPU TemperatureThis displays the current temperature near the NSA's CPU. The NSA generates an emergency log if the temperature goes out of the normal operating range. If the temperature goes even higher, the NSA shuts down automatically to avoid damage from overheating. If the NSA overheats, make sure the fans are working and it is in a well ventilated place. Click the Refresh icon to update this display. It also automatically updates itself every 60 seconds.
Fan SpeedThis is the RPM (Rotations Per Minute) of the NSA's fans. Click the Refresh icon to update this display. It also automatically updates itself every 60 seconds.
Memory UsageThis shows how much of the NSA's total memory is being used. Click the Refresh icon to update this display. It also automatically updates itself every 10 seconds.
Volume StatusA volume is a storage area on a single disk or spread across a number of disks within a single file system.
Internal VolumeThis displays the volumes created on the hard drives installed in the NSA. Click the Edit icon to open the Storage screen. You can create and edit the NSA's internal volume. See Chapter 7 on page 147 for more details.
External VolumeThis displays the volumes created on USB hard drives connected to the NSA. USB disks are numbered in the order that you insert USB devices.Click theEditicon to open theStoragescreen. You can create and edit the external volume. SeeChapter 7 on page 147for more details.
StatusThis icon indicates whether the volume is healthy, degraded, or down.
NameThis field shows the name for the volume. Read only displays for an external volume that uses Windows NTFS. This means the NSA can read the volume but can't save files on it.
ConfigurationThis field (also known asType) shows what type of data storage system (a RAID type or JBOD) an internal volume is using.
File SystemThis field shows what file system an external (USB) volume is using.
Disk(s)For internal drives, this shows which hard drive bays are included in the volume. For external drives, this field showsUSB1for the first external hard drive you connect to the NSA (regardless of which USB port) andUSB2for the second.
Disk UsageThis field shows total disk size, the percentage of the disk being used and the percentage that is available.
Active SessionsThis shows how many users are currently connected to the NSA.
TypeThis shows whether it's a Windows/CIFS, web (web configurator), or FTP connection to the NSA.
Share NameThis displays the shared folder name on the NSA that the user is connected to for CIFS sessions and is blank for FTP and web sessions.
UsernameThis displays the name of the user connected to the NSA if one is defined.ANONYMOUS FTPdisplays if a username is not defined for the user's connection.
Connected AtThis displays the date and time the user last connected to the NSA in year, month, day, hour, minute, second format.
IP AddressThis displays the IP address of the computer connected to the NSA.

System Setting

6.1 Overview

This chapter gives an overview of the various features included in the system setting screens. You can identify your NSA on the network and set the time that the NSA follows for its scheduled tasks/logs.

6.2 What You Can Do

  • Use the Server Name screen (Section 6.4 on page 142) to specify the NSA's server and workgroup names.
  • Use the Date/Time screen (Section 6.5 on page 143) to set up date/time and choose a time zone for the NSA.

6.3 What You Need to Know

Windows/CIFS

Common Internet File System (CIFS) is a standard protocol supported by most operating systems in order to share files across the network.

  • CIFS is included by default in Windows operating systems.
  • You can use Samba with Linux to use CIFS.
    • CIFS transfers use security.

Time Lag

Time lag occurs when the time on the NSA falls behind the time on the time server. This may happen if:

  • the time server is no longer reachable
  • if the NSA is shut down often (the NSA internal battery keeps time when the NSA is shut down and this may cause possible variance)

• power surges occur.

The NSA gives no warning if time lag occurs. You should resynchronize the time after a power surge or after you have shut down the NSA several times.

6.4 The Server Name Screen

Click System Setting > Server Name to open the following screen. Use this screen to configure your CIFS settings. In this screen you can set your server name and specify if your NSA is a part of a workgroup.

Note: CIFS cannot be disabled on the NSA.

Figure 70 System Setting > Server Name
ZYXEL NSA221 - The Server Name Screen - 1

text_image System Setting - Server Name Server Identification Server Name nsa-tw Description Workgroup Name nsa Prevent NSA From Being Master Browser Note: Prevent NSA from being the Master Browser if computers on your network uses non-ascii character computer names. Apply Reset

The following table describes the labels in these screens.

Table 19 System Setting > Server Name

LABELDESCRIPTION
Server NameEnter a name to identify your NSA on the network in this field.You can enter up to 15 alphanumeric characters with minus signs allowed but not as the last character. The name must begin with an alphabet (a-z) and is NOT case sensitive.
DescriptionAdd text here to describe the NSA if the Server Name field is not enough. Use up to 61 characters. You can use all characters except the following: : |[]<>+;,?=*"~ .
Workgroup NameType your workgroup name in this field. A workgroup is a group of computers on a network that can share files. These user accounts are maintained on the NSA.You can enter up to 15 alphanumeric characters with minus signs allowed but not as the last character. The name must begin with an alphabet (a-z) and is NOT case sensitive.
Prevent NSA From Being Master BrowserSelect this option if computers in your workgroup are named with non-English characters (such as Chinese and Russian). When you perform a search in the workgroup, this option allows you to locate computers named with non-English characters.
ApplyClick this to save your changes.
ResetClick this to restore previously saved settings.

6.5 The Date/Time Screen

Use this screen to select a time zone and a time server from which your NSA can get the time and date. This time is then used in NSA logs and alerts.

Click the System Setting link in the navigation panel and then click the Date/Time link to access the Date/Time screen.

Figure 71 System Setting > Date/Time
ZYXEL NSA221 - The Date/Time Screen - 1

text_image System Setting - Date/Time Current System Date Time Setting Current Time 10:28:04 +0800 Current Date 2010-2-9 Date Time Setup ○ Manual New Date (yyyy-mm-dd) 2010-2-9 Edit New Time (hh:mm:ss) 10 : 27 : 11 ● Get from Time Server Time Server Address time.stdtime.gov.tw Synchronize Now Time Zone Time Zone (GMT+08:00) Beijing,Chongqing,Hong Kong,Urumqi □ Manual Daylight Saving Start Date January First Monday at 12 : 0 End Date January First Monday at 12 : 0 Offset 1 hours Apply Cancel

The following table describes the labels in this screen.

Table 20 System Setting > Date/Time

LABELDESCRIPTION
Current System Date Time Setting
Current TimeThis field displays the time used by your NSA for its logs and alerts.
Current DateThis field displays the date used by your NSA for its logs and alerts.
Date Time Setup
ManualSelect this radio button to enter the time and date manually.When you enter the time settings manually, the NSA uses the new setting once you clickApply.Note: If you enter time settings manually, they revert to their defaults when power is lost.
New Date (yyyyMMdd-mm-dd)This field displays the last updated date from the time server or the last date configured manually.When you setTime and Date Setupto Manual, enter the new date in this field and then clickApply.
New Time (hh:mm:ss)This field displays the last updated time from the time server or the last time configured manually.When you setTime and Date Setupto Manual, enter the new time in this field and then clickApply.
Get from Time ServerSelect this check box to have the NSA get the time and date from the time server you select in theTime Server Addressfield.
Time Server AddressSelect a time server from the drop-down list box or selectSpecify my own time serverand enter the time server you wish to use in the field below. Check with your ISP/network administrator if you are unsure of this information.
Synchronize NowClick this for the NSA to retrieve the correct time from the configured time server right away.
Time Zone
Time ZoneChoose the time zone of your location. This will set the time difference between your time zone and Greenwich Mean Time (GMT).
Manual Daylight SavingDaylight saving is a period from late spring to early fall when many countries set their clocks ahead of normal local time by one hour to give more daytime light in the evening.Select this option to manually enter Daylight Saving Time settings. Clear this option to have the NSA automatically retrieve Daylight Saving Time settings from the Internet. The NSA will download a new daylight saving resource file from the Internet every month.
Start DateConfigure the day and time when Daylight Saving Time starts if you selected Enable Daylight Saving. The hour field uses the 24 hour format. Here are a couple of examples:Daylight Saving Time starts in most parts of the United States on the second Sunday of March. Each time zone in the United States starts using Daylight Saving Time at 2 A.M. local time. So in the United States you would use March, Second, Sunday, at 2:00.Daylight Saving Time starts in the European Union on the last Sunday of March. All of the time zones in the European Union start using Daylight Saving Time at the same moment (1 A.M. GMT or UTC). So in the European Union you would select March, Last, Sunday. The time you specify depends on your time zone. In Germany for instance, you would type 2 because Germany's time zone is one hour ahead of GMT or UTC (GMT+1).
End DateConfigure the day and time when Daylight Saving Time ends if you selected Enable Daylight Saving. The o'clock field uses the 24 hour format. Here are a couple of examples:Daylight Saving Time ends in the United States on the first Sunday of November. Each time zone in the United States stops using Daylight Saving Time at 2 A.M. local time. So in the United States you would select November, First, Sunday, at 2:00.Daylight Saving Time ends in the European Union on the last Sunday of October. All of the time zones in the European Union stop using Daylight Saving Time at the same moment (1 A.M. GMT or UTC). So in the European Union you would select October, Last, Sunday. The time you specify depends on your time zone. In Germany for instance, you would type 2 because Germany's time zone is one hour ahead of GMT or UTC (GMT+1).
OffsetSpecify by how many hours to change the time for Daylight Saving Time.
ApplyClick this to save your changes. If you configured a new time and date, Time Zone and Daylight Saving at the same time, all of the settings take affect.
CancelClick this to restore your previously saved settings.

Storage

7.1 Overview

Several NSA features require a valid internal volume. This chapter covers the management of volumes and disks (both internal and external).

Use the Storage screen (Section 7.2 on page 148) to display information on all volumes, create internal and external volumes, and configure the volume's properties.

7.1.1 What You Need to Know About Storage

Volume

A volume is a storage area on a disk or disks. You can create volumes on the internal disks and external disks attached to the USB port(s). You can spread a volume across internal disks but not between internal and external disks.

Storage Methods

RAID (Redundant Array of Independent Disks) or JBOD (Just a Bunch of Data) is the storage method that the NSA uses. The storage method you use depends on how many disks you have and how many volumes you want to create. It's important that you consider this carefully as all data is deleted when you re-create a volume. See Figure 7.6.2 on page 157 for details on choosing a storage method.

Finding Out More

See Section 7.6 on page 156 for more technical background information on storage.

7.2 The Storage Screen

The Storage screen allows you to create and edit volumes in the NSA.

7.2.1 Disk Replacement Restrictions

See the Quick Start Guide for information on replacing disks in the NSA. When replacing a disk in a degraded or down RAID volume, the new disk must be at least the same size or bigger than the other disks that are already in the RAID volume, so as all data in the volume can be restored.

For example, if you have RAID with 250 GB disks, you must put in a 250 GB or bigger disk as a replacement in order to restore all original data in that volume. If the replacement disk is of a higher capacity, the extra space on the disk will not be used except if it is for a RAID 1 volume and you follow the Expanding a RAID 1 Volume procedure.

Note: The NSA automatically repairs a degraded RAID volume if you insert an empty disk without an existing file system. Otherwise, when you replace a disk you must go to the Storage > Internal Volume > RAID screen, select the degraded array, and click Repair.

Resynchronizing or Recovering a RAID 1 Volume

Resynchronizing or recovering a RAID 1 volume that was down is done block-by-block, so the time it takes depends more on the size of your hard drive(s) than the amount of data you have on them.

Note: Do not restart the NSA while the NSA is resynchronizing or recovering a volume as this will cause the synchronization to begin again after the NSA fully reboots.

Note: You can access data on a RAID volume while it is resynchronizing or recovering, but it is not recommended.

Expanding a RAID 1 Volume

Replace a RAID 1 volume's hard disks with higher capacity hard disks to be able to increase the RAID 1 volume's capacity. For example, you have two 500 GB hard disks. You replace one 500 GB hard disk with a 1 TB hard disk and repair the volume. After the NSA finishes resynchronizing the volume, you replace the second 500 GB hard disk with another 1 TB hard disk and repair the volume again. After the NSA finishes the second repair, use the Expand icon to have the RAID1 volume use the rest of the hard disk capacity.

7.2.2 Storage Screen

Click Storage > Volume in the navigation panel to display the following screen. Use this screen to display internal and external volumes on the NSA.

Note: It is recommended to scan the volume every three months or 32 reboots.

Figure 72 Storage > Volume
ZYXEL NSA221 - Storage Screen - 1

text_image Storage - Volume Internal Volume Status Volume Disk Configuration Disk(s) Capacity Actions Healthy Volume1 ABCD disk1 0.11% (523.01 MB) Used 465.14 GB Total 99.89% Free Disk Capacity (JBOD) Create an Internal Volume External Volume Status Volume File System Disk(s) Capacity Actions There are currently no volumes. Create an External Volume

The following table describes the labels in this screen.

Table 21 Storage > Volume

LABELDESCRIPTION
Internal/External VolumeThese tables display information on all internal volumes (created on NSA internal disk drives) and external volumes (created on external disk drives attached to the NSA USB ports).
Create an Internal VolumeClick this to format internal hard drives and create a new volume. All data on the disk(s) will be lost.
Create an External VolumeClick this to format an external hard drive and create a new volume. All data on the disk will be lost.
StatusThis field shows whether the volume is Healthy, Resync, Recovering, Degraded, or Down. See Section 7.3.1 on page 152 for details on a volume's status.
VolumeThe NSA creates the volume name automatically. You can edit it.
Disk ConfigurationThis field shows which disks and data storage system the volume is using.
File SystemThis field displays the file system that an external (USB) volume is using.
Disk(s)Click or roll your mouse over a link in this column to display the following details about the hard drive located in the corresponding hard drive bay.Type: Whether it is an internal or external (USB) hard drive.Model Name: This is the hard disk number that identifies the disk.File System: The file system that an external volume is using Capacity: The total storage space on the disk.
CapacityThis field shows total disk size, the percentage of the volume being used and the percentage that is available.
ActionsThis field displays icons allowing you to edit, scan, repair, expand, or delete a volume. You can also locate or eject an external volume.Note: If you delete a volume, all data in the volume disk(s) is erased.

You see a warning screen before you delete a volume.

Figure 73 Delete a Volume Warning Screen
ZYXEL NSA221 - Storage Screen - 2

text_image Delete Volume 'volume1' ALL Data On this Volume will be DELETED. Are you sure you want to DELETE this Volume? Yes No

7.3 Creating an Internal Volume

Click the Create an Internal Volume button in the Storage screen as shown in Figure 72 on page 149 to open the following screen. Use this screen to create a new NSA internal disk drive volume.

Note: Creating a volume formats the hard drive. All data on the disk will be lost.

Figure 74 Storage > Create an Internal Volume
ZYXEL NSA221 - Creating an Internal Volume - 1

text_image Disk Configuration Volume Name * JBOD RBCD A JBOD volume can be a single disk volume or can be made to span across several disks into a single larger volume. It does not provide any fault tolerance or performance benefits. Volume will be created on disk1 disk2 RAID0 RBCD RC BD Provides data striping (spreading out blocks of each file across multiple disk drives) but no redundancy. This improves performance but does not deliver fault tolerance. If one drive fails then all data in the array is lost. RAID1 RBCD ABCD Provides disk mirroring. Level 1 provides twice the read transaction rate of single disks and the same write transaction rate as single disks. Apply Cancel

The following table describes the labels in this screen.

Table 22 Storage > Create an Internal Volume

Volume NameType a volume name from 1 to 31 characters. To avoid confusion, it is highly recommended that each volume use a unique name.Acceptable characters are all alphanumeric characters, " " [spaces], "_" [underscores], and "." [periods].The first character must be alphanumeric (A-Z 0-9).The last character cannot be a space " ".For an external volume, type a volume name from 1 to 32 single-byte (no Chinese characters allowed for example) ASCII characters. The name cannot be the same as another existing external volume.
JBODUse this if you want maximum storage capacity and/or you have other means of protecting your data. JBOD is the only option if you only have one disk installed. With two disks, you can choose to create a JBOD volume on one of the disks or both.
RAID 0Use this if you want maximum speed for your disks, and/or you have other means of protecting your data. This is only available when you have two hard disks installed.
RAID 1Use this if you want to mirror all data on one disk to the other disk. This is only available when you have two hard disks installed.
Volume will be created onThis field lists all hard disks installed inside the NSA. Select which disks should make up this volume. A disk can only belong to one volume. You do not need to select anything if only one hard disk is installed.
ApplyClick this to save your changes and create the volume.
CancelClick this to exit this screen without saving your changes or creating a volume.

Note: Once you create the first volume on the NSA, it is recommended to restart the NSA for better performance.

7.3.1 Volume Status

You (the administrator) can see the status of a volume in the Status or Storage screens.

The NSA has the following classifications for the status of a volume:

  • Healthy if all disks in the volume are OK and the file system is functioning properly.
  • OK means the USB connected device is functioning properly.
  • Resync when you create a RAID volume.

  • Recovering appears when repairing a RAID 1 volume. (A RAID1 volume was once degraded, but you have installed a new disk and the NSA is restoring the RAID1 volume to a healthy state.)

  • Degraded when a volume is currently down, but can be fixed. Data access may be slower from a degraded volume, so it's recommended that you replace the faulty disk and repair the volume as soon as you can.
  • Inactive when a disk is missing from a RAID 0 volume or a two-disk JBOD volume. The volume is unusable. If you removed one of the disks you should be able to re-install it and use the volume again (as long as you did not change anything on the disk). If a disk has failed, you need to replace it and re-create the whole volume. All data will be lost. See page 340 for how to install or replace a hard drive.
  • Down when a volume is down and can not be fixed.

A down RAID volume cannot be used until you repair or replace the faulty disk(s) in the volume. Degraded means one of the disks in the RAID volume is not available but the volume can still be used. For a degraded volume, you should replace the faulty disk as soon as possible to obtain previous performance. See your Quick Start Guide for more information on replacing a disk.

If it's down, then the only indication is that you can no longer transfer files to/from the shares in the down volume. If it's degraded, then file transfer to/from the shares in the degraded volume will be slower.

Note: There is no explicit message from CIFS that tells users their volume is degraded or down.

7.4 Editing a Volume

Click an internal volume's Edit icon in the Storage screen as shown in Figure 72 on page 149 to open the following screen. Use this screen to change the volume's name.

Figure 75 Storage > Edit
ZYXEL NSA221 - Editing a Volume - 1

text_image Volume Name volume1 Apply Cancel

The following table describes the labels in this screen.

Table 23 Storage > Edit

LABELDESCRIPTION
Volume NameFor an internal volume, type a volume name from 1 to 31 characters. To avoid confusion, it is highly recommended that each volume use a unique name.Acceptable characters are all alphanumeric characters and " "[spaces], "-" [underscores], and "." [periods].The first character must be alphanumeric (A-Z 0-9).The last character cannot be a space " ".For an external volume, type a volume name from 1 to 32 single-byte (no Chinese characters allowed for example) ASCII characters. The name cannot be the same as another existing external volume.
ApplyClick this to save your changes and rename the volume.
CancelClick this to close this screen without saving your changes.

7.5 Creating an External Volume

Click the Create a New External Volume button in the Storage screen as shown in Figure 72 on page 149 to open the following screen. Use this screen to create a new NSA external disk drive volume.

Note: Creating a volume formats the drive. All data on the disk will be lost.

Figure 76 Storage > Create an External Volume
ZYXEL NSA221 - Creating an External Volume - 1

text_image Disk Configuration Volume Name * Available Disk(s) File System FAT32 Apply Cancel

The following table describes the labels in this screen.

Table 24 Storage > Create an External Volume

LABELDESCRIPTION
Volume NameType a volume name from 1 to 31 characters. The name cannot be the same as another existing external volume.Acceptable characters are all alphanumeric characters and " " [spaces], "_" [underscores], and "." [periods].The first character must be alphanumeric (A-Z 0-9).The last character cannot be a space " ".
Available Disk(s)Select the external (USB) device upon which you want to create the volume.
File SystemSelect the file system you want the new volume to use.Windows file systemsFAT32: Newer, and more efficient than FAT16. Supports a volume size of up to 2 TB (Tera Bytes) and individual file sizes of up to 4 GB.FAT16: Compatible with older Windows operating systems. Supports volume and file sizes of up to 2 GB.Linux file systemsEXT2: Older file system.EXT3: The same as EXT2, but adds a journaled file system and is more robust.ReiserFS: Offers better performance for small files.
ApplyClick this to save your changes and create the volume.
CancelClick this to exit this screen without saving changes.

7.5.1 External Disks

You may connect USB storage devices that support the following file systems to the NSA.

  • Windows File Systems: NTFS, FAT32 and FAT16.
  • Linux File Systems: ReiserFS, EXT2, and EXT3.

7.6 Storage Technical Reference

This section provides some background information about the topics covered in this chapter.

7.6.1 Volumes and RAID

A volume is a storage area on a disk or disks. You can create volumes on the internal disks and external disks attached to the USB port(s). You can spread a volume across internal disks but not between internal and external disks.

RAID (Redundant Array of Independent Disks) or JBOD is the storage method that the NSA uses. The storage method you use depends on how many disks you have and how many volumes you want to create. It's important that you consider this carefully as all data is deleted when you re-create a volume.

Note: Back up your data before deleting or re-creating a volume!

For example if you originally have one disk configured as JBOD, and you then install another disk and want to configure the two disks to use RAID 1, you should first back up all your data on the two disks (see the Memeo Autobackup utility on the included CD) and then restore your data later after you create the new volume type.

Below is a table that summarizes some attributes of the various RAID levels as supported on the NSA. For capacity and storage efficiency, "S" is the size of the smallest drive in the array, and "N" is the number of drives in the array.

Storage efficiency assumes all drives are of identical size.

Performance rankings are approximations.

Table 25 RAID Quick Comparison

RAID Level01
Number of Disks22
CapacityS*NS*N/2
Storage Efficiency100%50%
Fault ToleranceNoneYYYY
AvailabilityYYYYY
Read PerformanceYYYYYYY
Write PerformanceYYYYYYY

7.6.2 Choosing a Storage Method for a Volume

The following is a guide to help you choose a storage method for the various number of disks supported on the NSA. See Section 7.6.3 on page 157 for theoretical background on JBOD and the RAID levels used on the NSA. Typical applications for each method are also shown there.

One Disk

If you only have one disk, you must use JBOD. All disk space is used for your data - none is used for backup. If the disk fails, then you lose all the data on that volume (disk). You can add another disk to your one-disk JBOD volume later without having to re-create shares, access rights, and so on. Alternatively, you could create a different JBOD volume if you install a second disk. (and create new shares, access rights and so on).

Two Disks:

You may choose JBOD, RAID 0 or RAID 1. With two disks you could create:

  • up to two JBOD volumes
    • one RAID 0 or RAID 1 volume

- Choose JBOD for flexibility and maximum usage of disk space for data.

- Choose RAID 0 if performance matters more than data security. RAID 0 has the fastest read and write performance but if one disk fails you lose all your data on the volume. It has fast performance as it can read and write to two disks simultaneously. Performance may matter more than data security to gamers for example. This method may also be acceptable for data that is already backed up somewhere else.

- Choose RAID 1 if data security is more important than performance. Since RAID 1 mirrors data onto a second disk, you can recover all data even if one disk fails, but the performance is slower than RAID 0.

7.6.3 Storage Methods

This section contains theoretical background on JBOD and the RAID levels used on the NSA. Redundant Array of Independent Disks (RAID) is a method of storing data on multiple disks to provide a combination of greater capacity, reliability, and/or speed. JBOD (Just a Bunch Of Disks) is not a RAID storage method but it is included in this discussion.

These are some terms that you need to know in order to understand storage systems.

- Mirroring

In a RAID system using mirroring, all data in the system is written simultaneously to two hard disks instead of one. This provides 100% data redundancy as if one disk fails the other has the duplicated data. Mirroring setups always require an even number of drives.

- Duplexing

Like in mirroring, all data is duplicated onto two distinct physical hard drives but in addition it also duplicates the hardware that controls the two hard drives (one of the drives would be connected to one adapter and the other to a second adapter).

- Striping

Striping is the breaking up of data and storing different data pieces on each of the drives in an array. This allows faster reading and writing as it can be done simultaneously across disks. Striping can be done at the byte level, or in blocks. Byte-level striping means that the first byte of the file is sent to the first drive, then the second to the second drive, and so on. Block-level striping means that each file is split into blocks of a certain size and those are distributed to the various drives. The size of the blocks used is also called the stripe size (or block size).

- Parity

In mirroring 50% of the drives in the array are reserved for duplicate data. Parity is another way to allow data recovery in the event of disk failure using calculations rather than duplicating the data. If you have 'n' pieces of data, parity computes an extra piece of data. The 'n+1' pieces of data are stored on 'n+1'drives. If you lose any one of the 'n+1' pieces of data, you can recreate it from the 'n' that remain, regardless of which piece is lost. Parity protection is used with striping, and the "n" pieces of data are typically the blocks or bytes distributed across the drives in the array. The parity information can either be stored on a separate, dedicated drive, or be mixed with the data across all the drives in the array.

Note: In the following figures, A1, A2, A3 and so on are blocks of data from the A file. Similarly, B1, B2, B3 and C1, C2, C3 ar blocks of data from the B and C files.

JBOD

JBOD allows you to combine multiple physical disk drives into a single virtual one, so they appear as a single large disk. JBOD can be used to turn multiple different-sized drives into one big drive. For example, JBOD could convert 80 GB and 100 GB drives into one large logical drive of 180 GB. If you have two JBOD volumes (with one disk in each), a failure of one disk (volume) should not affect the other volume (disk). JBOD read performance is not as good as RAID as only one disk can be read at a time and they must be read sequentially. The following figure

shows disks in a single JBOD volume. Data is not written across disks but written sequentially to each disk until it's full.

Table 26 JBOD

A1B1
A2B2
A3B3
A4B4
DISK 1DISK 2

RAID 0

RAID 0 spreads data evenly across two or more disks (data striping) with no mirroring nor parity for data redundancy, so if one disk fails the entire volume will be lost. The major benefit of RAID 0 is performance. The following figure shows two disks in a single RAID 0 volume. Data can be written and read across disks simultaneously for faster performance.

Table 27 RAID 0

A1A2
A3A4
A5A6
A7A8
DISK 1DISK 2

RAID 0 capacity is the size of the smallest disk multiplied by the number of disks you have configured at RAID 0 on the NSA. For example, if you have two disks of sizes 100 GB and 200 GB respectively in a RAID 0 volume, then the maximum capacity is 200 GB (2 * 100 GB, the smallest disk size) and the remaining space (100 GB) is unused.

Typical applications for RAID 0 are non-critical data (or data that changes infrequently and is backed up regularly) requiring high write speed such as audio, video, graphics, games and so on.

RAID 1

RAID 1 creates an exact copy (or mirror) of a set of data on another disk. This is useful when data backup is more important than data capacity. The following

figure shows two disks in a single RAID 1 volume with mirrored data. Data is duplicated across two disks, so if one disk fails, there is still a copy of the data.

Table 28 RAID 1

A1A1
A2A2
A3A3
A4A4
DISK 1DISK 2

As RAID 1 uses mirroring and duplexing, a RAID 1 volume needs an even number of disks (two or four for the NSA).

RAID 1 capacity is limited to the size of the smallest disk in the RAID array. For example, if you have two disks of sizes 150 GB and 200 GB respectively in one RAID 1 volume, then the maximum capacity is 150 GB and the remaining space (50 GB) is unused.

Typical applications for RAID 1 are those requiring high fault tolerance without need of large amounts of storage capacity or top performance, for example, accounting and financial data, small database systems, and enterprise servers.

RAID and Data Protection

If a hard disk fails and you're using a RAID 1 volume, then your data will still be available (but at degraded speeds until you replace the hard disk that failed and resynchronize the volume). However, RAID cannot protect against file corruption, virus attacks, files incorrectly deleted or modified, or the NSA malfunctioning. Here are some suggestions for helping to protect your data.

  • Place the NSA behind a hardware-based firewall. It should have stateful packet inspection, IDP (Intrusion Detection and Prevention), and anti-virus (like ZyXEL's ZyWALL UTM products for example).
  • Use anti-virus software on your computer to scan files from others before saving the files on the NSA.
  • Keep another copy of important files (preferably in another location).

Network

8.1 Overview

This chapter discusses the network configuration screens. The Network screens allow you to configure TCP/IP and PPPoE settings for the NSA.

8.2 What You Can Do

  • Use the TCP/IP screen (Section 8.4 on page 163) to assign the NSA a dynamic or static IP address and DNS information.
  • Use UPnP port mapping (Section 8.5 on page 166) to automatically configure your Internet gateway's firewall and Network Address Translation (NAT) to allow access to the NSA from the Internet.
  • Use the PPPoE screen (Section 8.6 on page 170) to configure PPPoE settings for a direct Internet connection.

8.3 What You Need to Know

IP Address

The NSA needs an IP address to communicate with other devices on your network. The NSA can get an IP address automatically if you have a device on your network that gives them out. Or you can assign the NSA a static (fixed) IP address.

DNS Server Address

A DNS (Domain Name System) server maps domain names (like www.zyxel.com) to their corresponding numerical IP addresses. This lets you use domain names to access web sites without having to know their IP addresses. The NSA can receive the IP address of a DNS server automatically (along with the NSA's own IP address). You can also manually enter a DNS server IP address in the NSA.

Jumbo Frames

Jumbo frames are Ethernet frames larger than 1500 bytes. They enable data transfer with less overhead. The bigger the frame, the better the network performance. Your network equipment such as computers, switches and routers must be capable of supporting jumbo frames. You also need to enable jumbo frames in all related network devices.

PPPoE

Point-to-Point Protocol over Ethernet (PPPoE) allows the NSA to establish a direct Internet connection if you do not have a router. PPPoE is a dial-up connection. You need a username and password from your Internet Service Provider (ISP) to set up the connection.

Jumbo Frames

To use jumbo frames, your LAN must support 1 Gbps transmissions (Gigabit Ethernet). All of your network devices (computer Ethernet cards and switches, hubs, or routers) must also support the same size of jumbo frames that you specify in the NSA.

Note: If you enable jumbo frames on the NSA in a network that does not support them, you will lose access to the NSA. If this occurs, you will have to restore the factory default configuration. Push the RESET button on the NSA's rear panel and release it after you hear a beep.

In the following example, the NSA has jumbo frames enabled and set to 8KB frames. This means the computer, notebook computer, and switch must also have jumbo frames enabled and be capable of supporting 8KB frames.

Figure 77 Jumbo Frames
ZYXEL NSA221 - Jumbo Frames - 1

flowchart
graph TD
    A["Computer 1"] -->|8KB| B["Router"]
    C["Computer 2"] -->|8KB| B
    B -->|8KB| D["Database with Arrow"]
    B -->|8KB| E["Database with Left Arrow"]

8.4 The TCP/IP Screen

Use the TCP/IP screen to have the NSA use a dynamic or static IP address, subnet mask, default gateway and DNS servers.

Click Network > TCP/IP in the navigation panel to open the following screen.

Note: If you change the NSA's IP address, you need to log in again after you apply changes.

Figure 78 Network > TCP/IP
ZYXEL NSA221 - The TCP/IP Screen - 1

text_image Network - TCP/IP IP Address Dynamic Static IP Address 192.168.1.34 IP Subnet Mask 255.255.255.0 Default Gateway 192.168.1.1 DNS Dynamic Static Primary DNS Server 172.23.5.2 Secondary DNS Server 172.23.5.1 HTTP (Web Configurator) Enable Another HTTP Web Configuration Port Port Number: Jumbo Frames Disabled Enabled 4KB 8KB 9KB Caution: Jumbo Frame is supported in 1 Gbps and higher mode only. Please make sure your host, switch hub, and router support Frames Network Diagnostic Tool Host a.root-servers.net Ping... Apply Reset

The following table describes the labels in this screen.

Table 29 Network > TCP/IP

LABELDESCRIPTION
IP Address
DynamicSelect this option to have the NSA get IP address information automatically.If no IP address information is assigned, the NSA uses Auto-IP to assign itself an IP address and subnet mask. For example, you could connect the NSA directly to your computer. If the computer is also set to get an IP address automatically, the computer and the NSA will choose addresses for themselves and be able to communicate.
StaticSelect this option for the NSA to use fixed TCP/IP information. You must fill in the following fields.
IP AddressType an IP address in this field.
IP Subnet MaskType an IP subnet mask in this field.
Default GatewayType a default gateway address in this field.
DNSDNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. If you have the IP address(es) of the DNS server(s), enter them.
DynamicSelect the option to have the NSA get a DNS server address automatically.
StaticSelect this option to choose a static DNS server address. Type the DNS server IP address(es) into the fields below.
Primary DNS ServerType a primary DNS server IP address.
Secondary DNS ServerType a secondary DNS server IP address.
HTTP (Web Configurator)
Enable Another Web Configuration PortSelect this to configure an additional HTTP port for accessing the web configurator. Specify a number in the Port Number field.
Jumbo FramesJumbo frames improve network performance. You must have a 1 Gbps (Gigabit Ethernet) network that supports jumbo frames. Select the largest size of frame that all of your network devices (including computer Ethernet cards and switches, hubs, or routers) support.When enabled, you can choose between 4 KB, 8 KB, and 9 KB frame sizes.Note: If you enable jumbo frames on the NSA in a network that does not support them, you will lose access to the NSA. If this occurs, you will have to restore the factory default configuration. Push the RESET button on the NSA's rear panel and release it after you hear a beep.
Network Diagnostic ToolUse this section to test the network connection to a particular IP address or domain name. Select an address or type it into the field. Then click Ping to have the NSA send a packet to test the network connection.Successfully pinged host - The NSA is able to "ping" the host, the network connection is OK.Unable to ping host - The NSA is able to "ping" the selected host.
ApplyClick this to save your TCP/IP configurations. After you click Apply, the NSA restarts. Wait until you see the Login screen or until the NSA fully boots and then use the NAS Starter Utility to rediscover it.
ResetClick this to restore your previously saved settings.

8.5 UPnP Port Mapping Screen

Use UPnP (Universal Plug and Play) port mapping to allow access from the WAN to services you select on the NSA. It is recommended that you place the NSA behind an Internet gateway firewall device to protect the NSA from attacks from the Internet (see RAID and Data Protection on page 160 for firewall type suggestions). Many such Internet gateways use UPnP to simplify peer-to-peer network connectivity between devices. UPnP can automatically configure the Internet gateway's firewall and Network Address Translation (NAT) to allow access to the NSA from the Internet.

Figure 79 UPnP for FTP Access

192.168.1.20

ZYXEL NSA221 - UPnP Port Mapping Screen - 1

flowchart
graph LR
    A["Database"] <-->|TCP: 21| B["River"]
    B <-->|TCP: 21| C["Internet"]
    C --> D["Computer"]

In the above example, UPnP creates a firewall rule and NAT port forwarding mapping to send FTP traffic (using TCP port number 21) from the public IP address a.b.c.d to the NSA's private IP address of 192.168.1.20.

Use the NSA's UPnP Port Mapping screen to configure the UPnP settings your Internet gateway uses to allow access from the WAN (Internet) to services you select on the NSA. You can also set which port Internet users need to use in order to access a specific service on the NSA.

Note: To use UPnP port mapping, your Internet gateway must have UPnP enabled.

If your Internet gateway supports Port Address Translation (PAT is sometimes included with a port forwarding feature), you can have the Internet users use a different TCP port number from the one the NSA uses for the service.

Figure 80 UPnP Port Address Translation for FTP Example

192.168.1.20

ZYXEL NSA221 - UPnP Port Mapping Screen - 2

flowchart
graph LR
    A["Storage Server"] <-->|TCP: 21| B["River"]
    B <-->|TCP: 2100| C["Internet"]
    C --> D["Computer"]

In the above example, the Internet gateway uses PAT to accept Internet user FTP sessions on port 2100, translate them to port 21, and forward them to the NSA.

8.5.1 UPnP and the NSA's IP Address

It is recommended that the NSA use a static IP address (or a static DHCP IP address) if you will allow access to the NSA from the Internet. The UPnP-created NAT mappings keep the IP address the NSA had when you applied your settings in the UPnP Port Mapping screen. They do not automatically update if the NSA's IP address changes.

Note: WAN access stops working if the NSA's IP address changes.

For example, if the NSA's IP address was 192.168.1.33 when you applied the UPnP Port Mapping screen's settings and the NSA later gets a new IP address of 192.168.1.34 through DHCP, WAN access stops working because the Internet gateway still tries to forward traffic to IP address 192.168.1.33. Since you can no longer access the NSA from the WAN, you would have to access the NSA from the LAN and re-apply your UPnP Port Mapping screen settings to update the Internet gateway's UPnP port mappings.

Figure 81 UPnP Using the Wrong IP Address
ZYXEL NSA221 - UPnP and the NSA's IP Address - 1

flowchart
graph LR
    A["192.168.1.34"] --> B["192.168.1.33"]
    B --> C["Router"]
    C --> D["INTERNET"]
    D --> E["Computer"]

8.5.2 UPnP and Security

UPnP's automated nature makes it easier to use than manually configuring firewall and NAT rules, but it is also less secure. Using UPnP may make your network more susceptible to snooping and hacking attacks.

8.5.3 The NSA's Services and UPnP

This section introduces the NSA's services which an Internet gateway can use UPnP to allow access to from the Internet.

BitTorrent

BitTorrent is a distributed peer-to-peer file-sharing protocol that the NSA's download service can use. Using UPnP port mapping for BitTorrent lets BitTorrent work faster.

CIFS (Windows File Sharing)

Common Internet File System (CIFS) is a standard protocol supported by most operating systems in order to share files across the network. Using UPnP port mapping for CIFS allows users to connect from the Internet and use programs like Windows Explorer to access the NSA's shares to copy files from the NSA, delete files on the NSA, or upload files to the NSA from the Internet.

If you configure UPnP port mapping to allow CIFS access from the WAN but cannot get it to work, you may also have to configure the Internet gateway to also allow NetBIOS traffic. See Section 6.3 on page 141 for more on CIFS.

FTP

File Transfer Protocol is a standard file transfer service used on the Internet. Using UPnP port mapping for FTP allows remote users to use FTP from the Internet to access the NSA's shares. A user with read and write access to a share can copy files from the share, delete files from the share, or upload files to the share. See Section 9.4 on page 176 for more on FTP. If you use UPnP to allow FTP access from the WAN, you may want to use a different WAN port number (instead of the default of port 21) to make it more secure. Remember to tell the remote users to use the custom port number when using FTP to access the NSA.

HTTP (Web Configurator)

You can use UPnP port mapping to allow access to the NSA's management screens. If you use UPnP to allow web configurator access from the WAN, you may want to use a different WAN port number (instead of the default of port 80) to make it more secure. Remember to use the custom port number when accessing the NSA's web configurator from the Internet.

HTTP (Web Published Shares)

This is the NSA's web publishing feature that lets people access files using a web browser without having to log into the Home screens. Use UPnP port mapping to allow access to these files from the Internet without having to enter a user name or password. See Section 9.7 on page 192 for more on web publishing.

8.5.4 Configuring UPnP Port Mapping

Click Network > UPnP > Port Mapping to display the UPnP Port Mapping screen.

Use this screen to set how the Internet gateway's UPnP feature configure's the Internet gateway's NAT IP address mapping and port mapping settings. These settings allow Internet users connected to the Internet gateway's WAN interface to

access services on the NSA. You can set which port Internet users need to use to access a specific service on the NSA.

Note: Some Internet gateways will delete all UPnP mappings after reboot. So if the Internet gateway reboots, you may need to use this screen again to re-apply the UPnP port mapping.

Figure 82 Network > UPnP > Port Mapping
ZYXEL NSA221 - Configuring UPnP Port Mapping - 1

text_image Network - UPnP Port Mapping UPnP Port Map Settings Note: • In order to use a port number on the gateway device(WAN) that is different from that on the NSA (LAN), your gateway device should support Port Address Translation. • For Distributed Hash Table (DHT) support, the BitTorrent service will also attempt to open the following UDP port: 9089 LAN Service Name LAN Port BitTorrent ▶ 9090 CIFS (Windows File Sharing) 445 FTP 21 HTTP (Web Configurator) 80, HTTP (Web published shares) 80 172.16.26.2 WAN Service Name Enable WAN Access WAN Port BitTorrent ▶ ✓ 9090 CIFS (Windows File Sharing) □ -- FTP □ -- HTTP (Web Configurator) □ -- HTTP (Web published shares) □ -- : This service requires that the LAN port setting is the same as the WAN port setting ○ : This port setting currently conflicts with another service's port. ◆ : This port is being used by another service but will be replaced if you apply this setting. Apply Reset

The following table describes the labels in this screen.

Table 30 Network > UPnP > Port Mapping

LABELDESCRIPTION
LANUse these fields to specify what port the Internet gateway uses to connect from its LAN port to the service on the NSA.
Service NameThis read-only field identifies a service on the NSA.
LAN PortSpecify the port number (1~65,536) the Internet gateway needs to use to connect from its LAN port to the service on the NSA. This is the NSA's internal port number for the service. Changing a service's port number in this screen also changes it in other NSA screens that display it. Similarly, changing a service's port number in another NSA screen also changes it here.
ZYXEL NSA221 - Configuring UPnP Port Mapping - 2The number below this icon is your Internet gateway's WAN IP address (the IP address your Internet gateway uses for connecting to the Internet).
WANUse these fields to specify what port Internet users must use to connect to the Internet gateway's WAN port in order to connect to the service on the NSA.
Service NameThis read-only field identifies a service on the NSA.
Enable WAN AccessSelect this check box to have UPnP configure your Internet gateway to allow access from the Internet to the NSA's service.If you clear this check box, people will not be able to access the NSA's service from the Internet unless you manually configure the Internet gateway's firewall and NAT rules to allow access.
WAN PortWhen you enable WAN access for one of the NSA's services, specify the port number (1~65,536) Internet uses need to use to connect to the Internet gateway's WAN port in order to access the service on the NSA. Whoever wants to access a service on the NSA from the Internet must use this port number.BitTorrent's WAN port must be the same as the LAN port.Make sure there is not another service using TCP protocol with the same port number. SeeAppendix C on page 395for a list of common services and their associated protocols and port numbers.If another device is using the same port (the Internet gateway has the same port number mapped to another LAN IP address), the NSA overwrites it when you apply the setting and WAN users can no longer access the other device.
This icon means the service's LAN and WAN port numbers must be the same.
This icon means another service is using the same port number as this service. Change the port number of one of the services so they use different port numbers.
This icon means another service is using the listed port, but the port the other service is using will be replaced if you apply the setting. The other service will no longer be accessible from the listed port.
ApplyClickApplyto save your changes back to the NSA.
ResetClickResetto begin configuring this screen afresh.

8.6 The PPPoE Screen

Use this screen to configure PPPoE settings for a direct Internet connection.

Click Network > PPPoE in the navigation panel to open the following screen.

PPPoE allows the NSA to establish a direct Internet connection.

Figure 83 Network > PPPoE
ZYXEL NSA221 - The PPPoE Screen - 1

text_image Network - PPPoE Status Status Disabled IP Address N/A IP Subnet Mask N/A Configuration Enable PPPoE to directly connect to the Internet. □ Enable PPPoE Connection Username Password Password (Confirm) Apply Reset

The following table describes the labels in this screen.

Table 31 Network > PPPoE

LABELDESCRIPTION
Status
StatusThis field displays the status of PPPoE connection.
IP AddressThis field displays the IP address of your PPPoE connection.
IP Subnet MaskThis field displays the IP subnet mask of your PPPoE connection.
Configuration
Enable PPPoE ConnectionSelect this option to establish a direct Internet connection for the NSA. You need to enter the username and password as given by your ISP.
UsernameEnter the username exactly as your ISP assigned. If assigned a name in the form user@domain where domain identifies a service name, then enter both components exactly as given.
PasswordEnter the password associated with the username above.
Password (Confirm)Retype the password for confirmation.
ApplyClick this to save your changes.
ResetClick this to restore previously saved settings.

Applications

9.1 Overview

This chapter discusses the features in the Application screens. The NSA contains various applications for file sharing and downloading.

9.2 What You Can Do

  • Use the FTP Server screen (Section 9.4 on page 176) to configure settings for FTP file transfers to/from the NSA.
  • Use the Media Server screen (Section 9.5 on page 178) to share files with media clients.
  • Use the Download Service screen (Section 9.6 on page 179) to download files from the Internet.
  • Use the Web Publishing screen (Section 9.7 on page 192) to publish shares for people to access files using a web browser.
  • Use the Broadcasting screen (Section 9.8 on page 194) to download frequently updated digital content like TV programs, radio talk shows, Podcasts (audio files), and blogs.
  • Use the Print Server screen (Section 9.9 on page 202) to share a printer.
  • Use the Copy/Sync Button screen (Section 9.10 on page 204) to transfer files between a USB device and the NSA.
  • Use the Package screen (Chapter 10 on page 219) to set up additional applications in your NSA. The NSA can download multiple packages/files at once and automatically goes through all the installation steps.
  • Use the Auto Upload screens (Chapter 11 on page 273) to upload files in selected shares to your Flickr and/or YouTube accounts.

9.3 What You Need to Know

FTP

File Transfer Protocol (FTP) is a file transfer service that operates on the Internet. A system running the FTP server accepts commands from a system running an FTP client. FTP is not a secure protocol. Your file transfers could be subject to snooping.

FTPES (File Transfer Protocol over Explicit TLS/SSL)

File Transfer Protocol over Explicit TLS/SSL (FTPES) is a file transfer service that uses either TLS (Transport Layer Security) or SSL (Secure Sockets Layer) for secure transfers across the Internet. It requests for a mutual method of encryption from the FTP server for its file transfer sessions. Your FTP client must be set to use FTPES as in the following example.

Figure 84 FTP Client Example
ZYXEL NSA221 - FTPES (File Transfer Protocol over Explicit TLS/SSL) - 1

text_image Site Manager Select Entry: My Sites New site General Advanced Transfer settings Charset Host: Port: Servertype: FTP - File Transfer Protocol FTP - File Transfer Protocol SFTP - SSH File Transfer Protocol Logontype: FTPS - FTP over implicit TLS/SSL User: FTPES - FTP over explicit TLS/SSL Password: ********** Account: Comments: New Site New Folder Rename Delete Copy Connect OK Discard

Media Server

The media server feature lets anyone on your network play video, music, and photos from the NSA (without having to copy them to another computer). The NSA can function as a DLNA-compliant media server and/or an iTunes server. The NSA streams files to DLNA-compliant media clients or computers using iTunes. The Digital Living Network Alliance (DLNA) is a group of personal computer and electronics companies that works to make products compatible in a home network.

iTunes Server

The NSA iTunes server feature lets you use Apple's iTunes software on a computer to play music and video files stored on the NSA. You can download iTunes from www.apple.com.

Download Service

The NSA's download service downloads files from the Internet directly to the NSA. You do not have to download to your computer and then copy to the NSA. This can free up your computer's system resources.

The NSA can download using these protocols.

  • HTTP: The standard protocol for web pages.
  • FTP: A standard Internet file transfer service.
  • BitTorrent: A popular distributed peer-to-peer files sharing protocol.

BitTorrent

The NSA includes a BitTorrent client for fast downloading and sharing of large files (such as educational public domain videos). With BitTorrent, you share while you're downloading the file. BitTorrent breaks up the file and distributes it in hundreds of chunks. You start sharing the file as soon as you have downloaded a single chunk.

Web Publishing

Web publishing lets you “publish” shares (containing folders and files) on the NSA so people can access the files using a web browser without having to log into the Home screens. This way you can share files with others without them having to know and enter a username and password.

For example, if you want to share photos in a FamilyPhotos share, you could "web publish" it and others could use a web browser to access the photos at http://my-NSA's-IP-Address/MyWeb/FamilyPhotos.

Broadcatching

Broadcasting is the downloading of digital content from Internet feeds. Use broadcatching to have the NSA download frequently updated digital content like TV programs, radio shows, podcasts (audio files), and blogs.

RSS

RSS (Really Simple Syndication) is a format for delivering frequently updated digital content. A channel uses a feed to deliver its contents (items). Subscribe the NSA to a feed to be able to download the contents.

9.4 FTP Server

Use FTP or FTPES (FTP over Explicit TTL/SSL) to upload files to the NSA and download files from the NSA. Click Applications > FTP to open the following screen.

Figure 85 Applications > FTP
ZYXEL NSA221 - FTP Server - 1

text_image Applications - FTP Server FTP Enable FTP Connection Limit 10 Idle Timeout 15 minutes Port Number 21 Connection Limit: 20 Max timeout: 300 minutes Enable Anonymous FTP Access Customize the port range for data transfer. Starting Port * Ending Port * Download/Upload Rate For All Users (include admin) Max. Download Rate 0 KB/s (0=No Limit) Max. Upload Rate 0 KB/s (0=No Limit) Download/Upload Rate For Anonymous Users Max. Download Rate 0 KB/s (0=No Limit) Max. Upload Rate 0 KB/s (0=No Limit) Note: To configure a share to allow anonymous FTP access go to the configure shares page and modify a share's access rights to allow the user 'Anonymous FTP'. Character Set (UTF-8) Note: The NSA uses UTF-8 format for FTP by default. If the NSA's folders or file names do not display correctly in your FTP client, select the appropriate character set here. Apply Reset

The following table describes the labels in this screen.

Table 32 Applications > FTP

LABELDESCRIPTION
FTP
Enable FTPYou can use FTP to send files to the NSA or get files from the NSA. Select this check box to allow users to connect to the NSA via FTP; otherwise clear the check box.

Table 32 Applications > FTP

LABELDESCRIPTION
Connection LimitEnter the maximum number of concurrent FTP connections allowed on the NSA in this field. The connection limit is 20.
Idle TimeoutEnter the length of time that an FTP connection can be idle before timing out. The timeout limit is 300 minutes.
Port NumberThis is the port number used by the NSA for FTP traffic.
Enable Anonymous FTP AccessSelect this check box to allow any user to log into the NSA using 'FTP' or 'anonymous' as a username and no password. Any other name is considered a username, so must be valid and have a corresponding correct password.
Customize the port range for data transferSelect this check box to assign a port range for FTP clients to use when downloading files from the NSA using passive mode.The connection limit is restricted to half of the port numbers within the range if this value is smaller than the one configured in the Connection Limit field. For example, you specified a port range from 1024 to 1029 and configured 10 in the Connection Limit field. The FTP connection limit will only be 3 (6 ports in the range divided by 2) because it is the smaller value.
Starting PortEnter the first port number in the range. Choose from 1024 to 65535.
Ending PortEnter the last port number in the range. Choose from 1024 to 65535.
Download/Upload Rate For All Users (include admin)Select this if you want to limit the download/upload bandwidth for all users who are logged into the NSA, including the administrator.Max. Download Rate - Enter the download speed (in kilobytes/s) that the NSA allows for users who are logged into the NSA.Max. Upload Rate - Enter the upload speed (in kilobytes/s) that the NSA allows for users who are logged into the NSA.
Download/Upload Rate For Anonymous UsersSelect this if you want to limit the download/upload bandwidth for users who log into the NSA using 'FTP' or 'anonymous' as a username and no password.Max. Download Rate - Enter the download speed (in kilobytes/s) that the NSA allows for users who are logged into the NSA.Max. Upload Rate - Enter the upload speed (in kilobytes/s) that the NSA allows for users who are logged into the NSA.
Character SetThe NSA uses UTF-8 (8-bit UCS/Unicode Transformation Format) format for FTP by default. If the NSA's folders, or file names do not display correctly in your FTP client, select the appropriate language encoding here.This setting applies to all FTP client connections to the NSA. It does not affect your Windows/CIFS connections (it will not correct the character display in Windows Explorer).
ApplyClick this to save your changes.
ResetClick this to restore your previously saved settings.

9.5 The Media Server Screen

The Media Server screen allows you to share files with media clients.

Click Applications > Media Server to open the following screen. Use this screen to select shares to publish (share with media clients like the DMA-2500 and iTunes) and turn the iTunes server on or off.

Figure 86 Applications > Media Server
ZYXEL NSA221 - The Media Server Screen - 1

text_image Applications - Media Server Media Server Refresh Status Rebuild Database Status Synchronizing photo/ Number of Music Tracks 25 Number of Photos 403 Number of Videos 13 Share Publish Publish Share Name Publish Music Tracks Publish Photos Publish Videos public ✓ ✓ ✓ ✓ video ✓ ✓ ✓ ✓ photo ✓ ✓ ✓ ✓ music ✓ ✓ ✓ ✓ admin ✓ ✓ ✓ ✓ iTunes Server ✓ Enable iTunes Server Apply Reset

The following table describes the labels in this screen.

Table 33 Applications > Media Server

LABELDESCRIPTION
Media Server
Refresh StatusClick this to update the information in theStatusfield.
Rebuild DatabaseClick this if the media clients cannot see the files in the media server.
StatusThis shows the media server’s current state of activity.Synchronizing displays while the NSA is building the media database.Readymeans the NSA has finished building the database.Stoppeddisplays when the media server is dead and for a short time while the media server is restarted before rebuilding the database.
Number of Music TracksThis is how many music files the media server has to share out to media clients.
Number of PhotosThis is how many photo files the media server has to share out to media clients.

Table 33 Applications > Media Server

LABELDESCRIPTION
Number of VideosThis is how many video files the media server has to share out to media clients.
PublishSelect this to have the media server share a share's media files with media clients.
Share NameThis column lists names of shares on the NSA.
Publish Music TracksSelect this to give media clients access to the share's music files.
Publish PhotosSelect this to give media clients access to the share's photo files.
Publish VideosSelect this to give media clients access to the share's video files.
Enable iTunes ServerCheck this to let anyone on your network use iTunes to play music files in the published shares.
Enable SqueezeCenterThis is available if the SqueezeCenter application is installed using Package Management (see Section 10.4 on page 220).Check this to enable SqueezeCenter.
ApplyClick this to save your changes.
ResetClick this to restore your previously saved settings.

9.6 The Download Service Screen

The Download Service screen allows you to download files from the Internet.

Click Applications > Download Service to open the following screen. Use this screen to manage the NSA's file downloads.

Note: By default, the NSA saves downloads in the admin share's download folder.

Figure 87 Applications > Download Service
ZYXEL NSA221 - The Download Service Screen - 1

text_image Applications - Download Service Download Service Download service allows you to download files from the Internet directly to the NSA. Enable Download Service Apply Enable Download Notify Apply Add Preferences Refresh Delete Pause Resume Task Info Active (0) Inactive (0) Completed (0) Error (0) Status Name Complete(%) Seeds Peers Download Speed Upload Speed Time Left Priority

The following table describes the labels in this screen.

Table 34 Applications > Download Service

LABELDESCRIPTION
Enable Download ServiceUse this option (and click theApplybutton) to turn the download service off or on. If you turn off the service, all downloads are paused. Files currently downloading are queued. Turning on the download service resumes downloads (or restarts them if they are not able to resume).
Enable Download NotifyUse this option (and click theApplybutton) to turn the download service notification off or on. SeeSection 9.11.4 on page 208for more details about this feature.
At the time of writing, the NSA supports RSS 2.0 feeds.Click this to get and subscribe to the NSA channel feed. This enables you to keep track and download the NSA's new contents (items).
AddAfter you find a file to download, copy the file's URL. Then log into the NSA web configurator and go to theApplications > DownloadServerscreen and click this button. A screen opens where you create a new download task. You can paste the file's URL or use a BitTorrent file.
PreferencesClick this to open a screen where you can set the default location for saving downloads and configure your BitTorrent settings.
RefreshClick this to update the information displayed on the screen.
DeleteTo delete download tasks (or manually clear out completed download tasks), select a download task and click this to remove it from the list. A pop-up screen asks you to confirm. ClickApplyto delete orCancelto quit. When you delete a download task, you are given the option to delete the associated files. Selecting this option deletes a downloaded file and in the case of a BitTorrent download task, also deletes the related .torrent file.Use your keyboard's [SHIFT] key to select a range of download tasks. Use the [CTRL] key and click individual download tasks to select multiple individual download tasks.
PauseSelect a downloading item and click this to temporarily stop the download. Paused downloads appear in theDownload Service screen'sInactive tab.Use your keyboard's [SHIFT] key to select a range of download tasks. Use the [CTRL] key and click individual download tasks to select multiple individual download tasks.
ResumeSelect a paused item and click this to continue downloading the file.Select a completed item and click this to re-seed a torrent file or download a file again. If you want to re-seed a BitTorrent task, keep the torrent file and the completed file in their original locations.
Task InfoSelect an item on the list and click this to display information about the download task. SeeSection 9.6.5 on page 191for more details.
The table lists your downloads. Click a column's heading to sort the entries by that criteria.
ActiveClick this to see the list of files the NSA is currently downloading or sharing with other BitTorrent users. The NSA handles a maximum of 10 active tasks at a time (or fewer depending on how much of the NSA's system memory is available). If you add more, they appear in theInactivetab.BitTorrent downloads may appear in theInactivetab for a while before showing in theDownloading tab. The NSA automatically moves completed tasks to theCompletedtab.
InactiveClick this to see the list of files that are queued (waiting in line) for the NSA to download or the downloads that have been manually paused.
CompletedClick this to see the list of files that the NSA has finished downloading.TheLocationcolumn shows where a downloaded file is saved on the NSA. Click on the location link to open the share browser and access the file.
ErrorClick this to see the list of files that the NSA was not able to download. The NSA automatically retries unsuccessful download attempts. The download displays in the error tab when the re-attempts are also unsuccessful and the NSA stops trying to download the file. To try the download again, use theAddbutton to create a new download task.
StatusThe following icons show the download's status.☑:Completed ☑:Seeding ☑:Downloading☐:Queued ☐:Paused ☑:Error ☑:Missing File☐:Start downloading ☑:Delete ItemCompleted:The NSA has downloaded the whole file.Seeding:The download is finished and the NSA is allowing other BitTorrent users to download it.Downloading:The NSA is getting the file.Queued:The download is waiting in line for the NSA to download it.Pause:The download has been manually stopped. Select it and clickResumeto continue it.Error:The NSA was not able to complete the download. Select it and clickResumeto reattempt the download.
NameThis identifies the download file. A “...” indicates an abbreviated name. Hold your cursor over the name to display the full name.
Complete (%)This is the percentage of the file that the NSA has downloaded.
LocationThis appears in theCompletedtab.It displays the path for where the file is saved. Click on the location link to open the share browser and access the file.
SeedsSeeds apply to BitTorrent downloads. This is the number of computers that are sharing the complete file that you are downloading.This value is in the format “Leeches(Seeds)” where Leeches refer to peers that do not have a complete copy of the file yet and are still downloading; Seeds refer to peers that have the complete file.
PeersPeers apply to BitTorrent downloads. This is the number of other computers that are also downloading (and sharing) the file you are downloading.This value is in the format “ConnectedPeers(AllPeers)[Health]” where Connected Peers is the number of computers to which the NSA is connected in order to download the file; AllPeers refer to the total number of computers to which the NSA can connect in order to download the file; Health indicates the availability of the file.
Download SpeedThis is how fast the NSA is getting the file.It is normal for a BitTorrent download to start out with a slow download speed since it has to set up numerous connections. The speed should increase as the download progresses and decrease near the end of the download.
Upload SpeedThis is how fast the NSA is sending the file to other BitTorrent users.
Time LeftThis is how much longer (in hours, minutes, and seconds) it should take to finish the download at the current download speed.
PriorityThis is the download's priority on the NSA. You can set a currently downloading or queued download to high or automatic priority. You can set a download to high priority to have the NSA try to download it before the other files. However the actual download speed depends more on factors like the speed of you Internet connection, the speed of the download source's Internet connection, how many others are trying to download at the same time, the peers and seeds available and general network conditions.
Error CodeThis appears in the Error tab.This shows the tag for the error that occurred.
Error MessageThis appears in the Error tab.This message states what went wrong with the download.

9.6.1 Adding a Download Task

Click Applications > Download Service > Add to open the following screen. Use this screen to specify a file for the NSA to download. Section 4.5 on page 83 provides a tutorial on adding a download task.

Figure 88 Applications > Download Service > Add
ZYXEL NSA221 - Adding a Download Task - 1

text_image Add Download Task From URL Source URL Torrent File Browse... Location of Downloaded Files Share Path Put incomplete downloads in admin /download Move completed downloads to public / Edit Note: 1. BitTorrent jobs are stored in /public/incoming. 2. HTTP/FTP jobs are stored in /public. 3. All jobs triggered by RSS channels create the subfolder in /public using the channel name where it store all files downloaded from that channel. Caution: Do not use the NSA for illegal downloads. Illegal downloading or sharing of files can result in severe civil and criminal penalties. You are subject to the restrictions of copyright laws and any other applicable laws and will bear the consequences of any infringements thereof. ZyXEL takes NO responsibility or liability for your use of the download service feature. Apply Cancel

The following table describes the labels in this screen.

Table 35 Applications > Download Service > Add

LABELDESCRIPTION
Source
URLPaste the URL of the file you want to download into this field. The URL can be for an HTTP, FTP, or BitTorrent download.For a BitTorrent download, you can copy and paste the URL of the .torrent file. The NSA will automatically download the .torrent file and use it. You do not have to manually download the .torrent file or save it to your computer.Note: Make sure the link opens either the file you want or a pop-up window about how to handle the file.It is also OK for the link to open a .torrent file. If you are redirected to a screen that says the download should start in a few seconds, there may be a link to click if the download does not start automatically.See if that link opens the file or the pop-up window.
Torrent FileA “torrent” file has information the NSA uses to do a BitTorrent download. A torrent file uses a .torrent extension. If you already have a torrent file saved on your computer, select the Torrent File option and specify its path or click Browse and look for its location.

Table 35 Applications > Download Service > Add

LABELDESCRIPTION
Location of Downloaded FilesThis shows where the NSA stores new downloads (Put incomplete downloads in) and where the NSA moves completed downloads (Move completed downloads to).TheSharecolumn shows the name of the share where the file is downloaded.ThePathcolumn points to the location in the share where the NSA will save the downloaded files.BitTorrent jobs are stored in/*/incoming (where '*' is a folder that you have set.)HTTP/FTP jobs are stored in /* (where '*' is a folder that you have set.)All jobs triggered by RSS channels create the subfolder in /* using the channel name where it store all files downloaded from that channel (where '*' is a folder that you have set.)
EditClick this to open the following screen where you can set the default folder location where you "Put incomplete downloads in" and "Move complete downloads to":.ZYXEL NSA221 - Adding a Download Task - 2Share- Select the share from the list.Path-Type the folder location in the share directly or clickBrowseto open the following screen and navigate to the file's location.ZYXEL NSA221 - Adding a Download Task - 3Current Location- This is the location of the selected folder.Folder Name- Enter a new folder name and click 📋 to create it.Type- This identifies the item as a folder or file.Name- This is the name of the folder/file.Select a folder. If you don't select a folder, a forward slash (/) displays in thePathfield. All contents within the specified share are automatically selected.ClickApplyto save your settings andCancelto close the screen.

Table 35 Applications > Download Service > Add

LABELDESCRIPTION
ApplyClick this to save your changes.
CancelClick this to return to the previous screen without saving.

9.6.2 Configuring General Settings

Click Applications > Download Service > Preferences to open the following screen. Use this screen to set the default location for saving downloads and configure the download period.

Figure 89 Applications > Download Service > Preferences > General Settings
ZYXEL NSA221 - Configuring General Settings - 1

text_image Preferences General Settings BitTorrent Location of Downloaded Files Share Way Path Put incomplete downloads in admin /download Move completed downloads to public / Edit Note: 1. BitTorrent jobs are stored in /public/incoming. 2. HTTP/FTP jobs are stored in /public. 3. All jobs triggered by RSS channels create the subfolder in /public using the channel name where it store all files downloaded from that channel. Download Period Control Enable Download Period Control Download Service is active in the specified time period (hh:mm - hh:mm) 00 00 00 00 Apply Reset Cancel

The following table describes the labels in this screen.

Table 36 Applications > Download Service > Preferences > General Settings

LABELDESCRIPTION
Location of Downloaded FilesThis shows where the NSA stores new downloads (Put incomplete downloads in) and where the NSA moves completed downloads (Move completed downloads to).TheSharecolumn shows the name of the share where the file is downloaded.ThePathcolumn points to the location in the share where the NSA will save the downloaded files.BitTorrent jobs are stored in */incoming (where '*' is a folder that you have set.)HTTP/FTP jobs are stored in /* (where '*' is a folder that you have set.)All jobs triggered by RSS channels create the subfolder in /* using the channel name where it store all files downloaded from that channel (where '*' is a folder that you have set.)
EditClick this to open the following screen where you can set the default folder location where you "Put incomplete downloads in" and "Move complete downloads to":.ZYXEL NSA221 - Configuring General Settings - 2Share- Select the share from the list.Path-Type the folder location in the share directly or clickBrowseto open the following screen and navigate to the file's location.

Table 36 Applications > Download Service > Preferences > General Settings

LABELDESCRIPTION
ZYXEL NSA221 - Configuring General Settings - 3Current Location - This is the location of the selected folder.Folder Name - Enter a new folder name and click 📋 to create it.Type - This identifies the item as a file or folder.Name - This is the name of the folder/file.Select a folder. If you don't select a folder, a forward slash (/) displays in the Path field. All contents within the specified share are automatically selected.Click Apply to save your settings and Cancel to close the screen.
Download Period ControlThis feature sets the NSA to download files only within a specified time period.
Enable Download Period ControlUse the check box to turn the download period control on or off.
Download Service is active in the time period (hh:mm - hh:mm)Specify the time period for the NSA to download files.Note: If you also configured the Power On/Off Schedule feature in the Power Management screen, make sure your active download period does not conflict with the power-off period.
ApplyClick this to save your changes.
ResetClick this to restore your previously saved settings.
CancelClick this to return to the previous screen without saving.

9.6.3 Configuring the BitTorrent Settings

Click Applications > Download Service > Preferences > BitTorrent to open the following screen. Use this screen to configure BitTorrent settings.

Figure 90 Applications > Download Service > Preferences > BitTorrent
ZYXEL NSA221 - Configuring the BitTorrent Settings - 1

text_image Preferences General Settings BitTorrent Note: For Distributed Hash Table (DHT) support, the BitTorrent service will also attempt to open the following UDP port: 9089 Port Number 9090 Max. download rate 0 KB/s (0=No Limit) Max. upload rate 0 KB/s (0=No Limit) Maximum Number of Active Torrents 10 Maximum Number of Seeding Jobs 10 Maximum Number of Active Connections 500 Keep Sharing While: □ Upload/Download Ratio is ≤ 0 % (Enter -1 for unlimited ratio. Enter 0 to ignore ratio.) ✓ Or Seeding Time is ≤ 60 minutes (Enter -1 for unlimited seeding time. Enter 0 to ignore seeding time.) Edit IP Filter Apply Reset Cancel

The following table describes the labels in this screen.

Table 37 Applications > Download Service > Preferences > BitTorrent

LABELDESCRIPTION
Port NumberAssign a port number for BitTorrent downloads. You can select a number from 2 to 65536. It is recommended to use a port number greater than 1025.
Max. download rateYou may need to limit the bandwidth the NSA uses for BitTorrent downloads if your network's other Internet applications are not getting enough downstream bandwidth. 0 has the NSA impose no restriction.
Max. upload rateYou may need to limit the bandwidth the NSA uses to share files through BitTorrent if your network's other Internet applications are not getting enough upstream bandwidth. 0 has the NSA impose no restriction.If you do not allow any uploads, (for example, you set a limit of 1 KB/s) you will not have a good standing in the BitTorrent community.Note: The settings for maximum download/upload rates would not affect peers accessing the NSA from the same LAN.
Maximum Number of Active TorrentsSpecify how many simultaneous BitTorrent downloads are allowed on the NSA. You can enter a number from 1 to 10.
Maximum Number of Seeding JobsSpecify how many simultaneous seeds are allowed on the NSA. Enter a number from 1 to 10. This value cannot exceed the one you configured in the Maximum Number of Active Torrents field.

Table 37 Applications > Download Service > Preferences > BitTorrent

LABELDESCRIPTION
Maximum Number of Active ConnectionsSpecify how many active connections are allowed on the NSA. Enter a number from 1 to 500. This specifies the number of computers that can connect to the NSA to download files being shared by the NSA.
Keep Sharing WhileWith BitTorrent, the NSA starts sharing a file while you are downloading it. Set how long to continue sharing a file after the NSA finishes the download.SelectUpload/Download Ratioto keep sharing a file until the NSA has uploaded a specific percent compared to the download.SelectSeeding Timeto keep sharing a file for a specific number of minutes after the download finishes.Continuing to share a file helps other BitTorrent users finish downloading it. Sharing out at least as much as you download helps keep you in good standing in the BitTorrent community.Enter -1 to share a file indefinitely. Leave both check boxes blank to have the NSA stop sharing the file as soon as the download finishes.If you select both options, the NSA keeps sharing a file until both conditions exceed the values you configure. For example, you entered 150% in theUpload/Download Ratiofield and 120 minutes in theSeeding Timefield. The NSA keeps sharing a file until it has shared 1.5 times the size of the file and has passed 120 minutes.
Edit IP FilterClick this to enable or disable IP filtering for BitTorrent downloads.Refer toSection 9.6.4 on page 189for information about the fields in this screen.
ApplyClick this to save your changes.
ResetClick this to restore your previously saved settings.
CancelClick this to return to the previous screen without saving.

9.6.4 Edit IP Filter

Use this screen to enable or disable IP filtering for BitTorrent downloads. IP filtering blocks IP addresses known to share fake files. You can either get an IP filter table from a website or use your own table.

Click Edit IP Filter in the Applications > Download Service > Preferences > BitTorrent screen.

Figure 91 Applications > Download Service > Preferences > BitTorrent > Edit IP Filter
ZYXEL NSA221 - Edit IP Filter - 1

text_image Edit IP Filter Enable IP Filter ( Last Update Time : N/A ) Update IP Filter Table File from the Internet Every Week URL Upload IP Filter Table Browse... Upload Download Current IP Filter Table Note: Please upload your list(*.txt, *.dat, *.gz, *.tgz or *.tar.gz) here. It will be saved as /admin/download/ipfilter.dat. Apply Cancel

The following table describes the labels in this screen.

Table 38 Applications > Download Service > Preferences > BitTorrent > Edit IP Filter

LABELDESCRIPTION
Enable IP FilterClick this to enable or disable IP filtering for BitTorrent downloads.
Update IP Filter Table File from the Internet Every WeekSelect this option and enter a URL to use an online IP filter table. You can find an online IP filter table in websites such as http://www.bluetack.co.uk/config/level1.gz.When you change the URL of the online IP filter table, the NSA also performs an update after you click Apply.
Upload IP Filter TableSelect this option to upload your own IP filter table. Use the Browse button to locate the file and click Upload to save it on the NSA.The NSA supports .txt, .dat, .gz, .tgz, and .tar.gz file extensions. The NSA saves the IP filter table as /admin/download/ipfilter.dat.
Download Current IP Filter TableClick this to save a copy of the IP filter table on your computer.
ApplyClick Apply to update the IP filter table from the specified URL.
CancelClick this to return to the previous screen without saving.

9.6.5 Displaying the Task Information

Select an item on the list and click Task Info. Use this screen to check detailed information about the task.

Figure 92 Applications > Download Service > Task Info
ZYXEL NSA221 - Displaying the Task Information - 1

text_image Task Info Detailed Information Status: Pause Name: Christmas Adventure Screensaver (Christmas Adventure Screensaver [mininova].torrent) (BT) Size: 3.42 MB Uploaded/Downloaded Ratio: NaN (0.00 Bytes/0.00 Bytes) Complete(%): 0.00 % Seeds: -- Peers: -- Download Speed: -- Upload Speed: -- Health: 0.000000 Time Left: -- Priority: Auto Comment: Auto-generated torrent by Minino Start Time: 2008-Dec-03 17:11:14 Completed On: 1970-Jan-01 08:00:00 Info-Hash: 52c15b1ba6daa21aac1516145e68c26a2be0c59f Tracker: -- Close

The following table describes the labels in this screen.

Table 39 Applications > Download Service > Task Info

LABELDESCRIPTION
StatusThis is the current status of the task.
NameThis is the name of the task.
SizeThis is the size of the file to be downloaded.
Uploaded/Downloaded RatioThis is the ratio of total uploaded data to downloaded data.
Complete(%)This field displays how much has been downloaded to the NSA.
SeedsThis is the number of computers that are sharing the complete file that you are downloading.
PeersThis is the number of other computers that are also downloading (and sharing) the file you are downloading.
Download SpeedThis field displays how fast the NSA downloads the file.
Upload SpeedThis field displays how fast the NSA uploads the file.
HealthThis field displays how many full copies of the file are available for this task. The NSA can download a file with a higher health value more efficiently. If the health value is less than 1 (0.65 for example), there is no full copy of the file, and the NSA may not be able to complete downloading the file.

Table 39 Applications > Download Service > Task Info

LABELDESCRIPTION
Time LeftThis is the time remaining to complete the task.
PriorityUse this field to set the priority for downloading the task.SelectAutoto have the NSA automatically determine the task's priority.SelectHighto have the NSA download this file before the other files.
CommentEnter a description for this task. ClickApplyto save the description.
Start TimeThis field displays when the NSA started to download files.
Completed onThis field displays when the file was successfully downloaded to the NSA.
Info-HashThis information is used to verify the torrent file.
TrackerThis field displays the tracker that NSA is currently connected to. A tracker is a server used for finding peers sharing the file.
CloseClick this to close the screen.

9.7 The Web Publishing Screen

Use this screen to turn web publishing on or off and select shares to publish. Click Applications > Web Publishing to open the following screen.

Figure 93 Applications > Web Publishing
ZYXEL NSA221 - The Web Publishing Screen - 1

text_image Web Publishing Disable Web Publishing Enable Web Publishing Support HTTPS Port Number 80 Note: The format of URL: "http://IP_Address:Port_Number/Share_Name/", "https://IP_Address/Share_Name/" Unpublished Shares admin music photo video Published Shares public ← Unpublish Selected Share(s) Publish Selected Share(s) → Apply Reset

The following table describes the labels in this screen.

Table 40 Applications > Web Publishing

LABELDESCRIPTION
Web Publishing
Disable / Enable Web PublishingTurn on web publishing to let people access files in the published shares using a web browser, without having to log into the Home screens.
Support HTTPSSelect this to allow users to use web browser security for connections to the web-published shares. In order to use secured connections users must use "https://" in the NSA's web address and install the NSA's public key certificate.
Port NumberSpecify a port number for accessing the published share websites hosted on the NSA. If you enter a number other than 80, make sure you include it when telling others how to access the web-published share. For example, say you specified port 8080, the NSA's IP address is 192.168.1.23, and the name of the web-published share is FamilyPhotos. You would have to enter "http://192.168.1.23:8080/MyWeb/FamilyPhotos/" in your browser's address bar to access the share's web page.
Unpublished SharesThis list box displays the shares that the NSA does not publish for web browser access.
Publish Selected Share(s)Select shares in the Unpublished Shares box and click this to let people access files in the published shares using a web browser, without logging into the Home screens. Use the [SHIFT] key to select a range of entries. Hold down the [CTRL] key to select multiple individual entries.
Published SharesThis list box displays the shares people can access using a web browser, without logging into the Home screens.
Unpublish Selected Share(s)Select shares in the Published Shares box and click this to not let people access using a web browser without logging into the Home screens. Use the [SHIFT] key to select a range of entries. Hold down the [CTRL] key to select multiple individual entries.
ApplyClick this to save your changes.
ResetClick this to restore your previously saved settings.

Note: If you installed php-MySQL-phpMyAdmin through the Package Management screen (Section 10.4 on page 220) and enable it, you can use PHP and MySQL in your published web page.

9.8 The Broadcatching Screen

This screen displays the NSA's subscribed channels and the associated contents.

  • The NSA saves a channel's downloaded items in a folder named after the channel.
  • The NSA creates the channel folders in the same destination as the download service. See Section 9.6.2 on page 185 to change the destination for saving downloads.
  • The NSA's media server feature makes it easy for users on your network to play the broadcatching files you download. See Section 9.11.1 on page 205 for more on the media server.
  • If you add a channel that contains a torrent file, the NSA downloads the torrent file (.torrent) and transfers it to Download Service (Section 9.6 on page 179) and start the BitTorrent download task accordingly.

Click Applications > Broadcasting to open the following screen.

Figure 94 Applications > Broadcasting
ZYXEL NSA221 - The Broadcatching Screen - 1

text_image Applications - Broadcasting Broadcasting Broadcasting has the NSA download frequently updated digital contents like TV programs, radio talk shows, Podcasts (audio files) and blogs with RSS feeds. Add Channel Delete Channel Refresh Channel Edit Channel :Start downloading :Delete Item Channel Name C&D Top 10 Podcast Top 3 Results Item Name Published Date Description Actions May 13, 2009 (...) 2009-05-13 15:03 Signs you're immature. May 13, 2009 (...) 2009-05-13 15:02 Signs you're immature. May 13, 2009 (...) 2009-05-13 15:01 Signs you're immature. May 13, 2009 (...) 2009-05-13 15:00 Signs you're immature. May 12, 2009 (...) 2009-05-12 13:41 Signs that you partied too much, too long, too hard. May 12, 2009 (...) 2009-05-12 13:40 Signs that you partied too much, too long, too hard. May 12, 2009 (...) 2009-05-12 13:39 Signs that you partied too much, too long, too hard. May 12, 2009 (...) 2009-05-12 13:38 Signs that you partied too much, too long, too hard. May 11, 2009 (...) 2009-05-11 15:35 Taray quotes.

The following table describes the labels in this screen.

Table 41 Applications > Broadcasting

LABELDESCRIPTION
Add ChannelWhen you find a channel to subscribe to, copy the URL of the channel's feed and click this button. A screen opens for you to subscribe to the feed. When you are done, the feed's channel and contents display in theApplications > Broadcatchingscreen.
Delete ChannelSelect a channel and clickDelete Channelto remove the channel from the NSA. Any of the channel's items that you have already downloaded stay in the channel's folder (in theadminshare's downloadfolder).
Refresh ChannelSelect a channel and clickRefresh Channelto check for new files.
Edit ChannelSelect a channel and clickEdit Channelto open a screen where you can set the channel's download and delete policies.
The table lists channels and their files. Click a column's heading to sort the entries by that criteria.
Channel NameThis identifies the channel. A channel displays in red if there was an error the last time the NSA attempted to connect to it. When this happens, you can select the channel and clickRefresh Channelto have the NSA reattempt to connect to it. Select a channel to see its available files. A “...” indicates an abbreviated name. Hold your cursor over the name to display the full name.
Item NameThese are the downloadable files. The following icons show the file's status in the NSA.Completed: The NSA has downloaded the whole file. Double-click the item to go to theDownload Servicescreen where you can see the file's name and location.Seeding: The NSA downloaded the complete file and NSA is sharing it with other BitTorrent users. Double-click the item to go to theDownload Servicescreen.Downloading: The NSA is downloading the file. Double-click the item to go to theDownload Servicescreen.Queued: The file is waiting in line for the NSA to download it. Double-click the item to go to theDownload Servicescreen.Pause: The download has been manually stopped. Double-click the item to go to theDownload Servicescreen.Missing File: The NSA could not find the file.Error: The NSA automatically retries unsuccessful download attempts. The status displays as error when the re-attempts are also unsuccessful and the NSA stops trying to download the file. To try the download again, use theAddbutton to create a new task.Note: A ... indicates an abbreviated file name. Hold your cursor over the name to display the full name.

Table 41 Applications > Broadcasting

LABELDESCRIPTION
Published DateThis is when the file was made available for download.
DescriptionThis is the publishers introduction for the file.
ActionsStart Downloading: Click this to add the file to the NSA's download queue or check the file's status in the NSA's download service.Click the Delete icon to remove the file from the channel's list.

9.8.1 Adding a Broadcatching Channel

At the time of writing, the NSA supports RSS 2.0 feeds. Websites with a feed usually display a feed icon (shown next). Copy and paste the feed's URL into the Applications > Broadcatching > Add Channel screen and you can download new files as they are added.

Figure 95 Feed Icon
ZYXEL NSA221 - Adding a Broadcatching Channel - 1

A channel uses a feed to deliver its contents (items). Subscribe the NSA to a feed to be able to download the contents.

Click Applications > Broadcasting > Add Channel to open the following screen. Use the Add Channel screen to subscribe the NSA to a channel's feed so you can view the channel. You also select policies for downloading and deleting the channel's items. Section 4.6 on page 99 provides a tutorial on adding a broadcasting channel.

Figure 96 Applications > Broadcasting > Add Channel
ZYXEL NSA221 - Adding a Broadcatching Channel - 2

text_image Subscribe to Channel Feed Please enter the url address of the feed you want to subscribe to * Download Policy Download All Items Delete Policy ● Manual ○ Keep last of items Location of Downloaded Files Share Path Put incomplete downloads in admin /download Move completed downloads to public / Edit Note: 1. BitTorrent jobs are stored in /public/incoming. 2. HTTP/FTP jobs are stored in /public. 3. All jobs triggered by RSS channels create the subfolder in /public using the channel name where it store all files downloaded from that channel. Apply Cancel

The following table describes the labels in this screen.

Table 42 Applications > Broadcasting > Add Channel

LABELDESCRIPTION
Subscribe to Channel FeedPaste (or type) the URL of the feed for the channel to which you want to subscribe into this field. This is read-only in the Preferences screen.Note: Make sure the link goes to the actual RSS feed instead of to another list of links or information about the channel.One way to test this is by clicking the link. Clicking an actual RSS feed link opens a screen of XML code (in browsers without an RSS feed aggregator) or a window where you can add the RSS feed (in browsers with an RSS feed aggregator).
Download PolicySet which of the channel's items the NSA downloads.Download All Items: Download every file in the feed.Download Only New Items: Download new files from today on.Manually Choose Items for Download: Only download individual files you select later in the Applications > Broadcatching screen.

Table 42 Applications > Broadcasting > Add Channel

LABELDESCRIPTION
Delete PolicySet how the NSA handles deleting the items downloaded from the channel.Manual: Only delete individual files you select later in the Applications > Broadcatching screen.Keep last N of items: Select this to set the NSA to only keep a number of the channel's most recent files. When this number has been reached, if the NSA downloads another file from the channel, it deletes the oldest file from the NSA.
Location of Downloaded FilesThis shows where the NSA stores new downloads (Put incomplete downloads in) and where the NSA moves completed downloads (Move completed downloads to).The Share column shows the name of the share where the file is downloaded.The Path column points to the location in the share where the NSA will save the downloaded files.BitTorrent jobs are stored in */incoming (where '*' is a folder that you have set.)HTTP/FTP jobs are stored in /* (where '*' is a folder that you have set.)All jobs triggered by RSS channels create the subfolder in /* using the channel name where it store all files downloaded from that channel (where '*' is a folder that you have set.)

Table 42 Applications > Broadcasting > Add Channel

LABELDESCRIPTION
EditClick this to open the following screen where you can set the default folder location where you “Put incomplete downloads in” and “Move complete downloads to”:.ZYXEL NSA221 - Adding a Broadcatching Channel - 3Share - Select the share from the list.Path - Type the folder location in the share directly or clickBrowse to open the following screen and navigate to the file's location.ZYXEL NSA221 - Adding a Broadcatching Channel - 4Current Location - This is the location of the selected folder.Folder Name - Enter a new folder name and click 📋 to create it.Type - This identifies the item as a file or folder.Name - This is the name of the folder/file.Select a folder. If you don't select a folder, a forward slash (/) displays in thePath field. All contents within the specified share are automatically selected.ClickApplyto save your settings and Cancel to close the screen.
ApplyClick this to save your changes.
CancelClick this to return to the previous screen without saving.

9.8.2 Editing a Broadcatching Channel

Click Applications > Broadcatching, then select a channel and click Edit Channel to open a similar Edit screen. Use the Edit Channel screen to change the download or delete policies.

Figure 97 Applications > Broadcasting > Edit Channel
ZYXEL NSA221 - Editing a Broadcatching Channel - 1

text_image Settings Channel Name http://feeds.themerlinshow.c... URL http://feeds.themerlinshow.com/TheMerlinShow Download Policy Download All Items Delete Policy Manual Keep last of items Location of Downloaded Files Share Path Put incomplete downloads in admin /download Move completed downloads to public / Edit Note: 1. BitTorrent jobs are stored in /public/incoming. 2. HTTP/FTP jobs are stored in /public. 3. All jobs triggered by RSS channels create the subfolder in /public using the channel name where it store all files downloaded from that channel. Apply Reset Cancel

The following table describes the labels in this screen.

Table 43 Applications > Broadcasting > Edit Channel

LABELDESCRIPTION
Channel NameThis is the name of the feed for the channel to which you want to subscribe into this field. This is read-only.
URLThis is the address of the channel.
Download PolicySet which of the channel's items the NSA downloads.Download All Items: Download every file in the feed.Download Only New Items: Download new files from today on.Manually Choose Items for Download: Only download individual files you select later in theApplications > Broadcasting screen.
Delete PolicySet how the NSA handles deleting the items downloaded from the channel.Manual: Only delete individual files you select later in theApplications > Broadcasting screen.Keep last N of items: Select this to set the NSA to only keep a number of the channel's most recent files. When this number has been reached, if the NSA downloads another file from the channel, it deletes the oldest file from the NSA.

Table 43 Applications > Broadcasting > Edit Channel

LABELDESCRIPTION
Location of Downloaded FilesThis shows where the NSA stores new downloads (Put incomplete downloads in) and where the NSA moves completed downloads (Move completed downloads to).TheSharecolumn shows the name of the share where the file is downloaded.ThePathcolumn points to the location in the share where the NSA will save the downloaded files.BitTorrent jobs are stored in/*/incoming (where '*' is a folder that you have set.)HTTP/FTP jobs are stored in /* (where '*' is a folder that you have set.)All jobs triggered by RSS channels create the subfolder in /* using the channel name where it store all files downloaded from that channel (where '*' is a folder that you have set.)
EditClick this to open the following screen where you can set the default folder location where you "Put incomplete downloads in" and "Move complete downloads to":.ZYXEL NSA221 - Editing a Broadcatching Channel - 2Share- Select the share from the list.Path-Type the folder location in the share directly or clickBrowseto open the following screen and navigate to the file's location.ZYXEL NSA221 - Editing a Broadcatching Channel - 3Current Location- This is the location of the selected folder.Folder Name- Enter a new folder name and click 📋 to create it.Type- This identifies the item as a file or folder.Name- This is the name of the folder/file.Select a folder. If you don't select a folder, a forward slash (/) displays in thePathfield. All contents within the specified share are automatically selected.ClickApplyto save your settings andCancelto close the screen.

Table 43 Applications > Broadcasting > Edit Channel

LABELDESCRIPTION
ApplyClick this to save your changes.
CancelClick this to return to the previous screen without saving.

9.9 The Print Server Screen

Use the Print Server screen to view and manage the NSA's list of printers and print jobs.

Click Applications > Print Server to open the following screen.

Figure 98 Applications > Print Server
ZYXEL NSA221 - The Print Server Screen - 1

text_image Applications - Print Server Print Server Refresh :Rename :Cancel Job :Delete Status Name Actions on-line Canon_PRT_1

The following table describes the labels in this screen.

Table 44 Applications > Print Server

LABELDESCRIPTION
RefreshClick this to update the list of printers and print jobs.
The table lists printers and their queued print jobs. Click a column's heading to sort the entries by that criteria.
StatusThis fields shows whether the printer is connected and turned on (on-line) or not (off-line).
NameThis identifies the printer. Each printer connected to the NSA must use a unique name.
ActionsRename: Click this to change the name the NSA uses for the printer.Cancel Job: Click this to remove all print jobs from the NSA queue for a particular printer. However, since the NSA sends print jobs to the printer as soon as it can, this button may only have an effect if there are very large or many print jobs in the queue. To stop a print job that has already started, you may have to turn off the printer.Delete: Click this to remove a printer from the NSA's printer list. To add the printer back into the list, disconnect the printer from the NSA's USB port and reconnect it. If that does not work, disconnect the USB port and turn off the printer's power. Then reconnect the printer and turn it back on.

9.9.1 Print Server Rename

Click Applications > Print Server and a printer's Rename icon to open the following screen. Use this screen to change the name the NSA uses for the printer.

Figure 99 Applications > Print Server > Rename
ZYXEL NSA221 - Print Server Rename - 1

text_image Rename Printer Name: limit 15 characters Note: Only alphanumeric characters, and underscore (_) are acceptable Apply Cancel

The following table describes the labels in this screen.

Table 45 Applications > Print Server > Rename

LABELDESCRIPTION
NameType a new name to identify the printer. The name must be unique from all the other names of printers connected to the NSA.
ApplyClick this to save your changes.
CancelClick this to return to the previous screen without saving.

9.10 The Copy/Sync Button Screen

The Copy/Sync button on the front panel allows you to copy or synchronize files between a connected USB device and the NSA.

Click Applications > Copy/Sync Button to open the following screen.

Figure 100 Applications > Copy/Sync Button
ZYXEL NSA221 - The Copy/Sync Button Screen - 1

text_image Applications - Copy/Sync Button Copy Settings Press and release the button to copy data between the USB storage and NSA copy target. NSA Copy Target public USB Volume Multi-Flash-Reader-1-0 Copy Direction USB -> NSA ✓ Create a New Folder for Copied Files Backup Files to be Replaced Sync Settings Press and hold the button until you hear a beep to synchronize data between the USB storage and NSA sync target. NSA Sync Target public USB Volume Multi-Flash-Reader-1-0 Sync Direction NSA <-> USB □ Backup Files to be Replaced or Removed Apply Reset

The following table describes the labels in this screen.

Table 46 Applications > Copy/Sync Button

LABELDESCRIPTION
Copy Settings
NSA Copy TargetSelect the NSA share to use with the copy function.
USB VolumeIf your USB device has multiple partitions, select which partition to use with the copy function.
Copy DirectionSelect USB -> NSA to copy files from your USB device to the NSA.Select NSA -> USB to copy files from the NSA to your USB device.
Create a New Folder for Copied FilesSelect this option to place the copied files in a new folder.The name of the folder created for the copied files consists of the date and time of the copy in year_month_day_hour_minute_second format.
Backup Files to be ReplacedThis option is only available if you do not select Create a New Folder for Copied Files. Select this option to save the files that will be replaced by the source files.

Table 46 Applications > Copy/Sync Button

LABELDESCRIPTION
Backup TargetSelect a share in which to save the backup files.Note: The NSA will not create a new folder to store the backup files. It is recommended to create a specific share (such as “backup”) for backup purposes.
Sync Settings
NSA Sync TargetSelect the NSA share to use with the synchronization function.
USB VolumeIf your USB device has multiple partitions, select which partition to use with the synchronization function.
Sync DirectionSelect USB -> NSA to synchronize files from your USB device to the NSA.Select NSA -> USB to synchronize files from the NSA to your USB device.Select NSA <-> USB to synchronize files in both directions simultaneously.
Backup Files to be Replaced or RemovedSelect this option to save the files that will be replaced by the source files.
Backup TargetSelect a share in which to save the backup files.Note: The NSA will not create a new folder to store the backup files. It is recommended to create a specific share (such as “backup”) for backup purposes.
ApplyClick this to save your changes.The configuration file is saved on the USB device.
ResetClick this to restore your previously saved settings.

9.11 Technical Reference

This section provides technical background information on the topics discussed in this chapter.

9.11.1 Sharing Media Files on Your Network

The media server feature lets anyone on your network play video, music, and photos from the NSA (without having to copy them to another computer). The NSA can function as a DLNA-compliant media server and/or an iTunes server. The NSA streams files to DLNA-compliant media clients or computers using iTunes. The Digital Living Network Alliance (DLNA) is a group of personal computer and

electronics companies that works to make products compatible in a home network.

  • Publish shares to let others play the contained media files.
  • The media server is a convenient way to share files you download using the broadcatching service (see Section 9.8 on page 194).
  • Hardware-based media clients like the DMA-2500 can also play the files. See Section 18.4 on page 366 for the supported multimedia file formats.

Note: Anyone on your network can play the media files in the published shares. No user name and password or other form of security is used. The media server is enabled by default with the video, photo, and music shares published.

Songs from the iTunes Store

After using iTunes on your computer to download songs from Apple's iTunes Store, you can copy them to the NSA. Many of these songs have DRM (Digital Rights Management). At the time of writing, you can use your Apple account ID and password to authorize up to a total of five computers to play the files. To authorize a computer, open iTunes and click Store > Authorize Computer.

A link for the NSA in iTunes under SHARED. Click it to display the NSA's published media files as shown next.

Figure 101 NSA link in iTunes
ZYXEL NSA221 - Songs from the iTunes Store - 1

text_image File Edit View Controls Store Advanced Help iTunes View LIBRARY Music Movies TV Shows Podcasts Radio STORE iTunes Store SHARED nsa PLAYLISTS Party Shuffle Name Time Artist Album Annie's Song 3:49 «~«a» aù ~5Âê I Can Wait Forever 5:11 Air Supply The Defini Every Woman In the World 3:30 Air Supply Can't Take My Eyes Off You 3:23 Al Green 10 Things The Name Of The Game 4:56 Amanda Seyfried & S... Mamma M Honey, Honey 3:07 Amanda Seyfried, As... Mamma M Money, Money, Money 3:07 Amanda Seyfried, As... Mamma M Gimme! Gimme! Gimme! (A Man Af 3:53 Amanda Seyfried, As... Mamma M Music to watch girls go by 2:36 Andy Williams The Best o Walk on by 2:48 Aretha Franklin Bandits Of I Write The Songs 3:55 Barry Manilow Ain't No Sunshine 2:03 Bill Withers Smooth Ja Chances Are 3:22 Bob Marley We're all alone 4:04 Boz Scaggs Some Cha

9.11.2 Download Service

The NSA's download service downloads files from the Internet directly to the NSA. You do not have to download to your computer and then copy to the NSA. This can free up your computer's system resources. The download service also handles your broadcasting downloads. See Section 9.8 on page 194 for information on broadcasting.

The NSA can download using these protocols.

  • HTTP: The standard protocol for web pages.
  • FTP: A standard Internet file transfer service.
  • BitTorrent: A popular distributed peer-to-peer files sharing protocol.

Note: Do not use the NSA for illegal purposes. Illegal downloading or sharing of files can result in severe civil and criminal penalties. You are subject to the restrictions of copyright laws and any other applicable laws and will bear the consequences of any infringements thereof. ZyXEL bears NO responsibility or liability for your use of the download service feature.

Torrent Files

The NSA needs a “.torrent” file for BitTorrent to download a file. The torrent file gives the NSA information about the file to be downloaded (and shared) and the tracker(s) (computers) that coordinates the distribution of the file.

When you add a BitTorrent download task in the NSA's web configurator screens, you can copy and paste the URL of the torrent file. The NSA automatically downloads the torrent file and saves it in a torrent folder within the folder where the NSA stores downloaded files (the admin share's download folder by default).

If you already have the torrent file saved on your computer, you can just specify its location when adding a download task through the web configurator. Another method is to use FTP or a CIFS program (Windows Explorer for example) to copy the torrent file into the torrent folder. The NSA automatically uses the torrent file.

After your BitTorrent download and sharing are finished, you can go to the incoming folder within the destination share or folder and delete the .torrent file if you need to free up hard disk space.

The link capture browser plugin is an add-on feature for your web browser. Use the plugin to directly add a file's URL to the NSA's download service.

Note: The link capture browser plugin is located in the included CD.

The following screen displays how the plugin works.

Figure 102 Link Capture Browser Plugin
ZYXEL NSA221 - Link Capture Browser Plugin - 1

text_image Download this torrent ↑14 ↔1 ↓5364 CONTENTS CREATOR Sponsor this Content VISIT THE WEBSITE Date: April 06 2008 Size: 45 MB Discuss: 2 posts in 1 topic Format: jpg Open Link in New Window Open Link in New Tab Bookmark This Link Save Link As... Send Link... Copy Link Direction Send to NSA Properties Pictures Podcasts Short Form Video Sounds - Samples

Instead of copying and pasting a file's URL to the NSA's download service, you can right-click on the URL in the web browser and select Send to NSA. The URL is then added to the NSA's download service list.

See Section 4.5.2 on page 86 and Section 4.5.3 on page 91 for tutorials about installing and using the link capture browser plugin.

Note: At the time of writing the plugin supports Internet Explorer 6.0/7.0 and Mozilla Firefox 2.0/3.0; it does not support Windows 7.

9.11.4 Download Service Notification

Use the download service notification to keep track of downloaded files on the NSA. You can subscribe to the NSA's download list on your computer. When the NSA finishes downloading new files, your RSS reader displays the information and links for the files. You can also download the files from the RSS reader to your computer.

See Section 4.5.5 on page 95 for a tutorial about using the download service notification.

In the Download Service screen, select Enable Download Notify and click Apply. An RSS feed icon appears. Click the icon to subscribe to the NSA's download list.

Note: The download service notification only keeps track of files downloaded via BitTorrent.

Figure 103 Download Service Notification
ZYXEL NSA221 - Download Service Notification - 1

text_image Applications - Download Service Download Service Download service allows you to download files from the Internet directly to the NSA. Enable Download Service Apply Enable Download Notify Apply Add Preferences Refresh Delete Pause Resume Task Info Active (0) Inactive (0) Completed (0) Error (0) Status Name Complete(%) Seeds Peers Download Speed Upload Sp

9.11.5 BitTorrent Security

When you download using BitTorrent, you reveal your IP address. This increases the risk of hacking attacks, which can be protected against by a good firewall.

Use a Hardware-based Firewall

Place a hardware-based firewall between your network and the Internet (a software-based firewall on your computer would just protect the computer itself, not the NSA since your computer is not between your NSA and the Internet).

Figure 104 Firewall
ZYXEL NSA221 - Use a Hardware-based Firewall - 1

flowchart
graph LR
    A["Router"] --> B["Rugger"]
    C["Router"] --> B
    D["Router"] --> B
    E["Router"] --> B
    F["Internet"] --> G["Malicious Packets"]
    H["Viruses"] --> G
    I["Hackers"] --> G
    style A fill:#f9f,stroke:#333
    style C fill:#f9f,stroke:#333
    style D fill:#f9f,stroke:#333
    style E fill:#f9f,stroke:#333
    style F fill:#ccf,stroke:#333
    style G fill:#cff,stroke:#333
    style H fill:#ffc,stroke:#333
    style I fill:#ffc,stroke:#333

Ideally your firewall should have the following:

  • Stateful packet inspection to control access between the Internet and your network and protect your NSA (and computers) from hacking attacks.
  • IDP (Intrusion Detection and Prevention) to detect malicious packets within normal network traffic and take immediate action against them.
  • Anti-virus to check files you download for computer viruses.

BitTorrent and Your Firewall

The anti-virus feature on a firewall probably cannot check BitTorrent downloads for viruses, so use anti-virus software on your computer to scan the NSA for viruses.

When you download using BitTorrent, many other BitTorrent users are also trying to download the file from you. The firewall slows this down because by default, it only allows traffic from the Internet in response to a request that originated on the LAN (it lets you get files from the Internet and blocks those on the Internet from getting files from you).

Figure 105 Firewall Blocking Incoming BitTorrent Requests
ZYXEL NSA221 - BitTorrent and Your Firewall - 1

flowchart
graph TD
    A["Router"] -->|Incoming BitTorrent requests blocked| B["Internet"]
    C["Computer"] -->|Incoming BitTorrent requests blocked| B
    D["Server"] -->|Incoming BitTorrent requests blocked| B
    E["Container"] -->|Incoming BitTorrent requests blocked| B
    B -->|Outgoing BitTorrent request allowed| F["Internet"]
    B -->|Corresponding BitTorrent reply allowed| G["Internet"]

To speed up BitTorrent file transfers, configure your firewall's port forwarding to send incoming TCP port 9090 and UDP port 9089 connections to the NSA. You probably need to use your firewall's HTML (web-based) configuration interface to

set this up (see the firewall's manual for details). You may also have to configure a corresponding firewall rule.

Figure 106 Firewall Configured to Allow Incoming BitTorrent Requests
ZYXEL NSA221 - BitTorrent and Your Firewall - 2

flowchart
graph TD
    A["Incoming BitTorrent requests allowed"] --> B["Internet"]
    C["Other incoming traffic blocked"] --> D["Router"]
    E["Computer"] --> F["Switch"]
    G["Server"] --> F
    F --> H["Cloud with Ethernet"]
    style A fill:#f9f,stroke:#333
    style C fill:#ccf,stroke:#333
    style E fill:#cfc,stroke:#333
    style G fill:#fcc,stroke:#333
    style B fill:#ffc,stroke:#333
    style F fill:#cff,stroke:#333
    style H fill:#fcf,stroke:#333

9.11.6 Web Publishing Example

This example covers how to configure the Web Publishing screen to let people use a web browser to access a share named FamilyPhotos without logging into the Home screens and shows how to access the share through the Internet.

1 Click Applications > Web Publishing and configure the screen as shown (enable the web publishing and move FamilyPhotos over to Published Shares) and click Apply.

Figure 107 Applications > Web Publishing (Example)
ZYXEL NSA221 - Web Publishing Example - 1

text_image Applications - Web Publishing Web Publishing Disable Web Publishing Enable Web Publishing Support HTTPS Port Number 80 Note: The format of URL: "http://IP_Address:Port_Number/Share_Name/", "https://IP_Address/Share_Name/" Unpublished Shares Jimmy Jimmy2 admin music photo public video Published Shares FamilyPhotos ← Unpublish Selected Share(s) Publish Selected Share(s) → Apply Reset

2 Now open your web browser and type in the address of the NSA's FamilyPhotos web page. In this example, the NSA's IP address is 192.168.1.33, and the name of the web-published share is FamilyPhotos. So you would enter "http://192.168.1.33/MyWeb/FamilyPhotos/" in your browser's address bar. Then press [ENTER] or click Go. A screen displays listing the share's files.

Figure 108 Browsing to an NSA Share Example
ZYXEL NSA221 - Web Publishing Example - 2

text_image Name Last modified Size Parent Directory BR20090508b.html cau2=403tNull 12-May-2009 14:40 43K BR20090508b.zip 12-May-2009 14:41 20M © Copyright 2009 by ZyXEL Communications Corp Done
  • Click a file's link to open the file.
  • Right-click a file's link and select Save Target As.. (in Internet Explorer) to save a copy of the file.
  • Click a label in the heading row to sort the files by that criteria.
  • To customize how the page looks and works, create an index.html or index.htm file and store it in the share.

9.11.7 Web Publishing

Web publishing lets you “publish” shares (containing folders and files) on the NSA so people can access the files using a web browser without having to log into the Home screens. This way you can share files with others without them having to know and enter a user name and password.

For example, if you want to share photos in a FamilyPhotos share, you could "web publish" it and others could use a web browser to access the photos at http://my-NSA's-IP-Address/MyWeb/FamilyPhotos.

Note: The NSA does not use any security for the files in the published folders. It is not recommended to publish shares if you do not have the NSA behind a good hardware-based firewall. See page 209 for more on firewalls.

Additionally, you can use HTML editing software (not included) to create an index.html or index.htm file to define and customize how your website works and looks.

Accessing Web-published Shares from the Internet

You need to use a public address to access the NSA's web-published shares from the Internet. If your NSA uses a private IP address, you may need to use the public IP address of your Internet gateway and configure NAT or port forwarding on your Internet gateway and possibly firewall rules in order to let people access the NSA's web-published shares from the Internet.

Web Publishing Port Number

If the web-published shares use a port number other than 80 (the normal port for web traffic), users must include it after the NSA's IP address in order to access the NSA's web-published shares. For example, say you specified port 8080, the NSA's IP address is 192.168.1.23, and the name of the web-published share is FamilyPhotos. You would have to enter "http://192.168.1.23:8080/MyWeb/FamilyPhotos/" in your browser's address bar to access the share's web page.

The NSA's web configurator uses port 80. To make the web configurator more secure, you can have the web-published shares use another port number. Then you can configure one set of firewall rules and NAT or port forwarding settings on

your Internet gateway specifically for allowing access to the web-published shares and another separate set of rules for accessing the NSA's web configurator.

9.11.8 Channel Guides for Broadcasting

Here are some popular broadcatching channel guide web sites.

Note: ZyXEL does not endorse these web sites and is not responsible for any of their contents. Use these or any other web sites at your own risk and discretion.

  • http://www.zencast.com/
  • http://www.miroguide.com/
  • http://www.vuze.com/
  • http://www.mefeedia.com/
  • http://www.vodstock.com/
  • http://www.mininova.org

In the following example, the Internet gateway's firewall is configured to allow anyone to access the NSA's web-published screens using port 8080. Web configurator access (port 80) however, is only allowed from IP address a.b.c.d.

Figure 109 Web Publishing Port Number Example
ZYXEL NSA221 - Channel Guides for Broadcasting - 1

flowchart
graph TD
    A["Zyxel"] -->|80| B["Router"]
    B -->|80| C["Internet"]
    C -->|80| D["a.b.c.d"]
    D -->|80| E["Router"]
    E -->|80| F["Internet"]
    F -->|80| G["e.f.g.h"]
    H["Data Collection"] --> I["Server"]
    I --> J["Router"]
    J --> K["Internet"]
    K --> L["a.b.c.d"]
    L --> M["Router"]
    M --> N["Internet"]
    N --> O["e.f.g.h"]

9.11.9 Printer Sharing

The NSA can act as a print server. A print server lets multiple computers share a printer. Connect a printer to the NSA's USB port to let multiple computers on your network use it. See www.zyxel.com for a list of compatible printers.

Figure 110 Printer Sharing
ZYXEL NSA221 - Printer Sharing - 1

You can copy files from a USB device to the NSA or from the NSA to a USB device. Simply press and release the COPY/SYNC button to start copying files. See Section 9.10 on page 204 for details about configuring the copy settings.

The following figure illustrates how copying files works when you copy files from a USB device to the NSA. The same concept applies when you copy files from the NSA to a USB device.

Figure 111 Copying Files Example
Before Copy
ZYXEL NSA221 - Printer Sharing - 2

Both storage devices contain file A.

  • A copy of files A and B from the USB device is transferred to the NSA.
  • File A from the USB device replaces file A on the NSA.

9.11.11 Synchronizing Files

Synchronization makes the contents on the target device identical to the ones on the source device. You can synchronize files from a USB device to the NSA or from the NSA to a USB device. In addition, you may also synchronize files in both directions simultaneously.

Press and hold the COPY/SYNC button until you hear a beep to synchronize files. See Section 9.10 on page 204 for details about configuring the synchronization settings.

USB -> NSA or USB <- NSA

When you synchronize files in one direction, contents on the source device replace the files on the target device.

The following figure illustrates how synchronization works when you synchronize files from a USB device to the NSA. The same concept applies when you synchronize files from the NSA to a USB device.

Figure 112 Synchronizing Files Example 1
Before Sync
ZYXEL NSA221 - USB -&gt; NSA or USB &lt;- NSA - 1

flowchart
graph LR
    A["USB"] --> B["NSA"]
    subgraph USB
        A1["A"]
        A2["B"]
    end
    subgraph NSA
        NSA1["A"]
        NSA2["C"]
    end

After Sync
ZYXEL NSA221 - USB -&gt; NSA or USB &lt;- NSA - 2

text_image USB A B NSA A B

Both storage devices contain A.

  • A copy of files A and B from the USB device is transferred to the NSA.
  • File A from the USB device replaces file A on the NSA.
  • File C on the NSA is deleted.

USB <-> NSA

When you synchronize files in both directions simultaneously, both storage devices transfer unique files to one another. Files with the same file name are synchronized according to their modification date/time. The difference in modification time between the two files has to be greater than five minutes. More recently modified files overwrite the older ones during synchronization.

The following figure illustrates how synchronization works when you synchronize files in both directions simultaneously.

Figure 113 Synchronizing Files Example 2
Before Sync
ZYXEL NSA221 - USB &lt;-&gt; NSA - 1

flowchart
graph TD
    A["USB"] --> B["NSA"]
    subgraph USB
        A1["A (new)"]
        A2["B"]
        A3["C"]
    end
    subgraph NSA
        A4["A (new)"]
        A5["B"]
        A6["D"]
    end

After Sync
ZYXEL NSA221 - USB &lt;-&gt; NSA - 2

text_image USB NSA A (new) B (new) C D A (new) B (new) C D

A on the USB device and B on the NSA are modified more recently.

  • File A from the USB device replaces file A on the NSA.
  • File B from the NSA replaces file B on the USB device.
  • A copy of file C from the USB device is transferred to the NSA.
  • A copy of file D from the NSA is transferred to the USB device.

Package Management

10.1 Overview

Package Management can be used to set up more useful applications in your NSA. The NSA can download multiple packages/files at once and automatically goes through all the installation steps.

10.2 What You Can Do

  • Use the Package Management screen (Section 10.4 on page 220) to download and install applications from the web.
  • Use the eMule screens (Section 10.5 on page 224) to configure the server, task and search settings for the eMule application.
  • Use the DyDNS screen (Section 10.6 on page 240) to configure the domain name settings of your NSA.
  • Use the NFS screen (Section 10.7 on page 241) to configure the Network File System (NFS) settings of your NSA.
  • Use the SMART screens (Section 10.8 on page 245) to view your NSA hard disk(s) statistics and monitor their performance.
  • Use the Protect screens (Section 10.9 on page 249) to configure and schedule the backup and restore jobs of your NSA.

10.3 What You Need to Know

This feature enables you to use the following applications:

  • eMule - eMule is an open-source peer-to-peer (P2P) file-sharing application similar to eDonkey, which can be used to download files from the Internet. It uses the Kad protocol.
  • DyDNS - This gives your NSA a domain name with a dynamic IP address. At the time of writing, this package supports accounts from the following service providers: DynDNS, NoIP, 3322, ZoneEdit, and DHS.

- Gallery - This web-based application allows your NSA to host pictures. You can upload images in your local computer or shares to this application. Use the administrator account of your NSA to log in to the Gallery console. The administrator can then create accounts for other users.

- NFS - NFS (Network File System) is a file-sharing protocol most commonly implemented on Unix-like systems.

- PHP-MySQL-phpMyAdmin - This tool can be used to manage MySQL through the web. Enter 'root' as the username and '1234' as the password to log in. This includes MySQL 5.1.30, PHP 5.2.8 and phpMyAdmin 3.1.1.

- SMART - Use S.M.A.R.T. (Self Monitoring, Analysis, and Reporting Technology) to monitor hard disks. It detects and reports the reliability of hard disks using standard indicators, enabling administrators to anticipate possible disk failures.

- SqueezeCenter - This enables you to manage a Logitech's Squeezebox device connected to the NSA.

- WordPress - This allows you to create and manage a blog. Use the NSA administrator credentials to log in. The administrator can then create accounts for other users.

- BackupPlanner - Use this to schedule and run backup jobs for files stored in your NSA to an internal drive, external storage device or to another NSA in the network.

The following applications come with their own web configurator and documentation:

  • Gallery
  • PHP-MySQL-phpMyAdmin
  • SqueezeCenter
  • WordPress

10.4 Package Management Screen

Use this screen to download and install applications from the web.

Click Applications > Package Management to open the following screen.

Figure 114 Applications > Package Management
ZYXEL NSA221 - Package Management Screen - 1

text_image Package Management Retrieve List From Internet Install/Upgrade Uninstall/Cancel Installation Enable Disable Package Info Status Package Name Requires Version Description Management Page Currently, there are no packages. Please use "Retrieve List From Internet" to update package list.

The following table describes the labels in this screen.

Table 47 Applications > Package Management

LABELDESCRIPTION
Package Management
Retrieve List From InternetClick this to retrieve a list of available packages from the ZyXEL website.
Install/UpgradeChoose the item(s) on the list and click this to install the selected application(s) on your system or upgrade to the latest version if you have previously installed the application.
Uninstall/Cancel InstallationChoose the item(s) on the list and click this to uninstall the selected application(s) from your system or cancel their active download(s) or install process/es.This is only available if you have previously installed the package.
EnableThis option is only for non built-in packages.Choose the item(s) on the list and click this to enable the application(s) on your system.This is only available if you have previously installed the package.
DisableThis option is only for non built-in packages.Choose the item(s) on the list and click this to disable the application on your system. You have to enable the application again in order to use it.This is only available if you have previously installed the package.
Package InfoSelect an item on the list and click this to display information about the package. See Section 10.4.1 on page 223 for more details.

Table 47 Applications > Package Management

LABELDESCRIPTION
StatusThis is the current status of the application. It shows:Not Installed- This displays for applications that have not been installed by the NSA.Installing (%) - This displays when the application is being installed. It also shows the percent of the package already installed.Built-in- This displays for applications installed by the NSA that you can configure in the NSA Web Configurator.Enabled- This displays for applications installed and enabled by the NSA that have their own web configurators.Disabled- This displays for applications installed and disabled by the NSA that have their own web configurators.Unknown- It is possible to get this status if the web location for the application is unavailable.
Package NameThis is the name of the application.
RequiresThis shows the other packages required in order to run this application.Note: A package would be disabled/enabled simultaneously if its prerequisite package(s) has been disabled/enabled. For example, when you enable WordPress, this also enables PHP-MySQL-phpMyAdmin automatically. However when you enable PHP-MySQL-phpMyAdmin, this does not automatically enable WordPress.
VersionThis is the version number of the item.Theicon indicates that the application has a newer version available. Move your mouse over this icon to see the latest version number. Choose this item and click Install/Upgrade.
DescriptionThis shows a brief description of the application.
Management PageThis shows the location of the screens or web configurator where you can manage the application (after the package has been installed on the system).

Note: Once you install an application and enable it, additional links show up in the navigation panel. This applies to eMule, DyDNS, NFS, SMART and BackupPlanner. For Gallery, PHP-MySQL-phpMyAdmin, SqueezeCenter and WordPress, you can access the applications' web configurators through the Package Management screen.

10.4.1 Displaying the Package Information

Select an item on the list and click Package Info. Use this screen to check detailed information about the task.

Figure 115 Applications > Package Management > Package Info
ZYXEL NSA221 - Displaying the Package Information - 1

text_image Package Info Detailed Information Status Enabled Name wordpress Size 4.06 MB Needed Space 14.23 MB Version 2.7zypkg001 Requires php-MySQL-phpMyAdmin Required By Management http://172.23.31.20 Page /pkq/wordpress/

The following table describes the labels in this screen.

Table 48 Applications > Package Management > Package Info

LABELDESCRIPTION
StatusThis is the current status of the application. It shows:Not Installed- This displays for applications that have not been installed by the NSA.Installing (%) - This displays when the application is being installed. It also shows the percent of the package already installed.Built-in- This displays for applications installed by the NSA that you can configure in the NSA Web Configurator.Enabled- This displays for applications installed and enabled by the NSA that have their own web configurators.Disabled- This displays for applications installed and disabled by the NSA that have their own web configurators.
NameThis is the name of the application.
SizeThis is the size of the application at initial download.
Needed SpaceThis is the needed space to complete the installation of the application.
VersionThis is the version number of the application.
RequiresThis shows other package/s required to run this application.
Required ByThis shows which other packages require this application in order to be usable.
Management PageThis shows the location of the screens, console or web configurator where you can manage the application (after the package has been installed on the system).
SourceThis shows the location of the installed files of the application.

Table 48 Applications > Package Management > Package Info

LABELDESCRIPTION
DescriptionThis shows a brief description of the item.
CloseClick this to close the screen.

10.5 eMule Screens

Use these screens to manage the eMule application in your NSA. eMule is a peer-to-peer (P2P) file-sharing console that lets you download files from the Internet. It works with eDonkey and Kad networks.

10.5.1 eMule Server Screen

Use this screen to configure the eMule server.

Click Applications > eMule > Server to open the following screen.

Figure 116 Applications > eMule > Server
ZYXEL NSA221 - eMule Server Screen - 1

text_image Applications - eMule - Server Server Enable eMule Apply Add Server My Info Connect Disconnect Edit Delete Server Selected Server(s) Status IP Address Port Number Name Response Number of Current Users Max. User Number Number of Files Not connected 89.248.172.86 4500 Sharing Kingdom 3 312 ms 226.77 K 350 K 17.08 M Not connected 89.248.172.50 4500 Sharing Kingdom 2 360 ms 140.84 K 350 K 10.89 M Connecting 88.191.81.111 1111 PEERATES.NET 468 ms 68.30 K 250 K 13.43 K Not connected 89.248.172.90 4500 Sharing Kingdom 4 469 ms 120.23 K 350 K 10.19 M

The following table describes the labels in this screen.

Table 49 Applications > eMule > Server

LABELDESCRIPTION
Server - You can add multiple servers in this screen. However, the NSA can only connect to one eMule server at a time.
Enable eMuleCheck this and clickApplyto enable the eMule application.
Add ServerClick this to add an eMule server. A server provides a list of available files for download, users sharing them and other information.Refer toSection 10.5.2 on page 225for theAdd Serverscreen.

Table 49 Applications > eMule > Server

LABELDESCRIPTION
My InfoSelect a server from the list and click this to view the details and connection status of the server.Refer to Section 10.5.4 on page 227 for the My Info screen.
ConnectClick this to connect to the selected server or a random server if no server is selected.
DisconnectSelect a server from the list and click this to disconnect from the server.
Edit ServerSelect a server from the list and click this to edit the server's information, including the server name and IP address.Refer to Section 10.5.3 on page 226 for the Edit Server screen.
Delete Selected Server(s)Select the server(s) from the list and click this to delete the server(s) from the list.
The table lists your servers. Click a column's heading to sort the entries by that criteria.
StatusThis shows the status of the NSA's connection to the server: Connected, Connecting or Not Connected.
IP AddressThis shows the IP address of the server.
Port NumberThis shows the port number used by the server for file-sharing.
NameThis shows the name of the server.
ResponseThis shows the length of time (in milliseconds) that the server took to reply to the NSA.
Number of Current UsersThis shows the number of users currently connected to the server.
Max. User NumberThis shows the total number of users that can connect to the server at the same time.
Number of FilesThis shows the number of files available for download in the server.

You see a warning screen before you delete a server.

Figure 117 Delete a Server
ZYXEL NSA221 - eMule Server Screen - 2

text_image Delete Selected Server(s) Are you sure you want to remove the server(s) from the list? Yes No

10.5.2 Add Server

Use this screen to add a server for the eMule application.

Click Add in the Applications > eMule > Server screen to add a server.

Figure 118 Applications > eMule > Server: Add
ZYXEL NSA221 - Add Server - 1

text_image Add Server Server IP Server Name IP Address Port Number ED2K Link Insert server.met from URL Apply Cancel

The following table describes the labels in this screen.

Table 50 Applications > eMule > Server: Add

LABELDESCRIPTION
Server IPSelect this if you know the server name, IP address and port number of the eMule server you want to add.
Server NameEnter the server name.
IP AddressEnter the IP address of the server.
Port NumberEnter the port number used by the server for file-sharing.
ED2K LinkSelect this and enter the ED2K link for the eMule server you want to add.The ED2K link is used within the eMule network and contains information about the server.
Insert server.met from URLSelect this and enter the URL from which you want to download the server list that you want the NSA to use.
ApplyClick this to apply your changes.
CancelClick this to return to the previous screen without saving.

10.5.3 Edit Server

Use this screen to edit a server for the eMule application.

Click Edit in the Applications > eMule > Server screen to edit a server.

Figure 119 Applications > eMule > Server: Edit
ZYXEL NSA221 - Edit Server - 1

text_image Edit Server Server Name PEERATES.NET IP Address 88.191.81.111 Port Number 1111 Apply Cancel

The following table describes the labels in this screen.

Table 51 Applications > eMule > Server: Edit

LABELDESCRIPTION
Server NameEnter the server name.
IP AddressEnter the IP address of the server.
Port NumberEnter the port number of the server.
ApplyClick this to apply your changes.
CancelClick this to return to the previous screen without saving.

10.5.4 My Info

Use this screen to view the server details, including the status, IP address and download/upload speeds.

Click MyInfo in the Applications > eMule > Server screen to view the server details.

Figure 120 Applications > eMule > Server: MyInfo
ZYXEL NSA221 - My Info - 1

text_image My Info Detailed Information ED2k Status Connecting ED2k ID ED2k IP 89.248.172.50 ED2K Port 4500 Kad Not connected Download Speed 0 Upload Speed 0 Client In Queue 0 Sources 0 Close

The following table describes the labels in this screen.

Table 52 Applications > eMule > Server: MyInfo

LABELDESCRIPTION
ED2k StatusThis shows the status of the NSA's connection to the server: Connected, Connecting or Not Connected.
ED2k IDThis is the identification given to the NSA by the eMule server. The ID comes in two types:High ID - The NSA connects to the server directly.Low ID - The NSA connects to the server from behind a firewall.
ED2k IPThis is the IP address of the eMule server to which the NSA is connected.
ED2k PortThis is the port number of the eMule server to which the NSA is connected.

Table 52 Applications > eMule > Server: MyInfo

LABELDESCRIPTION
KadThis shows the status of the NSA's connection to the Kad network: Connected or Not Connected.Kad is a shortcut for Kademlia network, which does not use servers to store files or user information in order to run a peer-to-peer network. Instead it employs peers/clients as small “servers” and runs queries through these peers.
Download SpeedThis shows the current download speed of the eMule client.
Upload SpeedThis shows the current upload speed of the eMule client.
Client in QueueThis shows the number of peers waiting to connect to the NSA to download its file (s).
SourcesThis shows the total number of peers that can share the required files to the NSA eMule client.
CloseClick this to exit the screen.

10.5.5 eMule Task Screen

Use this screen to view tasks, including completed, downloading, uploading and shared tasks, that are being handled by the NSA.

Click Applications > eMule > Task screen to view the task details.

Figure 121 Applications > eMule > Task
ZYXEL NSA221 - eMule Task Screen - 1

text_image Applications - eMule - Task Task Enable eMule Apply Add Preferences Browse Incomplete Downloads Clear All Completed Refresh Delete Pause Resume Task Info Downloading Newly Completed Uploading Shared Files Status Name File Size Complete(%) Source Download Speed Time Left Priority

The following table describes the labels in this screen.

Table 53 Applications > eMule > Task

LABELDESCRIPTION
Task
Enable eMuleCheck this and clickApplyto enable the eMule application.

Table 53 Applications > eMule > Task

LABELDESCRIPTION
AddClick this to add a download task (ED2K link) to the list.Refer to Section 10.5.6 on page 230 for the Add Task screen.
PreferencesClick this to open a screen where you can set the default location for saving downloaded files. You can also configure your eMule download settings.Refer to Section 10.5.7 on page 232 for the Preferences screen.
Browse Incomplete DownloadsClick this to open a screen where you can see a list of *.part.met files that the NSA is still in the process of downloading.Refer to Section 10.5.9 on page 236 for the Share Browsing screen.
Clear All CompletedClick this to remove all completed downloads from the task list. This only removes the newly completed task(s) in this session.
RefreshClick this to refresh the task screen.
DeleteSelect an item from the list and click this to delete the task.
PauseSelect an item from the list and click this to pause the task.
ResumeSelect a paused item from the list and click this to resume the task.
Task InfoSelect an item from the list and click this to view the details and status of the task.
The table lists your tasks. Click a column's heading to sort the entries by that criteria.
DownloadingThis table shows a list of download tasks that are still in progress.
Newly CompletedThis table shows a list of tasks that have been completed but have not been cleared from the list.
UploadingThis table shows a list of upload tasks that are still in progress.
Shared FilesThis table shows a list of files on the NSA that are available for download by other peers in the network.
StatusThis shows the current status of the task: Waiting or Downloading.
Name/File NameThis shows the name of the file(s) associated to the task.
File Size/SizeThis shows the size of the file(s) associated in the task.
Complete (%)This shows the percentage of the file that has been downloaded by the NSA. It also indicates what percent of the file still needs to be downloaded.
SourceThis shows the total number of peers that can share the required files to the NSA eMule client.
Download SpeedThis shows the download speed of the NSA for the task.
Time LeftThis shows how much more time the NSA needs to complete the file's download.
PriorityUse this field to set the priority for the task. Choose from Auto, Low, Normal or High.Select Auto to have the NSA automatically determine the task's priority.Select High to have the NSA complete this task before the others.

Table 53 Applications > eMule > Task

LABELDESCRIPTION
TransferredThis shows what percent of the file the NSA has uploaded to other peers.This column is available in the Uploading tab.
Upload SpeedThis shows the upload speed of the NSA.This column is available in the Uploading tab.
RequestsThis shows the number of requests for a shared file.This column is available in the Shared Files tab.
Accepted RequestsThis shows the number of file requests granted by the NSA.This column is available in the Shared Files tab.

Note: Download tasks initially appear in the Downloading tab of the eMule Task screen. Depending on its status, it can eventually show up in the other tabs (Newly Completed, Uploading or Shared Files tabs).

You see a warning screen before you delete a task.

Figure 122 Delete a Task
ZYXEL NSA221 - eMule Task Screen - 2

text_image Delete download task Delete download task The_Two_Towers-The_Purist_Edit-Trailer.avi Are you sure you want to delete the task AND all associated files?

10.5.6 Add Task

Use this to add a download task to the NSA.

Click Add in the Applications > eMule > Task screen to add a task.

Figure 123 Applications > eMule > Task: Add
ZYXEL NSA221 - Add Task - 1

text_image Add Download Task From ED2K Link Source ED2K Link * Location of Downloaded Files Share Path Put incomplete downloads in admin /eMule/Temp Move completed downloads to admin /eMule/Incoming Edit Caution: Do not use the NSA for illegal downloads. Illegal downloading or sharing of files can result in severe civil and criminal penalties. You are subject to the restrictions of copyright laws and any other applicable laws and will bear the consequences of any infringements thereof. ZyXEL takes NO responsibility or liability for your use of the download service feature. Apply Cancel

The following table describes the labels in this screen.

Table 54 Applications > eMule > Task: Add

LABELDESCRIPTION
Source
ED2K LinkPaste the ED2K link of the file you want to download into this field.The ED2K link identifies files in the eMule network. It starts with ed2k:// and may contain the name and size of the file you want to download.
Location of Downloaded FilesThis shows where the NSA stores new downloads (Put incomplete downloads in) and where the NSA moves completed downloads (Move completed downloads to).The Share column shows the name of the share where the file is downloaded.The Path column points to the location in the share where the NSA will save the downloaded files.

Table 54 Applications > eMule > Task: Add

LABELDESCRIPTION
EditClick this to open the following screen where you can set the default folder location where you "Put incomplete downloads in" and "Move complete downloads to":.ZYXEL NSA221 - Add Task - 2Share - Select the destination share from the drop-down list.Path - This field displays the share folder's path. You can useBrowse to find or create a folder on the NSA or type the location of the folder using forward slashes as branch separators.ZYXEL NSA221 - Add Task - 3Current Location - This is the location of the selected folder.Folder Name - Enter a new folder name and click 📋 to create it.Type - This identifies the item as a folder or file.Name - This is the name of the folder/file.Select a folder. If you don't select a folder, a forward slash (/) displays in thePathfield. All contents within the specified share are automatically selected.ClickApplyto save your settings and Cancelto close the screen.
ApplyClick this to save your changes.
CancelClick this to return to the previous screen without saving.

10.5.7 Preferences

Use this screen to configure your eMule settings, such as port numbers to use, its download/upload rates and the maximum number of peers allowed to connect to the NSA.

Click Applications > eMule > Task > Preferences to open the following screen.

Figure 124 Applications > eMule > Task > Preferences
ZYXEL NSA221 - Preferences - 1

text_image Preferences Username Username http://www.eMule.org Location of Downloaded Files Share Path Put incomplete downloads in admin /eMule/Temp Move completed downloads to admin /eMule/Incoming Edit Port Number UDP Port 4672 The default port number is 4672 TCP Port 4662 The default port number is 4662 Upload and Download Rate Max. download rate 0 KB/s (0=No Limit) Max. upload rate 0 KB/s (0=No Limit) Connection Maximum Number of Active Connections 500 IP Filter Edit IP Filter Apply Reset Cancel

The following table describes the labels in this screen.

Table 55 Applications > eMule > Task > Preferences

LABELDESCRIPTION
Username
UsernameEnter your user name that identifies the NSA in the eMule network.
Location of Downloaded FilesThis shows where the NSA stores new downloads (Put incomplete downloads in) and where the NSA moves completed downloads (Move completed downloads to).The Share column shows the name of the share where the file is downloaded.The Path column points to the location in the share where the NSA will save the downloaded files.

Table 55 Applications > eMule > Task > Preferences

LABELDESCRIPTION
EditClick this to open the following screen where you can set the default folder location where you "Put incomplete downloads in" and "Move complete downloads to":.ZYXEL NSA221 - Preferences - 2Share - Select the destination share from the drop-down list.Path - This field displays the share folder's path. You can useBrowse to find or create a folder on the NSA or type the location of the folder using forward slashes as branch separators.ZYXEL NSA221 - Preferences - 3Current Location - This is the location of the selected folder.Folder Name - Enter a new folder name and click 📋 to create it.Type - This identifies the item as a folder or file.Name - This is the name of the folder/file.Select a folder. If you don't select a folder, a forward slash (/) displays in thePathfield. All contents within the specified share are automatically selected.ClickApplyto save your settings andCancelto close the screen.
Port Number
UDP PortEnter the UDP port number you want to use for file transfers.
TCP PortEnter the TCP port number you want to use for file transfers.
Upload and Download Rate
Max. download rateEnter the maximum download rate for download tasks.
Max. upload rateEnter the maximum upload rate for upload tasks.
Connection
Maximum Number of Active ConnectionsEnter the maximum number of eMule peer-to-peer connections.
IP Filter

Table 55 Applications > eMule > Task > Preferences

LABELDESCRIPTION
Edit IP FilterClick this to edit the IP Filter.IP filtering prevents your NSA from accessing certain networks and IP addresses that may be hosting malicious programs.Refer to Section 10.5.8 on page 235 to view and configure the Edit IP Filter screen.
ApplyClick this to save your changes.
ResetClick this to clear the fields.
CancelClick this to return to the previous screen without saving.

10.5.8 Edit IP Filter

Use this screen to enable IP filtering which prevents your NSA from accessing certain networks and IP addresses that may be hosting malicious programs.

Figure 125 Applications > eMule > Task > Preferences: Edit IP Filter
ZYXEL NSA221 - Edit IP Filter - 1

text_image Edit IP Filter Enable IP Filter ( Last Update Time : N/A ) Update IP Filter Table File from the Internet Every Week URL * Upload IP Filter Table Browse... Upload Download Current IP Filter Table Note: Please upload your list( *.txt, *.dat, *.gz, *.tgz or *.tar.gz ) here. It will be saved as /admin/download/ipfilter.dat. Apply Cancel

The following table describes the labels in this screen.

Table 56 Applications > eMule > Task > Preferences: Edit IP Filter

LABELDESCRIPTION
Enable IP FilterClick this to enable IP filtering. This prevents your NSA from accessing certain networks and IP addresses that may be hosting malicious programs.SelectUpdate IP Filter Table File from the Internet Every Week if you know the web location of the IP filter table you want to use. Enter the link where your NSA can acquire the list of networks and IP addresses. The NSA checks this link every week and uses the latest IP filter table available.SelectUpload IP Filter Tableif you want to use an IP filter table from your local computer.
ApplyClick this to save your changes.
ResetClick this to return to the previous screen without saving.

10.5.9 Share Browsing

Use this screen to view a list of files that are still being downloaded by the NSA. The files are located in the eMule\Temp folder in the Admin share by default.

Click Applications > eMule > Task > Browse Incomplete Downloads to open the following screen.

Figure 126 Applications > eMule > Task > Browse Incomplete Downloads
ZYXEL NSA221 - Share Browsing - 1

text_image Share Browsing Create Folder Upload Rename Delete Move Copy Current Location: /admin/eMule/Temp Type Name Size Modified Date 001.part 0.00 Bytes 2009-05-22 14:57:01 001.part.met 259.00 Bytes 2009-05-22 14:57:01 001.part.met.bak 259.00 Bytes 2009-05-22 14:57:01 Close

The following table describes the labels in this screen.

Table 57 Sharing > Shares > Share Browser

LABELDESCRIPTION
Create FolderType a folder name and clickApplyto make a new folder. The name can be 1 to 239 single-byte (no Chinese characters allowed for example) ASCII characters. The name cannot be the same as another existing folder in the same path. SeeSection 3.4.4 on page 59for more information on folder names.
UploadClick this to add files to the share. UseBrowseto locate a file and clickApplyto upload the file. Note that the size of each file should be less than 2 GB.
Upload FilesFile 1Browse...File 2Browse...File 3Browse...File 4Browse...File 5Browse...Note: The size of uploaded files can't be more than 2G.Apply Cancel
RenameSelect a folder or file and click this to open a screen. Enter the name you want and click OK to make the changes.Note: When you change a file name, make sure you keep the file extension.ZYXEL NSA221 - Share Browsing - 2
DeleteSelect a file/folder from the list and click this to open a warning screen.Click Yes to delete the file/folder, or click No to close the screen.ZYXEL NSA221 - Share Browsing - 3
MoveSelect a file/folder from the list and click this to relocate the file/folder to another share.
CopySelect a file/folder from the list and click this to make a duplicate of the file/folder to another share.
Current locationThis is the name of the share and folder path that you are in.
TypeThe icon in this column identifies the entry as a folder or a file.The folder with an arrow pointing up is for the link that takes you to the next higher layer in the share's folder tree.
NameThis section lists the share's existing folders or files. Click to the right of the file/folder name to select the file/folder. You can also click the folder's name to navigate to a sub-folder within the folder.
SizeThis field displays size of the file.
Modified DateThis field displays a file's latest modification date.
CloseClick this to close the screen.

10.5.10 Task Info

Use this screen to view eMule task details, such as status, file name, file size and its download progress.

Click Task Info in Applications > eMule > Task screen to open the following.

Figure 127 Applications > eMule > Task: Task Info
ZYXEL NSA221 - Task Info - 1

text_image Task Info Detailed Information Status Waiting Name The_Two_Towers-Trailer.avi part.met File 001.part.met Hash 965C013E991EE246D63D45EA71954C4D ED2K Link e2k://file|The_Two_Towers-The_Purist_Edit-Trailer.avi|149975 Size 14.30 MB (14997504 Bytes) Done Size 0.00 Bytes Complete(%) 0.0%

The following table describes the labels in this screen.

Table 58 Applications > eMule > Task: Task Info

LABELDESCRIPTION
StatusThis shows the current status of the task - Waiting or Downloading.
NameThis shows the file name of the file associated with the task.You can change this file name by entering the new name and clicking Apply.
part.met FileThis shows the temporary file name for an incomplete file.Files in peer-to-peer networks can be divided into several parts for easier download. Once all the parts have been downloaded, you can run one part and the file automatically rebuilds itself. If the download of the file(s) is not completed, the file parts cannot open on their own.
HashThis shows the hash value of the download file.This is a text string that can be interpreted by eMule to check the downloaded file's integrity.
ED2K LinkThis shows the ED2K link for this file.The ED2K link identifies files in the eMule network. It starts with ed2k:// and may contain the name and size of the file you want to download.
SizeThis shows the size of the file associated with the task.
Done SizeThis shows the size of the file that has been downloaded so far.
Complete (%)This shows what percent of the file has been downloaded so far.
SourceThis shows the total number of peers that can share the required files to the NSA eMule client.
Download SpeedThis shows the download speed for the task.
Time LeftThis shows how much time is needed to complete the task.
PriorityThis shows the priority of this task.You can set this in Section 10.5.5 on page 228.

Table 58 Applications > eMule > Task: Task Info

LABELDESCRIPTION
Seen CompleteThis shows the last time a source with the complete file was online.
CloseClick this to exit the screen.

10.5.11 eMule Search Screen

Use this screen to search for files available in an eMule server using keywords and other parameters, such as file type, file size and extension names.

Click Applications > eMule > Search to open the following screen.

Figure 128 Applications > eMule > Search
ZYXEL NSA221 - eMule Search Screen - 1

text_image Applications - eMule - Search Search Enable eMule Apply Keyword(s): File Type: Min Size: Min Sources: Method: (MB) Max Size: (MB) Extension: Search Clear Download File Name File Size Source

The following table describes the labels in this screen.

Table 59 Applications > eMule > Search

LABELDESCRIPTION
Search
Enable eMuleCheck this and clickApplyto enable the eMule application.
Keyword(s)Enter words that are related to the file you want to download.
File TypeSelect the file type that you want to download.
MethodSelect the search method you want eMule to employ.
Min SizeEnter the minimum file size you want included in the search results.
Max SizeEnter the maximum file size you want included in the search results.
Min SourcesEnter the minimum number of peers sharing the file you want to download.
ExtensionEnter the file extensions separated by commas of files you want included in the search results.
SearchClick this to have the NSA search the eMule network for files that match the criteria you have set.
ClearClick this to clear the fields.

Table 59 Applications > eMule > Search

LABELDESCRIPTION
DownloadSelect a file from the results and click this to start downloading the file.
This table shows the results of the search.
File NameThis shows the name of the file(s) that match the criteria you have set.
File SizeThis shows the size of the file(s) that match the criteria you have set.
SourceThis shows how many peers are currently available to share this file so that the NSA can download it.

10.6 DyDNS Screen

Use this to enable and configure DyDNS.

Dynamic DNS allows you to update your current dynamic IP address with a dynamic DNS service so that anyone can contact you (such as through NetMeeting or CUSeeMe). You can also access your FTP server or Web site on your own computer using a domain name (for instance myhost.dhs.org, where myhost is a name of your choice) that will never change instead of using an IP address that changes each time you reconnect. Your friends or relatives will always be able to call you even if they don't know your IP address.

Click Network > DyDNS to open the following screen.

Figure 129 Network > DyDNS
ZYXEL NSA221 - DyDNS Screen - 1

text_image Network - DyDNS Gateway Information Internal Address unknown External Address Configuration Enable DyDNS support to allow users to access the server through a registered hostname. Enable DyDNS Service Provider DynDNS.com Hostname Username Password Password (Confirm) Apply Reset

The following table describes the labels in this screen.

Table 60 Network > DyDNS

LABELDESCRIPTION
Gateway Information
Internal AddressThis shows the IP address assigned to the NSA by the gateway in your local network.
External AddressThis shows the IP address of the NSA that can be accessed in the Wide Area Network (WAN). Note that this is not assigned by the DyDNS server.
Configuration
Enable DyDNSSelect this to use dynamic DNS.You need to have registered a dynamic DNS account with a service provider such as www.dyndns.org. The Dynamic DNS service provider will give you a password or key.
Service ProviderSelect your Dynamic DNS service provider.
HostnameEnter your host name provided by the Dynamic DNS service.
UsernameEnter your user name for your DNS account.
PasswordEnter the password assigned to your DNS account.
Password (Confirm)Confirm the password you entered.
ApplyClick this to save your changes.
ResetClick this to clear the fields.

10.7 NFS Screen

Use this screen to enable and configure Network File System (NFS) settings on your NSA.

NFS is a client/server distributed file service that provides transparent file sharing for network environments. This allows shared folders in your NSA to be accessible like a local folder in a user's computer.

Click Network > NFS to open the following screen.

Figure 130 Network > NFS
ZYXEL NSA221 - NFS Screen - 1

text_image Network - NFS NFS Service Enable NFS Server Disable NFS Server Add NFS Share NFS Session Edit NFS Share Delete NFS Share(s) Status$ NFS Share Path Volume Name DNS/IP Filter Comment /i-data/e980c8a3/nfs/sample1 Volume 1 * (Read Only)

The following table describes the labels in this screen.

Table 61 Network > NFS

LABELDESCRIPTION
NFS Service
Enable NFS ServerClick this to employ NFS in your NSA.
Disable NFS ServerClick this to stop using NFS.This makes all NFS shares unavailable.
Add NFS ShareClick this to add an NFS share.Refer to Section 10.7.1 on page 243 for the Add NFS Share screen.
NFS SessionClick this to view active NFS sessions. You can see the list of users who have access to the NFS shares.Refer to Section 10.7.2 on page 244 for the NFS Session screen.
Edit NFS ShareSelect an NFS share from the list and click this to edit it.Refer to Section 10.7.1 on page 243 for the Edit NFS Share screen.
Delete NFS Share (s)Select an NFS share from the list and click this to delete it.
The table lists your NFS shares. Click a column's heading to sort the entries by that criteria.
StatusThis shows whether the share is active or not.
NFS Share PathThis shows the location of the share in the NSA.
Volume NameThis shows the volume where the NFS share is located.
DN/IP FilterThis shows which domain name(s) or IP address(es) have read/write access to the NFS shares.Refer to Section 10.7.1 on page 243 for the screen where you can configure this.
CommentThis shows a short description of the share.

You see a warning screen before you delete a volume.

Figure 131 Delete an NFS Share
ZYXEL NSA221 - NFS Screen - 2

text_image Delete NFS Share(s) Are you sure you want to delete the following NFS Share(s)? Delete NFS Share(s): sample1 Delete all content associated with this share? Do you wish to proceed?

10.7.1 Add/Edit NFS Share

Use this screen to add or edit an NFS share.

Note: Some attributes of the NFS share cannot be edited.

Click Add or Edit in the Network > NFS screen to open the following:

Figure 132 Network > NFS: Add/Edit
ZYXEL NSA221 - Add/Edit NFS Share - 1

text_image Add NFS Share Volume Name Volume 1 (109.55 GB) NFS Share Name * Full Path Comment DN/IP Filter * Read Only Add Note: You can input a domain name or IP in the filter. "**" character represent public. Ex: 172.23.26.0/24 or *.zyxel.com.tw Apply Cancel

The following table describes the labels in this screen.

Table 62 Network > NFS: Add/Edit

LABELDESCRIPTION
Volume NameSelect the volume where the folder you want to add as an NFS share is located.
NFS Share NameEnter the name you want to give to the NFS share.
Full PathThis shows the location of the NFS share in the NSA.The NFS server assigns this path to the share folder you input.
CommentEnter a short description for the share.

Table 62 Network > NFS: Add/Edit

LABELDESCRIPTION
DN/IP FilterEnter the domain name(s) or IP address(es) that can have access to the NFS share.Enter ‘*’ to make the share available to all users in the network. You can also enter a wildcard, such as ‘*.domain.com’ to indicate that all users within that network have access to the share.Select the access rights you want to grant to each domain name or IP address you enter and click Add.Read Only- Users with this access right can only view and copy files in the NFS share but cannot modify or delete them.Read/Write- Users with this access right can view, edit or delete files in the NFS share.
ApplyClick this to save your changes.
CancelClick this to return to the previous screen without saving.

10.7.2 NFS Session

Use this screen to view a list of active NFS sessions. You can see which users are connected the NFS shares.

Click NFS Session in the Network > NFS screen to open the following.

Figure 133 Network > NFS: NFS Session
ZYXEL NSA221 - NFS Session - 1

text_image NFS Session Type NFS Share Path Username Connected At IP Address Currently, there are no NFS sessions. OK

The following table describes the labels in this screen.

Table 63 Network > NFS: NFS Session

LABELDESCRIPTION
TypeThis shows if the NFS share is active or not.
NFS Share PathThis shows the location of the share in the NSA.
UsernameThis shows the username of the active user connected to the NFS share.
Connected AtThis shows to which domain/IP address the user accessing the NFS share belongs.
IP AddressThis shows the IP address of the user accessing the NFS share.
OKClick this to close the window.

10.8 SMART Screen

Use this screen to view indicators of your NSA's hard disk(s) health.

Self Monitoring, Analysis, and Reporting Technology (S.M.A.R.T) detects and reports the reliability of hard disks using standard indicators (called “attributes”), to help you anticipate possible disk failures.

Note: The fields included the screens may vary depending on the hard disk that you use.

Click Storage > S.M.A.R.T to open the following screen.

Figure 134 Storage > S.M.A.R.T
ZYXEL NSA221 - SMART Screen - 1

text_image Storage - S.M.A.R.T S.M.A.R.T. Information Brief Summary Full Summary Status Name Temperature Performance Type Volume Name Model Name Capacity Healthy disk1 46 °C Good jbod Volume 1 ATA ST3120827AS 3.42 111.79 GB

The following table describes the labels in this screen.

Table 64 Storage > S.M.A.R.T

LABELDESCRIPTION
S.M.A.R.T. Information
Brief SummarySelect a hard disk volume from the list and click this to display information about the volume, such as the hard disk vendor, specific model, hard disk capacity and so on.See Section 10.8.1 on page 246 to view the Brief Summary screen.
Full SummarySelect a volume and click this to display more detailed information about the volume.See Section 10.8.1 on page 246 to view the Full Summary screen.
The table lists your hard disks. Click a column's heading to sort the entries by that criteria.
StatusThis shows the condition of the hard disk volume. Go to Section 7.3.1 on page 152 for more information.
NameThis shows the name assigned to the hard disk.
TemperatureThis shows the temperature of the hard disk in degrees celsius.

Table 64 Storage > S.M.A.R.T

LABELDESCRIPTION
PerformanceThis shows your hard disk's performance. Refer to Section 10.8.2 on page 247 for more information on how S.M.A.R.T determines your hard disk's condition. This displays:Good- This shows when you compare each Value with the Threshold Value and all the Value is greater than the Threshold Value.Bad- This shows when you compare each Value with the Threshold Value and at least one Value is less than or equal to the Threshold Value.
TypeThis shows volume type or file system that the hard disk is using, such as JBOD, PC Compatible Volume and RAID or FAT32, FAT16 and NTFS.See Section 7.6.3 on page 157 for descriptions of the volume types.
Volume NameThis shows the name of the hard disk volume.
Model NameThis shows the factory model of the hard disk.
CapacityThis shows the total hard disk space of the hard disk volume.

10.8.1 SMART Brief Summary

Use this screen to display information about the volume, such as the hard disk vendor, specific model, hard disk capacity and so on.

Click Brief Summary in the Storage > S.M.A.R.T screen to display the following.

Figure 135 Storage > S.M.A.R.T: Brief Summary
ZYXEL NSA221 - SMART Brief Summary - 1

text_image Brief Summary Temperature 46 °C Health Good Performance Good Detailed Information Model Family Seagate Barracuda 7200.7 and 7200.7 Plus family Device Model ST3120827AS Serial Number 5MS0AL24 Firmware Version 3.42 User Capacity 112.00 GB ATA Version 6

The following table describes the labels in this screen.

Table 65 Storage > S.M.A.R.T: Brief Summary

LABELDESCRIPTION
Brief Summary
TemperatureThis shows the current temperature of the hard disk in degrees celsius.

Table 65 Storage > S.M.A.R.T: Brief Summary

LABELDESCRIPTION
HealthThis describes the overall health of the volume based on S.M.A.R.T diagnostics.
PerformanceThis shows your hard disk's performance. Refer to Section 10.8.2 on page 247 for more information on how S.M.A.R.T determines your hard disk's condition. This displays:Good - This shows when you compare each Value with the Threshold Value and all the Value is greater than the Threshold Value.Bad - This shows when you compare each Value with the Threshold Value and at least one Value is less than or equal to the Threshold Value.
Detailed Information
Model FamilyThis shows the vendor and product family of the hard disk.
Device ModelThis shows the factory model of the hard disk.
Serial NumberThis shows the serial number of the hard disk.
Firmware VersionThis shows the firmware version installed in the hard disk.
User CapacityThis shows the total hard disk space of the hard disk volume.
ATA VersionThis shows the ATA version of the hard disk, which refers to an industry standard category for storage devices and connectors used.
ATA StandardThis field displays the Advanced Technology Attachment standard the hard drive supports.
Local TimeThis field displays the local time that the hard drive is using.
SMART supportThis field displays whether or not the hard drive is SMART-capable.
SMART supportThis field displays whether or not the hard drive has SMART monitoring turned on.
OKClick this to close the window.

10.8.2 SMART Full Summary

Use this screen to display more details information about the volume.

Click Full Summary in the Storage > S.M.A.R.T screen to display the following.

Figure 136 Storage > S.M.A.R.T: Full Summary

Full Summary
IDAttribute NameFlagValueWorstThresholdTypeUpdatedWhen Failed
197Current_Pending_Sector0x0012100100000Old_ageAlways-
195Hardware_ECC_Recovered0x001a063045000Old_ageAlways-
200Multi_Zone_Error_Rate0x0000100253000Old_ageOffline-
198Offline_Uncorrectable0x0010100100000Old_ageOffline-
12Power_Cycle_Count0x0032100100020Old_ageAlways-
9Power_On_Hours0x0032097097000Old_ageAlways-
1Raw_Read_Error_Rate0x000f063045006Pre-failAlways-
5Reallocated_Sector_Ct0x0033100100036Pre-failAlways-
7Seek_Error_Rate0x000f082060030Pre-failAlways

The following table describes the labels in this screen.

Table 66 Storage > S.M.A.R.T: Full Summary

LABELDESCRIPTION
IDThis is the identification number used to tag a hard disk attribute.This is standard across all S.M.A.R.T-enabled storage devices.However it depends on the storage vendor which attributes it will allow S.M.A.R.T to diagnose.
Attribute NameThis refers to an attribute of the hard disk that S.M.A.R.T can assess.Attributes describe the hard disk's physical state, performance, wear-and-tear, and so on.
FlagThis shows a code that S.M.A.R.T uses to determine the current state of the hard disk.
ValueThis is a value that corresponds to the Raw Value. Compare this with the Threshold Value.S.M.A.R.T compresses the raw value(s) into a digit from 1 to 253, where 1 indicates the worst scenario while 253 indicates the best scenario.The values 100 or 200 usually represent the mean or normal value.
WorstThis is the lowest value attained by the hard disk since S.M.A.R.T started its assessment of the hard disk.
ThresholdThis is the attribute's threshold value. If the attribute's current normalized value is less than or equal to the threshold, the attribute has failed. An attribute value close to or below the threshold indicates the hard drive is no longer reliable.
TypeThis shows S.M.A.R.T's assessment of the hard disk.Old_age indicates end-of-product life from old-age (normal wearing out) if the attribute value is less than or equal to the threshold.Pre-fail indicate imminent hard drive failure if the attribute value is less than or equal to the threshold.Note that just because an attribute is of the Pre-fail type does not mean your hard drive is ready to fail. It only means this if the current normalized value of the attribute is less than or equal to the threshold.
UpdatedThis indicates when the hard drive updates the value for this attribute.Always means the hard drive updates this attribute during normal operation and during offline activities.Offline means the hard drive only updates this attribute when no one is accessing the hard drive.

Table 66 Storage > S.M.A.R.T: Full Summary

LABELDESCRIPTION
When FailedThis column indicates when (if ever) the attribute failed. An attribute has failed if the normalized value is less than or equal to the threshold.-: This displays if the attribute is not failing now and has never failed in the past.FAILING_NOW: This displays if the attribute's current normalized value is less than or equal to the threshold.In_the_past: This displays if the attribute's current normalized value is greater than the threshold but the worst recorded value is less than or equal to the threshold.
Raw ValueThis is the attribute's unprocessed raw data. These values show exact amounts of time or numbers of attempts or errors. The meaning to the raw values is specific to the hard drive manufacturer. Table 42 on page 156 has some information about whether a higher or lower individual raw S.M.A.R.T. attribute value is better.
OKClick this to close this window.

10.9 Protect Screens

The Protect screens include:

  • Backup screens - These include steps to create and customize backup jobs.
  • Restore screens - These include steps to restore previous backups made with the NSA.

Use this screen to create and customize scheduled backup jobs for your files.

You can have several backup jobs for specific folders and time periods.

Click Protect > Backup to open the following screen.

Figure 137 Protect > Backup
ZYXEL NSA221 - Protect Screens - 1

text_image Protect - Backup Backup Add Job Edit Job Delete Selected Job(s) Execute Job Now Restore Archive Abort Job Status ▲ Job Name ▲ Job Description Backup Info Scheduler Info WAITING TEST1 Backup Type: Full Backup Source: /Volume 1/public/ Backup Target: external volume/ Frequency: Monthly Last Run Time: N/A Last Run Result: N/A Next Run Time: 2009-06-01 00:00:00

The following table describes the labels in this screen.

Table 67 Protect > Backup

LABELDESCRIPTION
Backup
Add JobClick this to create and customize a backup job.
Edit JobSelect a backup job in the list and click this to make some changes to it.
Delete Selected Job(s)Select a backup job in the list and click this to delete it.
Execute Job NowSelect a backup job in the list and click this to run the backup job immediately.
Restore ArchiveSelect a backup job in the list and click this to restore the file(s) included in that backup job to the NSA.This applies to Archive backups only. Refer to Section 10.10.8 on page 262 to see the screens.
Abort JobSelect a backup job in the list and click this to stop the process if the backup job is currently active.
StatusThis shows the current state of the backup job.Waiting means the backup job is not active but is scheduled to run at some time.Running indicates that the NSA is currently doing the backup job. When the backup job is running, you can also see a progress bar.
Job NameThis identifies the backup job.
Job DescriptionThis is a short description of the backup job.
Backup InfoThis lists down the backup job details: type, source and target. Refer to Section 10.10.1 on page 251 and Section 10.10.2 on page 253.
Scheduler InfoThis shows the backup schedule, including the frequency, the time it was last run in (and whether or not it succeeded), and when it is scheduled to run again. The times use yyyy-mm-dd hh:mm:ss format.Refer to Section 10.10.4 on page 257.

10.10.1 Backup: Step 1

Use this screen to specify the job information and back up type.

Click Add Job in the Protect > Backup screen to open the following:

Figure 138 Protect > Backup: Step 1
ZYXEL NSA221 - Backup: Step 1 - 1

text_image Protect - Backup Add a new backup Job Step 1 Job Information Job Name: Test1 Job Description: Backup Type Archive Full Incremental Perform a full backup job after 30 increments (Max: 30) Synchronization Next

The following table describes the labels in this screen.

Table 68 Protect > Backup: Step 1

LABELDESCRIPTION
Job Information
Job NameEnter a name to identify the backup job.
Job DescriptionEnter a short description (up to 100 keyboard characters) for the backup job.

Table 68 Protect > Backup: Step 1

LABELDESCRIPTION
Backup TypeChoose the backup type that you want the NSA to implement for the backup job.Archive- This is a backup of the source folder in an archive format. Once you backup your files in the target folder, you cannot access the files individually unless you have the extracting tool used by the NSA. If there are existing files in the target folder prior to the NSA's backup job, the files remain undisturbed. You can also choose between the following types of archive:Full- The NSA does a fresh backup each time. This provides the most protection but also requires the most storage space.Incremental- The NSA backs up new or modified files from the source folder since the last backup. The first backup is a full backup. You can also do a full backup after several incremental backups. Enter how many incremental backups the NSA runs before it performs a full backup of the source folder. You must keep the latest full backup to be able to restore the files later.Synchronization- This does a backup of individual files. If you use this type, you cannot use theRestorefeature of the NSA. You can also choose between the following types of synchronization:Mirror- The NSA deletes all data in the target folder before running the backup. It makes a copy of the source files.Publish- The NSA does a backup of individual files to the target folder without overwriting existing files in that folder. It makes the target folder identical to the source folder.
NextClick this to go to the next step.

10.10.2 Backup: Step 2

Use this screen to specify where the files you want to backup are located and set where you want the backup to be stored.

Figure 139 Protect > Backup: Step 2
ZYXEL NSA221 - Backup: Step 2 - 1

text_image Protect - Backup Add a new backup Job Step 2 Backup Source Volume 1 Selected Source Folders Backup Target Remote Remote NSA Address Username Password Share Name Test Connection Local External Previous Next

The following table describes the labels in this screen.

Table 69 Protect > Backup: Step 2

LABELDESCRIPTION
Backup SourceSelect an (internal) volume and the folders and files to back up using this tree interface.Click + to browse through folders, sub-folders and files.Click - to close a folder in the tree. This is useful if there are many folders or files that you wish to hide from view.Click □ to select a folder or file to back up. This also selects all sub-folders and files.Click √ to deselect the folder or file. This also de.selects all sub-folders and files.More ... ▲ and More ... ▼ appear when there are too many folders/files to display. Click the arrows to scroll up or down through the folders/files.√ for a folder means all sub-folders and files and new folders/files added later will be backed up.√ for a file means the file will be backed up.√ (a grayed out check box) for a folder means that only some sub-folders and files under the folder will be backed up. Newly added folders/files will NOT be backed up.↓ means the file structure is still loading. Please wait for the folders/files to display.Note: If you select to back up an entire folder √ and then de-select a sub-folder or file within that folder, the main folder icon will turn √ and any new sub-folders and files added to this main folder after the initial backup configuration will NOT be backed up.A list of your select folders and files displays below the selection fields.
Selected Source FoldersThis shows the path of the backup source folder you selected.
Backup TargetSelect the target folder where you want to place your backup.

Table 69 Protect > Backup: Step 2

LABELDESCRIPTION
RemoteSelect this to back up to another device.For Archives:The remote device can be another NSA in the network. Fill in the following fields in order to be able to access it.Remote NSA AddressUsernamePasswordShare NameClickTest Connectionto see if your NSA can communicate with the remote device.For Synchronization:The remote device must be another NSA compatible with the NSA's synchronization feature. Fill in the following fields in order to be able to access it.Remote NSA AddressUsernameRemote Admin's PasswordClickShow target contentto connect to the remote NSA so you can select the target share for the backup.
LocalSelect this if you want to place your backup in another volume in the NSA. Select the folder where you want to place the backup.
ExternalSelect this if you have a USB hard disk connected to the NSA that you want to use for your backup. Select the folder where you want to place the backup.
PreviousClick this to go back to the previous screen.
NextClick this to go to the next screen.

10.10.3 Backup: Step 3

Use this screen to specify compression, encryption and purge policies for the backup job. This step is only available if you are doing an archive backup or a synchronization backup to a remote target.

Figure 140 Protect > Backup: Step 3
ZYXEL NSA221 - Backup: Step 3 - 1

text_image Protect - Backup Add a new backup Job Step 3 Compression Yes No Encryption Yes No Bandwidth : N/A KB/s (0 for no limitation) Purge Policy Keep All Old Backup files Keep Only the last backup files(1-30) Keep Backups For day(s)(1-3650) Previous Next

The following table describes the labels in this screen.

Table 70 Protect > Backup: Step 3

LABELDESCRIPTION
CompressionSelect Yes if you want NSA to compress the files for your backup. Otherwise, choose No.In an Archive backup, compression is a method of packing computing files in a way that saves hard disk space.For a Synchronization backup (to a remote target), the source data will be compressed before the transmission to reduce the transmission time. It is used in slow networks only.
EncryptionSelect Yes if you want NSA to encrypt the files for your backup. Otherwise, choose No.In an Archive backup, this means using a password to secure files.For a Synchronization backup (to a remote target), this means securing the file transfer session. However the final file stored on the remote NSA is unencrypted. This takes a long time. Make sure you really need this feature before enabling it.
BandwidthRestrict the bandwidth of synchronization backups to help stop them from using all of your network connection's available bandwidth. This is more important when backing up to a remote NSA or computer through the Internet.

Table 70 Protect > Backup: Step 3

LABELDESCRIPTION
Purge PolicyThe NSA maintains the files that have been included in your backups. However to save hard disk space, you can choose to delete files that have been included in previous backups.SelectKeep All Old Backup filesto store all files that have been included in previous backups.If you want to store a certain number of backup files, selectKeep Only the last n backup files(1-30). Enter a value (n) from 1 to 30 to specify how many backups the NSA stores. All backup files older than the last one are deleted. You will not be able to recover files that existed (only) in those previous backups. Select this if backup space is limited and recovery of old files is not important.If you want to store all backups for a certain time period, selectKeep Backups for n day(s)(1-3650). Enter a value (n) from 1 to 3650 to specify how many days the NSA stores all backup files. After this day has expired, all backup files will be deleted.
PreviousClick this to go back to the previous screen.
NextClick this to go to the next screen.

10.10.4 Backup: Step 4

Click this to specify the schedule for the backup job. The backup job automatically runs according to the schedule that you set in this screen.

Figure 141 Protect > Backup: Step 4
ZYXEL NSA221 - Backup: Step 4 - 1

text_image Protect - Backup Add a new backup Job Step 4 Scheduler Backup Frequency: Monthly Start Time (hh:mm): 0 : 0 Step 1: Please select the month(s) of a year January February March April May June July August September October November December Step 2: Please select the day of the month * Day First Monday Previous Done

The following table describes the labels in this screen.

Table 71 Protect > Backup: Step 4

LABELDESCRIPTION
Scheduler
Backup FrequencySelect from Hourly, Daily, Weekly and Monthly backup intervals. The screen changes depending on the item you select.

Table 71 Protect > Backup: Step 4

LABELDESCRIPTION
Every how many hours?This is only available if you selectedHourlyas your backup frequency.Select every how many hours the NSA performs the backup job.
On which minute of the hour?This is only available if you selectedHourlyas your backup frequency.Select the minute (from 0 to 59) in an hour when the NSA performs the backup job.
Start Time (hh:mm)This is available if you selectedDaily, Weekly or Monthlyas your backup frequency.Select the time in hour:minute format when you want the NSA to perform the backup job.
Every how many days?This is only available if you selectedDailyas your backup frequency.Enter the interval between days when the NSA performs the backup job.
Every how many weeks?This is only available if you selectedWeeklyas your backup frequency.Enter the interval between weeks when NSA performs the backup job.
Step 1: Please select the month(s) of a yearThis is only available if you selectedMonthlyas your backup frequency.Select the month(s) when you want the NSA to perform the backup job.
Step 2: Please select the day of the monthThis is only available if you selectedMonthlyas your backup frequency.Select the day in a month when you want the NSA to perform the backup job.
PreviousClick this to go back to the previous screen.
DoneClick this to close the screen.

10.10.5 Edit Job Screen

Use this screen to edit an existing backup job. Some attributes of the backup job cannot be changed, such as the name, backup type, source folder and so on.

10.10.6 Edit Job: Step 1

Click Protect > Backup. Select a backup job from the list and click Edit Job to open the following.

Figure 142 Protect > Backup > Edit: Step 1
ZYXEL NSA221 - Edit Job: Step 1 - 1

text_image Protect - Backup Step 1 Job Settings Job Name : Example_Backup This is an example. Job Description Backup Type : incremental Source folder(s)/file(s) Volume 1/music/ Backup : External Volume Target : silicon--power-0-001/ Compression : No Encryption : No Bandwidth : N/A KB/s (0 for no limitation) Purge Policy: Keep All Old Backup files Keep Only the last backup files(1-30) Keep Backups For day(s)(1-3650) Next

The following table describes the labels in this screen.

Table 72 Protect > Backup > Edit: Step 1

LABELDESCRIPTION
Job Settings
Job NameThis field is read-only and shows the name of the backup job.
Job DescriptionEnter a short description for the backup job.
Backup TypeThis field is read-only and shows the backup type.
Source folder(s)/file(s)This is read-only and shows the path of the source folder for backup.
Backup TargetThis field is read-only and shows on which volume (whether internal or external) the backup files are stored. If the target location is a remote NSA, this shows the remote IP address.
Target PathThis field is read-only and shows the target folder for the backup files.

Table 72 Protect > Backup > Edit: Step 1

LABELDESCRIPTION
CompressionThis field is read-only and shows whether the backup employs compression.Compression reduces the size of the file that you want to back up.Backup is then faster, but restoring may be slower, so if backup space is not a concern and recovery speed is, then turn off compression.
EncryptionThis field is read-only and shows whether the backup employs encryption.You can have the NSA use a password to encrypt the backup files.
BandwidthFor backups to a remote NSA, you can restrict the bandwidth to help prevent the backups from using all of your network connection's available bandwidth. This is more important when backing up to a remote NSA or computer through the Internet.
Purge PolicyThe NSA maintains the files that have been included in your backups.However to save hard disk space, you can choose to delete files that have been included in previous backups.SelectKeep All Old Backup filesto store all files that have been included in previous backups.If you want to store a certain number of backup files, selectKeep Only the last n backup files (1-30). Enter a value (n) from 1 to 30 to specify how many backups the NSA stores. All backup files older than the last one are deleted. You will not be able to recover files that existed (only) in those previous backups. Select this if backup space is limited and recovery of old files is not important.If you want to store all backups for a certain time period, selectKeep Backups for n day(s)(1-3650). Enter a value (n) from 1 to 3650 to specify how many days the NSA stores all backup files. After this day has expired, all backup files will be deleted.
NextClick this to go to the next screen.

10.10.7 Edit Job: Step 2

Use this screen to edit the schedule for the backup job.

Figure 143 Protect > Backup > Edit: Step 2
ZYXEL NSA221 - Edit Job: Step 2 - 1

text_image Protect - Backup Edit Step 2 Scheduler Settings Backup Frequency: Monthly Start Time (hh:mm) 1 : 0 Step 1: Please select the month(s) of a year January February March April May June July August September October November December Step 2: Please select the day of the month * Day First Sunday Previous Done

The following table describes the labels in this screen.

Table 73 Protect > Backup > Edit: Step 2

LABELDESCRIPTION
Scheduler Settings
Backup FrequencyEdit this by selecting from Hourly, Daily, Weekly and Monthly backup intervals. The screen changes depending on the item you select.
Every how many hours?This is only available if you selected Hourly as your backup frequency.Select every how many hours the NSA performs the backup job.
On which minute of the hour?This is only available if you selected Hourly as your backup frequency.Select the minute (from 0 to 59) in an hour when the NSA performs the backup job.
Start Time (hh:mm)This is available if you selected Daily, Weekly or Monthly as your backup frequency.Select the time in hour:minute format when you want the NSA to perform the backup job.
Every how many days?This is only available if you selected Daily as your backup frequency.Enter the interval between days when the NSA performs the backup job.
Every how many weeks?This is only available if you selected Weekly as your backup frequency.Enter the interval between weeks when NSA performs the backup job.

Table 73 Protect > Backup > Edit: Step 2

LABELDESCRIPTION
Step 1: Please select the month(s) of a yearThis is only available if you selectedMonthlyas your backup frequency.Select the month(s) when you want the NSA to perform the backup job.
Step 2: Please select the day of the monthThis is only available if you selectedMonthlyas your backup frequency.Select the day in a month when you want the NSA to perform the backup job.
PreviousClick this to go back to the previous screen.
DoneClick this to close the screen.

Use this screen to restore previous backups made with the NSA.

Click Protect > Backup screen (Section 10.10 on page 249). You can restore a previous backup job by selecting a backup job from the list and clicking Restore Archive.

Figure 144 Protect > Backup > Restore Archive: Step 1
ZYXEL NSA221 - Edit Job: Step 2 - 2

text_image Restore Step 1. Select Restore Point Job Information Job Name: Example F Job Description: Example F Backup Type: full Scheduler Information: every month Restored Time C 2009-06-09 16:19:31 Next

The following table describes the labels in this screen.

Table 74 Protect > Backup > Restore Archive: Step 1

LABELDESCRIPTION
Step 1. Select Restore SourceSelect a previous archive backup that you want to restore to the NSA.
Job Information
Job NameThis is the name to identify the backup job.

Table 74 Protect > Backup > Restore Archive: Step 1

LABELDESCRIPTION
Job DescriptionThis is a short description (up to 100 keyboard characters) for the backup job.
Backup TypeThis is the type of backup implemented for the backup job.
Scheduler InformationThis field displays the backup's frequency.
Restored TimeSelect a previous backup in the list that you want to restore to your NSA.
NextClick this to go to the next screen.

Use this screen to select the folder where the archive you want to restore is located.

Figure 145 Protect > Backup > Restore Archive: Step 2
ZYXEL NSA221 - Edit Job: Step 2 - 3

text_image Protect - Backup Restore Step 2. Please select which file(s)/folder(s) to restore. Folder Chooser Selected Folder Folder Name □ / + public Previous Next

The following table describes the labels in this screen.

Table 75 Protect > Backup > Restore Archive: Step 2

LABELDESCRIPTION
Step 2. Please select which file(s)/folder(s) to restore.
Folder ChooserSelect the folder where the backup you want to restore is located.
Selected FolderThis shows the path of the folder you selected.
PreviousClick this to go back to the previous screen.
NextClick this to go to the next screen.

Use this screen to select the location in the NSA where you want to restore your backup.

Figure 146 Protect > Backup > Restore Archive: Step 3
ZYXEL NSA221 - Edit Job: Step 2 - 4

text_image Protect - Backup Restore Step 3. Set a restore target and start restoring ● Original Location ○ Other Location Browse ... Previous Done

The following table describes the labels in this screen.

Table 76 Protect > Backup > Restore Archive: Step 3

LABELDESCRIPTION
Step 3. Set a restore target and start restoring
Original LocationSelect this to restore the files to their original location in the NSA.
Other LocationClick this to select a folder where you want to place the restored files.ClickBrowseto open the following screen.ZYXEL NSA221 - Edit Job: Step 2 - 5Volume- Select a volume from the list.Current Location- This is the location of the selected folder.Type- This identifies the item as a file or folder.Name- This is the name of the folder/file.ClickApplyto save your settings and Cancelto close the screen.
PreviousClick this to go back to the previous screen.
DoneClick this to run the restore process and go back to the Backup screen.

Use this screen to restore previous backups made with the NSA, including archives and folders from internal, external or remote NSAs to the NSA.

You can access this screen by clicking Protect > Restore.

Figure 147 Protect > Restore: Step 1
ZYXEL NSA221 - Edit Job: Step 2 - 6

text_image Protect - Restore Restore Step 1. Select Restore Source Remote NSA IP Address User Password Share Name Test Connection Internal or External Volume /To Lei Browse ... Next

The following table describes the labels in this screen.

Table 77 Protect > Restore: Step 1

LABELDESCRIPTION
Step 1. Select Restore SourceSelect a previous archive backup that you want to restore to the NSA.Select Remote NSA if the file is in another NSA in the network that you used for your backup. Fill in the fields below when you choose this option.Select Internal or External Volume if you want to use another volume in the NSA or an attached USB hard disk for your backup.Click Browse to select the backup file.
IP AddressEnter the address of the NSA you want to use.
UserEnter the username you use to access the NSA.
PasswordEnter the password of your NSA account.
Share NameEnter the name of the share you want to use.
Test ConnectionClick this to test your connection to the remote NSA that you have specified in the fields above.

Table 77 Protect > Restore: Step 1

LABELDESCRIPTION
BrowseClick this to select where the previous backup that you want to restore is located.ZYXEL NSA221 - Edit Job: Step 2 - 7Volume- Select a volume from the list.Current Location- This is the location of the selected folder.Type- This identifies the item as a file or folder.Name- This is the name of the folder/file.ClickApplyto save your settings and Cancelto close the screen.
NextClick this to go to the next screen.

Select a previous archive backup that you want to restore to the NSA.

Figure 148 Protect > Restore: Step 2
ZYXEL NSA221 - Edit Job: Step 2 - 8

text_image Protect - Restore Restore Step 2. Select Restore Point Job Name Job1 Job2 Restored Time 2009-06-05 17:30:14 2009-06-06 17:30:14 Previous Next

The following table describes the labels in this screen.

Table 78 Protect > Restore: Step 2

LABELDESCRIPTION
Step 2. Select Restore PointIf you selected Remote NSA for the backup you want to restore, you can see a list of all the backups you performed in the Job Name table.If you selected Internal or External Volume for the backup you want to restore, you can see a list of restore times for the backups you performed in the Restored Time table.
Job NameSelect a previous backup job in the list that you want to restore to your NSA. Once you choose a job name, all available restore times for that backup job shows in the Restored Time table.
Restored TimeSelect a previous backup job in the list that you want to restore to your NSA.
PreviousClick this to go back to the previous screen.
NextClick this to go to the next screen.

Use this screen to select the folder where the archive you want to restore is located.

Figure 149 Protect > Restore: Step 3
ZYXEL NSA221 - Edit Job: Step 2 - 9

text_image Restore Step 3. Please select which file(s)/folder(s) to restore. Folder Chooser Selected Folder Folder Name □ / + public Previous Next

The following table describes the labels in this screen.

LABELDESCRIPTION
Step 3. Please select which file(s)/folder(s) to restore.
Folder ChooserSelect the folder where the backup you want to restore is located.
Selected FolderThis shows the path of the folder you selected.
PreviousClick this to go back to the previous screen.
NextClick this to go to the next screen.

Use this screen to select the location in the NSA where you want to restore your backup.

Figure 150 Protect > Restore: Step 4
ZYXEL NSA221 - Edit Job: Step 2 - 10

text_image Restore Step 4. Set a restore target and start restoring Path for restoring Browse ... Please input encryption password if you have set to this backup job Previous Done

The following table describes the labels in this screen.

Table 80 Protect > Restore: Step 4

LABELDESCRIPTION
Step 3. Set a restore target and start restoring
BrowseClick this to select a folder where you want to place the restored files.ZYXEL NSA221 - Edit Job: Step 2 - 11Volume- Select a volume from the list.Current Location- This is the location of the selected folder.Type- This identifies the item as a file or folder.Name- This is the name of the folder/file.ClickApplyto save your settings and Cancelto close the screen.
PreviousClick this to go back to the previous screen.
DoneClick this to run the restore process and go back to the Backup screen.

10.12 Technical Reference

This section provides technical background information on the topics discussed in this chapter.

10.12.1 S.M.A.R.T Attributes

The following table describes some common S.M.A.R.T. attributes. If a higher or lower raw attribute value is better, it is indicated in the BETTER column. Since

S.M.A.R.T. attributes and their definitions vary by manufacturer, refer to the hard drive manufacturer for details about the attributes your hard drive supports.

Table 81 S.M.A.R.T. Attributes

IDATTRIBUTE NAMEBETTERDESCRIPTION
01Read Error RateLowShows the rate of hardware read errors. If this is not zero, there is a problem with the disk surface or the read/write heads.
02Throughput PerformanceHighThis is the hard drive's general (overall) throughput performance. A decreasing value indicates a problem.
03Spin-Up TimeLowThis is the average number of milliseconds the hard drive took for spindle spin up (from zero RPM to fully operational).
04Start/Stop CountThe total number of spindle start and stop cycles.
05Reallocated Sectors CountLowTotal number of reallocated sectors on the hard drive. When the hard drive detects a read/write/verification error, it marks the sector as “reallocated” and transfers the data to a specially reserved (spare) area. The process is also known as remapping with “reallocated” sectors known as remaps. The more sectors the hard drive has to reallocate, the slower read and write speeds become.
06Read Channel MarginThis is the margin of a channel when it reads data.
07Seek Error RateLowThis is the rate of the magnetic heads’ seek errors. A failure in the mechanical positioning system, such as servo damage or a thermal widening of the disk, results in seek errors. An increasing number of seek errors indicate the condition of the disk surface and the mechanical subsystem are worsening.
08Seek Time PerformanceHighThis is an average performance indicator for the seek operations of the magnetic heads. Mechanical subsystem problems cause this value to decrease.
09Power-On Hours (POH)LowThis is how many hours the hard drive has been in a power-on state. The raw value lists the total number of hours (or minutes, or seconds depending on the manufacturer).
10Spin Retry CountLowThis is the total number of spin start retry attempts. This is the number of attempts to spin up to fully operational speed the hard drive has made when the first attempt did not succeed. An increase in this value is an indicator of hard disk mechanical subsystem problems.
11Recalibration RetriesHighThis is the number of times recalibration was requested when the first attempt did not succeed. A decrease in this value is an indicator of hard disk mechanical subsystem problems.
12Device Power Cycle CountThis is the number of times the hard drive has gone through a full power on and power off.
13Soft Read Error RateLowThis is the number of uncorrected read errors the hard drive has reported. If this is not zero, back up your data.
190Airflow TemperatureLowThis indicates the temperature of the airflow measured by a Western Digital hard drive.
190Temperature Difference from 100HighThis indicates the value of 100 - the temperature in degrees Celsius. Manufacturers can set a minimum threshold that corresponds to a maximum temperature.
191G-sense error rateLowThis is the number of mistakes caused by impact loads.
192Power-off Retract CountLowThis is how many times the heads are loaded off the media.
193Load/Unload CycleLowThis is the number of load and unload cycles into head landing zone position.
194TemperatureLowThis is the hard drive's internal temperature.
195Hardware ECC RecoveredHighThis is the time between ECC (Error Correction Code)-corrected errors.
196Reallocation Event CountLowThis is the total number of reallocation (remap) operations. The raw value is the total attempts to move data from reallocated sectors to a spare area. Successful and unsuccessful attempts are both included.
197Current Pending Sector CountLowThis is the number of unstable sectors awaiting reallocation. If the sector is later successfully written or read, this value decreases and reallocation is not performed. Only failed write attempts cause a reallocation, not read errors. This can be difficult to test since only direct I/O writes to the disk cause reallocations, not cached writes.
198Uncorrectable Sector CountLowThis is the number of errors reading or writing a sector that were not correctable. An increase in this value is an indicator of disk surface defects or mechanical subsystem problems.
199UltraDMA CRC Error CountLowThis is the number of data transfer errors through the interface cable according to the ICRC (Interface Cyclic Redundancy Check).
200Write Error Rate / Multi-Zone Error RateLowThis is the total number of errors in writing sectors.
201Soft Read Error RateLowThis is the number of read/write head off-track errors. If the value is not zero, make a backup.
202Data Address Mark ErrorsLowThis is the number of data address mark errors. This could also be a different, manufacturer-specific attribute.
203Run Out CancelLowThis is the number of ECC (Error Correction Code) errors.
204Soft ECC CorrectionLowThis is the number of errors corrected by software ECC (Error Correction Code).
205Thermal Asperity Rate (TAR)LowThis is the number of thermal asperity errors. Thermal asperity is a read signal spike caused by sensor temperature rise due to touching the disk surface or contaminant particles.
206Flying HeightThis is the height of the hard drive's read/write heads above the disk surface.
207Spin High CurrentThis is the quantity of high current used to spin up the drive.
208Spin BuzzThis is the number of buzz routines to spin up the drive. When the arm holding the read/write heads is stuck, the motor driving it tries to oscillate the arm to free it. This causes an audible vibration.
209Offline Seek PerformanceThis is the hard drive's seek performance during offline operations. Offline operations are tests the drive does itself as opposed to those that an external diagnostic tool has it do. Seek performance is how quickly the drive moves from track to track.
220Disk ShiftLowThis is how far the disk has moved relative to the spindle (this kind of shift is usually due to shock).
221G-Sense Error RateLowThis is the number of errors that have resulted from external vibration and shock.
222Loaded HoursThis is how long the hard drive has operated under data load (this requires movement of the magnetic head armature).
223Load/Unload Retry CountThis is how many time the magnetic head has changed position.
224Load FrictionLowThis is resistance caused by friction in mechanical parts during operation.
225Load/Unload Cycle CountLowThis is the total number of load cycles.
226Load 'In'-timeThis is the total time that the magnetic heads actuator has had a load (not been in the parking area).
227Torque Amplification CountLowThis is the number of attempts to compensate for variations in platter speed.
228Power-Off Retract CycleLowThis is how many times the magnetic armature was automatically retracted because the power was cut.
230GMR Head AmplitudeThis is the amplitude of thrashing (or the distance of repetitive forward and reverse head motion).
231TemperatureLowThis is the hard drive's temperature.
240Head Flying HoursThis is the total time that the head has been positioning.
250Read Error Retry RateLowThis is the number of errors in reading from the disk.

Auto Upload

11.1 Overview

This chapter discusses the features in the Auto Upload screens.

The auto upload feature uploads media files stored in the NSA to the Flickr and/or YouTube sharing websites. Besides web publishing and media server, auto upload is another convenient way to share media files with your friends and family. You can link the NSA to your Flickr and/or YouTube account and select shares for the NSA to upload. The NSA uploads the media files stored in the specified shares to your Flickr and/or YouTube account. When you add new files to the specified shares, the NSA also automatically uploads the new files to your Flickr and/or YouTube account.

11.2 What You Can Do

  • Use the Flickr/YouTube screen (Section 11.4 on page 274) to upload photos and videos to your Flickr and YouTube accounts.
  • Use the FTP Uploadr screen (Section 11.5 on page 284) to upload files to FTP servers.

11.3 What You Need to Know

FTP

File Transfer Protocol (FTP) is a file transfer service that operates on the Internet. A system running the FTP server accepts commands from a system running an FTP client. FTP is not a secure protocol. Your file transfers could be subject to snooping.

FTPES (File Transfer Protocol over Explicit TLS/SSL)

File Transfer Protocol over Explicit TLS/SSL (FTPES) is a file transfer service that uses TLS (Transport Layer Security) or Secure Socket Layer (SSL) for secure transfers across the Internet.

11.4 The Flickr/YouTube Screen

Use this screen to upload photos and videos to your Flickr and YouTube accounts.

Click Applications > Auto Upload > Flickr/YouTube to open the following screen.

Figure 151 Applications > Auto Upload > Flickr/YouTube
ZYXEL NSA221 - The Flickr/YouTube Screen - 1

text_image Flickr/YouTube Disable Pause Config Status Service Name Account Information Enabled Flickr Non-authorized Disabled YouTube --

The following table describes the labels in this screen.

Table 82 Applications > Auto Upload > Flickr/YouTube

LABELDESCRIPTION
Flickr/YouTube
Disable/EnableSelect a service from the list and click this to turn the service on or off.If you disable the service and add more files to the watch folder(s), the NSA will not auto upload these files. However, the NSA still uploads any files added before you turned off the service.
Pause/ResumeSelect a service from the list and click this to pause or resume the auto upload feature.
ConfigSelect a service from the list and click this to manage the service's settings.
StatusThis field displays the service's status.The service may be Enabled, Disabled, Uploading or Paused.
Service NameThis field displays the name of a sharing website to which the NSA can automatically upload files.
Account InformationThis field displays the username and related information of the account to use with the auto upload feature.

11.4.1 Configuring the Flickr Settings

In the Applications > Auto Upload > Flickr/YouTube screen, select Flickr from the list and then click the Config button.

The following screen displays if you have not authorized the NSA to use a Flickr account. Click OK to continue the authorization process.

Figure 152 Linking NSA to Flickr
ZYXEL NSA221 - Configuring the Flickr Settings - 1

text_image Note: The service requires permission to connect to your Flickr account. That permission is granted on the Flickr website, so click OK to get started. OK Cancel

The web browser opens the Yahoo! Flickr login page. Enter your Yahoo account's information and click Sign In.

Figure 153 Yahoo! Flickr Login Page
ZYXEL NSA221 - Configuring the Flickr Settings - 2

text_image YAHOO! flickr Welcome to Yahoo! Enjoy all the benefits of Yahoo! Flickr. • Access all your digital images in one place. • Show off your favorite photos to the world. • Share photos with your friends and family - it's easy! Get all the best with one Yahoo! ID. Your Yahoo! ID gives you access to powerful communications tools like mail and instant messaging, security features like email AntiVirus and Pop-Up Blocker, and favorites like online photos and music — all for free. Sign in to Yahoo! Are you protected? Create your sign-in seal. (Why?) Yahoo! ID: (e.g. free2rhyme@yahoo.com) Password: □ Keep me signed in for 2 weeks unless I sign out. Info [Uncheck if on a shared computer] Sign In Forget your ID or password? | Help Don't have a Yahoo! ID? Signing up is easy. Sign Up Copyright © 2008 Yahoo! Inc. All rights reserved. Copyright/IP Policy | Terms of Service | Guide to Online Security NOTICE: We collect personal information on this site. To learn more about how we use your information, see our Privacy Policy

The following page displays asking for your authorization. Click OK, I'LL ALLOW IT to establish a link between the NSA and your Flickr account.

Figure 154 Flickr Authorization
ZYXEL NSA221 - Configuring the Flickr Settings - 3

text_image flickr® Home You Organize Contacts Groups Explore Hi pink ZyXEL NSA wants to link to your Flickr account. You should not authorize ZyXEL NSA unless you trust them with access to your account. By authorizing this link, you'll allow the ZyXEL NSA service to provide: • Access to your photostream (including private stuff) • Editing of your photo or video information via ZyXEL NSA • Uploads to your Flickr account via ZyXEL NSA What's going on here? Flickr encourages other developers to build cool tools for you to play with, but you must authorize these third parties to access your account. Want to know more? A wealth of information lies within the Flickr Services page. OK, I'LL ALLOW IT

A confirmation page displays indicating successful authorization. Return to the NSA web configurator. Click Get Ready in the following screen to complete the authorization process.

Figure 155 Confirming Flickr Authorization
ZYXEL NSA221 - Configuring the Flickr Settings - 4

text_image Note: When you've given the NSA permission to connect to your account on the Flickr website, click the "Get Ready" button. Get Ready

Once the NSA is associated with your Flickr account, you can configure auto upload settings in the following screen.

Figure 156 Applications > Auto Upload > Flickr/YouTube > Config (Flickr)
ZYXEL NSA221 - Configuring the Flickr Settings - 5

text_image Applications - Auto Upload - Flickr/YouTube Flickr Account Configuration Username stopitswine Photo Space Usage 102.40 MB Total 0% (0.00 Bytes) Used 100.00% Free Video Files Usage Uploaded 0 Remain 2 Switch User Folder Selection Folder Watch List Status Share Name Path Action photo / Add Note: Only the following file formats will be automatically uploaded: bmp, gif, jpeg, jpg, png, tif, tiff, 3gp, 3g2, avi, mov, mpeg, mpg, wmv, mp4 Grace Period The time the system will wait before a newly added media file is saved in a watched folder. Grace Period 15 minutes Default Privacy Who can see your media files on Flickr? Only You Your friends Your family Anyone Hide from public site area? Default Safety Level Safe Moderate Restricted Note: Video on Flickr may only include "Safe" or "Moderate" content. "Restricted" video content is not allowed on Flickr and will be removed. Default Content Type Photos / Videos Screenshots / Screencasts Illustration / Art / Animation / CGI Apply Reset

The following table describes the labels in this screen.

Table 83 Applications > Auto Upload > Flickr/YouTube > Config (Flickr)

LABELDESCRIPTION
Flickr Account Configuration
UsernameThis field displays the Flickr account authorized for the auto upload feature.
Photo Space UsageThis shows how much storage space for photos (in size and percentage) you have used and how much space is still available on your Flickr account.
Video Files UsageThis shows how many videos you have uploaded and how many videos you can still upload to your Flickr account.
Switch UserClick this to use a different Flickr account for the auto upload feature.
Folder Selection
Folder Watch ListThis table displays a list of shares and folders selected for auto upload. Files stored in these locations are uploaded to your Flickr account.
StatusThis indicates whether the folder or share is available.represents a valid folder. The folder is available for auto upload.represents a missing folder. The share may be deleted from the NSA, or the hard disk was removed from the NSA.
Share NameThis is the share selected for auto upload.
PathThis is the path of a folder selected for auto upload. The NSA only uploads files stored in the specified share or folder to your Flickr account.
ActionUse theRemoveicon to remove a folder from theFolder Watch List.
AddClick this to open the following screen where you can set a folder that contains files you want the NSA to automatically upload.ZYXEL NSA221 - Configuring the Flickr Settings - 6Share - Select the share from the list.Path - Type the folder location in the share directly or clickBrowse to open the following screen and navigate to the folder's location.ZYXEL NSA221 - Configuring the Flickr Settings - 7Current Location - This is the location of the selected folder.Folder Name - Enter a new folder name and click 📋 to create it.Type - This is the type of the folder/file.Name - This is the name of the folder/file.Select a folder. If you don't select a folder, a forward slash (/) displays in thePath field. All contents within the specified share are automatically selected.ClickApplyto save your settings and Cancelto close the screen.
Grace Period
Grace Period N minutesSpecify how long the NSA should wait when you add a new file for auto upload. For example, if you set the grace period to 5 minutes, the NSA uploads a new file after it has been in a watched folder for 5 minutes. You can choose from a range of 1 to 10080 minutes (up to one week).
Default Privacy
Who can see your media files on Flickr?Determine who has the right to see files uploaded to your Flickr account.SelectOnly Youif you do not want anyone else to see your files. You may also restrict the access toYour friendsand/orYour family. You can set up a friend/family list in your Flickr account.SelectAnyoneto allow everyone to see your files.
Hide from public site areaCheck this option to prevent others from finding your files when they perform a search in the Flickr website.
Default Safety LevelAssign a safety level to your files.Select Safe if the contents of your files are suitable for the general public.Select Moderate if the contents of your files may be offensive to some people.Select Restricted if the contents of your files are not suitable for certain people, such as children or your colleagues.
Default Content TypeSelect a content type for your files. You can choose Photo/Video, Screenshots/Screencasts, or Illustration/Art/Animation/CGI.
ApplyClick this to save your changes.
ResetClick this to restore previously saved settings.

11.4.2 Configuring the YouTube Settings

In the Applications > Auto Upload > Flickr/YouTube screen, select YouTube from the list and then click the Config button.

Note: Your YouTube account must be associated with a Google account.

Get a Google account and use it to log into YouTube. You can then merge the existing YouTube account to your Google account.

If you have not authorized a YouTube account on the NSA, the following screen displays. Enter your Google account's e-mail address and password in the fields and click OK to authorize the service.

Figure 157 YouTube Account Settings
ZYXEL NSA221 - Configuring the YouTube Settings - 1

text_image YouTube Account Settings Email Password * * Note: To use this feature you must use a Google account that is linked to your YouTube account. Please create a Google account if you do not have one. Login to YouTube using your Google account and then link your existing YouTube account or create a new YouTube account. OK Cancel

Once the NSA is associated with your YouTube account, you can configure auto upload settings in the following screen.

Figure 158 Applications > Auto Upload > Flickr/YouTube > Config (YouTube)
ZYXEL NSA221 - Configuring the YouTube Settings - 2

text_image Applications - Auto Upload - Flickr/YouTube YouTube Account Configuration Username Switch User Folder Selection Folder Watch List Status Share Name Path Action public /C&D Top 10 Podcast Add Note: Only the following file formats will be automatically uploaded: 3gp, asf, asx, avi, dif, dl, dv, flv, gl, mov, movie, m4v, mp4, mpe, mpeg, mpg, ogv, qt, wm, wmv, wmx, wvx YouTube limits the file size allowed for an uploaded video. Files exceeding the file size limit may not be uploaded successfully. Grace Period The time the system will wait before a newly added media file is saved in a watched folder. Grace Period 15 minutes Video Category Please select a category. Film & Animation Autos & Vehicles Music Pets & Animals Sports Travel & Events Comedy People & Blogs News & Politics Entertainment Education Howto & Style Nonprofits & Activism Science & Technology Default Privacy Who can see your media files on YouTube? Only You Anyone Apply Reset

The following table describes the labels in this screen.

Table 84 Applications > Auto Upload > Config (YouTube)

LABELDESCRIPTION
Youtube Account Configuration
UsernameThis field displays the Youtube account authorized for the auto upload feature.
Switch UserClick this to use a different YouTube account for the auto upload feature.
Folder Selection
Folder Watch ListThis table displays a list of shares and folders selected for auto upload. Files stored in these locations are uploaded to your YouTube account.
StatusThis field indicates whether the share or folder is available.represents a valid folder. The folder is available for auto upload.represents a missing folder. The share may be deleted from the NSA, or the hard disk was removed from the NSA.
Share NameThis field displays the share selected for auto upload.
PathThis field displays the path of a folder selected for auto upload. The NSA only uploads the files stored in the specified share or folder to your YouTube account.
ActionUse the Remove icon to delete a folder from the Folder Watch List.
AddClick this to open the following screen where you can set a folder that contains files you want the NSA to automatically upload.ZYXEL NSA221 - Configuring the YouTube Settings - 3Share - Select the share from the list.Path - Type the folder location in the share directly or clickBrowse to open the following screen and navigate to the folder's location.ZYXEL NSA221 - Configuring the YouTube Settings - 4Current Location - This is the location of the selected folder.Folder Name - Enter a new folder name and click 📋 to create it.Type - This is the type of the folder/file.Name - This is the name of the folder/file.Select a folder. If you don't select a folder, a forward slash (/) displays in thePath field. All contents within the specified share are automatically selected.ClickApplyto save your settings and Cancelto close the screen.
Grace Period
Grace Period N minutesSpecify how long the NSA should wait when you add a new file for auto upload. For example, if you set the grace period to 5 minutes, the NSA uploads a new file after it has been in a watched folder for 5 minutes. You can choose from a range of 1 to 10080 minutes (up to one week).
Video CategorySelect the category that best describes the media files you want to upload.
Default Privacy
Who can see your media files on YouTube?Determine who has the right to see files uploaded to your YouTube account.SelectOnly Youif you do not want anyone else to see your files.SelectAnyoneto allow everyone to see your files.
ApplyClick this to save your changes.
ResetClick this to restore your previously stored settings.

11.5 The FTP Uploadr Screen

The FTP Uploadr feature uploads files stored in the NSA to FTP servers. Besides web publishing and media server, auto upload is another convenient way to share media files with your friends and family. You can link the NSA to the FTP server or the FTP server on another NSA and select shares or folders for the NSA to upload. The NSA uploads the files stored in the specified shares to the FTP server. When you add new files to the specified shares, the NSA also automatically uploads the new files to the FTP server.

Use this screen to configure the FTP Uploadr.

Click Applications > Auto Upload > FTP Uploadr to open the screen shown next.

Figure 159 Applications > Auto Upload > FTP Uploadr
ZYXEL NSA221 - The FTP Uploadr Screen - 1

text_image Applications - Auto Upload - FTP Uploadr FTP Uploadr Enable FTP Uploadr Apply Add Server Preferences Edit Server Delete Selected Server(s) Server Information Domain Name/IP Address Port Number Remote Path Account Name Description ftp.example.com 21 /music user testing

The following table describes the labels in this screen.

Table 85 Applications > Auto Upload > FTP Uploadr

LABELDESCRIPTION
Enable FTP UploadrUse the check box to enable or disable the FTP Uploadr. ClickApplyto save your changes.When you disable the FTP Uploadr, a screen opens requesting confirmation. Select the check box to stop any current or queued uploads. If you do not select the check box, the FTP Uploadr will finish uploading the files that are already in the queue list. ClickingYeswill disable the FTP Uploadr.ZYXEL NSA221 - The FTP Uploadr Screen - 2
Add ServerClick this to add a target FTP server entry. SeeSection 11.5.1 on page 286for more details.
PreferencesClick this to manage the settings of the FTP Uploadr.
Edit ServerSelect a server from the list and click this to edit the FTP server entry.
Delete Selected Server(s)Select a server from the list and click this to remove the FTP server entry.ZYXEL NSA221 - The FTP Uploadr Screen - 3
Server InformationSelect a server from the list and click this to display the status and settings about the FTP server.
Domain Name/IP AddressThis is the domain name or IP address of the FTP server.
Port NumberThis is the port number used by the FTP server.
Remote PathThe NSA automatically uploads files to this location of the FTP server.
Account NameThis is the login account for the FTP server.
DescriptionThis is the information related to the FTP server.

11.5.1 Adding or Editing an FTP Server Entry

Use this screen to add or edit an FTP server entry for auto upload.

In the FTP Uploadr screen, click the Add Server or Edit Server button to open the following screen.

Figure 160 Applications > Auto Upload > FTP Uploadr > Add or Edit a Server
ZYXEL NSA221 - Adding or Editing an FTP Server Entry - 1

text_image Add Server Domain Name/IP Address Account Name Password Port Number 21 Remote Path Description Test Connection Apply Cancel

The following table describes the labels in this screen.

Table 86 Applications > Auto Upload > FTP Uploadr > Add or Edit a Server

LABELDESCRIPTION
Domain Name/IP AddressEnter the domain name or IP address of the FTP server.
Account NameEnter the account name used to access the FTP server.
PasswordEnter the password associated with the account name.
Port NumberEnter the port number for the FTP server.
Remote PathEnter the path of the FTP server where the NSA automatically uploads files.
DescriptionEnter additional information about this FTP server.
Test ConnectionClick this to test your settings and check whether you can use the settings to connect to the FTP server.
ApplyClick this to save your changes.
CancelClick this to return to the previous screen without saving.

11.5.2 The FTP Uploadr Preferences Screen

Use this screen to configure the general settings for the FTP Uploadr.

In the FTP Uploadr screen, click the Preferences icon to open the following screen.

Figure 161 Applications > Auto Upload > FTP Uploadr > Preferences
ZYXEL NSA221 - The FTP Uploadr Preferences Screen - 1

text_image Folder Watch List Status Share Name Path Action There are currently no folders on the watch list. Add Settings Grace Period The time the system will wait before a newly added file is saved in a watched folder. Grace Period 15 minutes Bandwidth Limit Max. upload rate 0 KB/s (0=No Limit) Apply Reset Close

The following table describes the labels in this screen.

Table 87 Applications > Auto Upload > FTP Uploadr > Preferences

LABELDESCRIPTION
Folder Watch List
StatusThis field indicates whether the share or folder is available.represents a valid folder. The folder is available for auto upload.represents a missing folder. The share may be deleted from the NSA, or the hard disk was removed from the NSA.
Share NameThis is the share selected for auto upload.
PathThis is the path of a folder selected for auto upload. The NSA only uploads files stored in the specified share or folder to your FTP server.
ActionUse theRemoveicon to delete a folder from theFolder Watch List.
AddClick this to open the following screen where you can set a folder that contains files you want the NSA to automatically upload.ZYXEL NSA221 - The FTP Uploadr Preferences Screen - 2Share - Select the share from the list.Path - Type the folder location in the share directly or clickBrowse to open the following screen and navigate to the folder's location.ZYXEL NSA221 - The FTP Uploadr Preferences Screen - 3Current Location - This is the location of the selected folder.Folder Name - Enter a new folder name and click 📋 to create it.Type - This is the type of the folder/file.Name - This is the name of the folder/file.Select a folder. If you don't select a folder, a forward slash (/) displays in thePath field. All contents within the specified share are automatically selected.ClickApplyto save your settings andCancelto close the screen.
Settings
Grace PeriodSpecify how long the NSA should wait when you add a new file for auto upload. For example, if you set the grace period to 5 minutes, the NSA uploads a new file after it has been in a watched folder for 5 minutes. You can choose from a range of 1 to 10080 minutes (up to one week).
Bandwidth LimitEnter the maximum upload rate for auto upload. You can choose from a range of 0 to 100,000 KB/s. Enter 0 if you do not want to set any limit.Use this to leave bandwidth on your network connection for other traffic, especially if your Internet connection has restricted upload speed.
ApplyClick this to save your changes in this section.
ResetClick this to restore previously saved settings.
CloseClick this to return to the previous screen without saving.

12.1 Overview

This chapter introduces the Users screens of the NSA. Use the Users screens to create and manage administrator and user accounts.

Administrators can:

  • Configure and manage the NSA.
  • Create volumes, shares, and user accounts.
  • Assign individual users specific access rights for specific shares.

Users are people who have access rights to the NSA and can store files there for later retrieval. A user can:

  • Manage shares that he owns.
  • Change his own password.
  • Access the contents of other shares to which he is given access rights.

12.2 What You Can Do

  • Use the main Users screen (Section 12.3 on page 290) to display a list of user accounts created on the NSA.
  • Use the Add User screen (Section 12.3.2 on page 292) to create new user accounts.
  • Use the Edit User screen (Section 12.3.2 on page 292) to edit the properties of an existing account.
  • Use the User Info screen (Section 12.4 on page 294) to display the amount of volume space used by a selected account and the account's membership in any groups.

12.3 The Users Screen

Click Sharing > Users to display the screen shown next.

Use this screen to create and manage accounts for users who can store files on the NSA.

Figure 162 Sharing > Users
ZYXEL NSA221 - The Users Screen - 1

text_image Sharing - Users Users Add User Search Edit User Delete User Info Edit User Delete Selected User(s) User Info Display Number 20 Go to Page 1 Page 1 Of 1 User Type Username Bob Jimmy admin Page 1 Of 1

The following table describes the labels in this screen.

Table 88 Sharing > Users

LABELDESCRIPTION
Add UserClick this to open a screen where you can configure a new user account.Refer to Section 12.3.2 on page 292 to see the screen.
SearchClick this to display a search field. Type in the name of an account and then click Search to look up the account you specified. Click Clear to close the search function.ZYXEL NSA221 - The Users Screen - 2
Edit UserSelect an account and click this to open a screen where you can edit the properties of the account.Refer to Section 12.3.2 on page 292 to see the screen.
Delete Selected UsersSelect an account and click this to open a screen where you can delete the user account.ZYXEL NSA221 - The Users Screen - 3
User InfoSelect an account and click this to open a screen displaying the amount of storage space used by the account. You can also check the account's membership in any groups.Refer to Section 12.4 on page 294 to see the screen.
Display NumberClick the drop-down menu to set how many accounts you want to display in one screen.
Go to PageClick the drop-down menu to display and access more user accounts.
User TypeThis field displays whether the account is an administrator account or a user account.
UsernameThis field displays the username of each account.

12.3.1 User Icons

The following table describes the user icons.

Table 89 User Icons

ICONDESCRIPTION
ZYXEL NSA221 - User Icons - 1The blue icon is for an administrator account.
ZYXEL NSA221 - User Icons - 2The green icon is for a user account.

12.3.2 Adding or Editing an Account

Use this screen to create or edit a NSA user account with NSA access password.

Click the Add User button in the Users screen to open the following screen. Click the Edit User button in the screen shown previously to edit an existing account.

Figure 163 Sharing > Users > Add or Edit a User
ZYXEL NSA221 - Adding or Editing an Account - 1

text_image Add User Username New Password Password (Confirm) Quota (per volume) Volume 1 (109.55 GB) 0 MB (0 means unlimited) Account Type Administrator User Available Group(s) Group Membership Add Selected Group(s) → ← Remove Selected Group(s) Apply Cancel

The following table describes the labels in this screen.

Table 90 Users > Add or Edit a User

LABELDESCRIPTION
UsernameType a name from 1 to 32 single-byte (no Chinese characters allowed for example) ASCII characters. See Section 12.3.3 on page 293 for more details on usernames.
New PasswordCreate a password associated with this user. You can type from one to 14 single-byte (no Chinese characters allowed for example) ASCII characters.
Password (Confirm)You must type the exact same password that you just typed in the above field.
Quota (per volume)Select the volume in which you want the user's files to be stored.Enter how much space (in megabytes) you want to allow for the user to store files.
Account TypeSelect Administrator to give the account full configuration and management access to the NSA.Select User to give the account basic access rights to the NSA and allow the user to manage his own shares, change his own password, and access the contents of other shares to which he is given access rights.
Group Membership
Available Group(s)This field lists the groups created on the NSA to which the selected account does not belong.
Group MembershipThis field lists the groups that the selected account belongs to.
Add Selected Group(s)Select a group from the Available Groups list and click this to add the account to that group.
Remove Selected Group(s)Select a group from the Group Membership list and click this to remove the account from that group.
ApplyClick this to save your changes.
CancelClick this to return to the previous screen without saving.

12.3.3 Usernames

Enter a username from one to 32 characters. The first character must be alphabetical (case insensitive, [A-Z a-z]); numeric characters are not allowed as the first character.

The username can only contain the following characters:

  • Alphanumeric A-z 0-9. Unicode usernames are supported with CIFS logins, but not FTP or web configurator logins.
  • Spaces
  • _ [underscores]
    • . [periods]
  • [dashes]

Other limitations on usernames are:

  • All leading and trailing spaces are removed automatically.
  • Multiple spaces within names are converted to a single space.
  • Usernames are case insensitive. The username cannot be the same (no matter the letter case) as an existing user. For example, if a user exists with the name 'BOB', you cannot create a user named 'bob'. If you enter a user 'bob' but use 'BOB' when connecting via CIFS or FTP, it will use the account settings used for 'bob'.

- The username cannot be the same as a system username such as ANONYMOUS-FTP nor be the same as an existing user. Other reserved usernames that are not allowed are:

  • bin
  • daemon
  • ftp
  • anonymous-ftp

  • anonymous

  • nobody
  • root
  • pc-guest
  • admin
  • password

12.4 Displaying User Info

Use this screen to display a user's information.

In the Users screen, select an account and click User Info to open the following screen.

Figure 164 Sharing > Users > User Info
ZYXEL NSA221 - Displaying User Info - 1

text_image User Information Username: Bob Space Usage Group List Volume Name Used Space EUSB-FLASH-DRIVE-34CB1 0.00 Bytes volume1 0.00 Bytes volume2 0.00 Bytes OK

The following table describes the labels in this screen.

Table 91 Sharing > Users > User Info

LABELDESCRIPTION
UsernameThis field displays the selected username.
Space UsageClick this to display the amount of volume space used by the selected account.
Group ListClick this to display the selected user's group membership.
Volume NameThis field displays the volume(s) created on the NSA.
Used SpaceThis field displays how much storage space the selected account is currently using. This only applies for files that the user saved onto the NSA while logged in with that username.
Group NameThis shows when you click the Group List tab.This displays the list of groups to which the selected user belongs.
OKClick this to close the current screen.

13.1 Overview

This chapter introduces the Groups screens. Use the Groups screens to create and manage groups. You can assign users to groups and grant individual groups access rights to specific shares.

13.2 What You Can Do

  • Use the main Groups screen (Section 13.3 on page 295) to display and manage a list of groups created on the NSA.
  • Use the Add Group screen (Section 13.3.1 on page 297) to create new groups.
  • Use the Edit Group screen (Section 13.3.1 on page 297) to edit the properties of an existing group.

13.3 The Groups Screen

Use this screen to create and manage groups.

Click Sharing > Groups to display the screen shown next.

Figure 165 Sharing > Groups
ZYXEL NSA221 - The Groups Screen - 1

text_image Sharing - Groups Groups Add Group Search Edit Group Delete Selected Group(s) Display Number 20 Go to Page 1 Page 1 Of 1 Status Group Name children family Page 1 Of 1

The following table describes the labels in this screen.

Table 92 Sharing > Groups

LABELDESCRIPTION
Add GroupClick this to open a screen where you can configure a new group.
SearchClick this to display a search field. Type the name of a group and then click Search to look up the group you specified. Click Clear to close the search function.ZYXEL NSA221 - The Groups Screen - 2 ZYXEL NSA221 - The Groups Screen - 3 ZYXEL NSA221 - The Groups Screen - 4 ZYXEL NSA221 - The Groups Screen - 5Add Search Edit Group DeleteGroup(s)ZYXEL NSA221 - The Groups Screen - 6 ZYXEL NSA221 - The Groups Screen - 7 ZYXEL NSA221 - The Groups Screen - 8
Edit GroupSelect a group and click this to open a screen where you can edit the properties of the selected group.
Delete Selected Group(s)Select a group and click this to open a screen where you can delete the group.ZYXEL NSA221 - The Groups Screen - 9 Delete Group 'Children'ZYXEL NSA221 - The Groups Screen - 10ZYXEL NSA221 - The Groups Screen - 11ZYXEL NSA221 - The Groups Screen - 12ZYXEL NSA221 - The Groups Screen - 13 ZYXEL NSA221 - The Groups Screen - 14
Display NumberClick the drop-down menu to set how many groups you want to display in one screen.
Go to PageClick the drop-down menu to select a page number. Jump to a different page to display and access more groups.
StatusThis field displays the group icon.
Group NameThis field displays the group names created on the NSA.

13.3.1 Adding or Editing a Group

Use this screen to create or edit a NSA group.

Click the Add Group button in the Groups screen to open the following screen. Click the Edit Group button in the screen shown previously to edit an existing group.

Figure 166 Sharing > Groups > Add or Edit a Group
ZYXEL NSA221 - Adding or Editing a Group - 1

text_image Add Group Group Name * Available User(s) Bob Jimmy Kevin admin Group Membership Add Selected User(s) → ← Remove Selected User(s) Apply Cancel

The following table describes the labels in this screen.

Table 93 Sharing > Groups > Add or Edit a Group

LABELDESCRIPTION
Group NameType a name from 1 to 32 single-byte (no Chinese characters allowed for example) ASCII characters. See Section 13.3.2 on page 298 for more details on group names.
Group MembershipUse this field to assign group membership to individual users.
Available User(s)This field lists the user accounts created on the NSA that are not members of the current group.
Group MembershipThis field lists the user accounts added to the group.
Add Selected User(s)Select a user account from the Available Users list and click this to add the account to the group.
Remove Selected User(s)Select a user account from the Group Membership list and click this to remove the account from the group.
ApplyClick this to save your changes.
CancelClick this to return to the previous screen without saving.

13.3.2 Group Names

Enter a group name from 1 to 32 characters. The first character must be alphabetical (case insensitive, [A-Z a-z]); numeric characters are not allowed as the first character.

The group name can only contain the following characters:

  • Alphanumeric A-z 0-9. Unicode usernames are supported with CIFS logins, but not FTP or web configurator logins.
  • Spaces
  • _ [underscores]
    • . [periods]
  • [dashes]

Other limitations on group names are:

  • All leading and trailing spaces are removed automatically.
  • Multiple spaces within names are converted to a single space.
  • Group names are case insensitive. The group name cannot be the same (no matter the letter case) as an existing group. For example, if a group exists with the name 'FAMILY', you cannot create a group named 'family'.
  • The group name cannot be the same as a system group name such as EVERYONE nor be the same as an existing group. Other reserved groups names that are not allowed are:

  • nobody

  • root
  • everyone

14.1 Overview

A share is a set of access permissions mapped to a specific folder on a volume. It is equivalent to the Windows concept of a shared folder. You can map a share to a network drive for easy and familiar file transfer for Windows users.

14.2 What You Can Do

  • Use the Shares screen (Section 14.3 on page 300) to navigate a list of shares created on the NSA.
  • Use the Add Shares screen (Section 14.3.1 on page 302) to create additional shares on the NSA.
  • Use the Recycle Bin screen (Section 14.4 on page 305) to configure and clean up the recycle bins.
  • Use the Edit Share screen (Section 14.3.1 on page 302) to edit a share's properties.
  • Use the Share Browser screen (Section 14.5 on page 306) to navigate, add and edit the contents in a share.

14.3 The Shares Screen

Click Sharing > Shares in the navigation panel to open the following screen. This screen lists all shares created on the NSA.

Figure 167 Sharing > Shares
ZYXEL NSA221 - The Shares Screen - 1

text_image Sharing - Shares Shares Add Share Recycle Bin Edit Share Delete Share Browser Status Share Type Share Name Share Path Share Owner Permission Type User-created HomeDisk HomeDisk/HomeDis... admin Private Predefined video HomeDisk/video admin Public Predefined photo HomeDisk/photo admin Public Predefined music HomeDisk/music admin Public Built-in public HomeDisk/public admin Public Built-in admin HomeDisk/admin admin Private

The following table describes the labels in this screen.

Table 94 Sharing > Shares

LABELDESCRIPTION
Add ShareClick this to create a new share.
Recycle BinClick this to configure recycle bins.
Edit ShareSelect a share and click this to edit the share.
Delete ShareSelect a share and click this to remove or restrict access to the share.ZYXEL NSA221 - The Shares Screen - 2 Disable Share "photo"I only want to disable this share so that no users are allowed access but the files continue to exist on the volume.I want to permanently delete all content associated with this share.Do you wish to proceed?YesNo
Share BrowserSelect a share and click this to browse the share's contents.
StatusThis field displays the share icons.represents aBuilt-inshare on a volume on the internal hard drives.represents aPredefinedorUser-Createdshare on a volume on the internal hard drives.represents anAutoorUser-Createdshare on a volume on the external (USB) devices.represents a disabled share that no user can access.represents a missing share. The NSA cannot find the hard disk associated with the share (the disk may be removed from the NSA for example). You may install the disk back to the NSA to recover the share, or you may delete the share from the NSA.
Share TypeThis field displaysBuilt-infor system shares. You cannot delete these shares (these are the public and admin shares).This field displaysPredefinedfor default shares. You cannot delete these shares (these are the video, music, and photo shares).This field displaysUser-createdfor shares that an administrator has created. You can delete these shares.This field displaysAutofor shares that are automatically created on an external (USB) device when a user plugs in the device.
Share NameThis field displays the share's names.
Share PathThis field displays the share's file path, for example, volume1/ music.
Share OwnerThis is the name of the user account to which this share belongs.
Permission TypeThis field displays the access permission of a share.Everyone on the network can access aPublicshare.Only the share owner can access aPrivateshare.AnAdvancedshare allows you to assign specific access rights (read-only for example) to individual users/groups.

14.3.1 Adding or Editing Share

Click Add Share to create a new share. In the Shares screen, select a share and click Edit Share to open the following screen. Use this screen to create or edit a share.

Figure 168 Shares > Add Share (or Edit Share)
ZYXEL NSA221 - Adding or Editing Share - 1

text_image Add Share Share Name Volume volume (183.26 GB ) Make this share owned by admin Enable This Share Enable Recycle Bin Publish this share to Media Server Publish this share to Web Share Access Advanced Edit Apply Cancel

The following table describes the labels in this screen.

Table 95 Shares > Add Share (or Edit Share)

LABELDESCRIPTION
Share NameType a share name from 1 to 239 single-byte (no Chinese characters allowed for example) ASCII characters. The name cannot be the same as another existing share. See Section 3.4.4 on page 59 for more information on share names.
VolumeYou should have already created volumes (a single accessible storage area with a single file system) on the NSA. Select the one that contains the folder that you want to share out.You cannot modify this when editing a share.
Make this share owned bySelect the administrator or user account that can own (manage) this share. The share owner controls access rights to the share.
Enable this shareClick this to allow access to this share.
Enable Recycle BinClick this to activate the recycle bin. When you delete a file from this share, a recycle folder is created to store the deleted item.
Publish this share to Media ServerThis shows only when you enable the Media Server (Section 9.5 on page 178).Select this option to have the NSA share files in this folder with media clients. The media clients do not have to use a password to play the shares you publish.
Publish this share to WebThis shows only when you enable the Web Publish (Section 9.7 on page 192).Select this option to let people use a web browser to access this share's files without logging into the Home screens.
Share AccessAssign access rights (full, read only or deny) to users or groups. If you publish the share to the media server or the web, all users will have at least read-only access to the share, regardless of what you configure here.Keep it private to owner means only the share owner (selected above) can access the share.Make it Public means every user (including people who do not have accounts on the NSA) can access the share.Advanced allows you to assign specific access rights (full, read only or deny) to individual users/groups.
EditThis button is available only when you select Advanced share access. Click this to configure advanced share access rights.
ApplyClick this to save your changes.
CancelClick this to return to the previous screen without saving.

14.3.2 Configuring Advanced Share Access

In the Sharing > Shares > Add Share or Edit Share screen, select Advanced from the Share Access drop-down list. Click Edit to open the following screen. Use this screen to configure share access rights for individual users and groups.

Figure 169 Sharing > Shares > Add Share (or Edit Share) > Advanced
ZYXEL NSA221 - Configuring Advanced Share Access - 1

text_image Share Access Configuration Available User(s)/Group(s) Bob Jimmy admin anonymous-ftp everyone children family Authority : Full Note: You may select multiple users/groups by using Ctrl + Click. Apply Cancel

The following table describes the labels in this screen.

Table 96 Sharing > Shares > Add Share (or Edit Share) > Advanced

LABELDESCRIPTION
Available Users/GroupsThis field lists the users/groups to which you can assign access rights.
AuthorityUse this field to assign access rights to users/groups.Full Control gives users/groups full access (read, write and execute) to all files contained within this share.Read-Only gives users/groups read-only access (they cannot modify nor execute) to all files contained within this share.Deny blocks access (users/groups cannot read, modify, nor execute) to all files contained within this share.Among all access rights, Deny has the highest priority. For example, User A belongs to Group 1. You assign User A full access rights to the Music share but deny access rights to Group 1. Then User A cannot access the Music share.Note: If you deny access to all users, no-one can use the share, not even the administrator.
Click an arrow button to move users/groups between the left and right fields. Use the arrow buttons to assign access rights to users/groups.
ApplyClick this to save your changes.
CancelClick this to return to the previous screen without saving.

14.3.3 Public and ANONYMOUS Share Access Rights

If you make a share public, users do not need to log in.

With ANONYMOUS FTP, you must enter either 'anonymous' or 'ftp' as the username. Any other name is considered a username, so must be valid and have a corresponding correct password.

14.4 The Recycle Bin Configuration Screen

Use this screen to periodically clean up items in all recycle bins.

14.4.1 Recycle Bins

Recycle bins in the NSA help users recover accidentally deleted files or folders in the shares. When you delete an item, a recycle folder is created within the share to hold the deleted item.

Every share can have its own recycle folder. You must enable the recycle-bin function to recycle deleted items. You can configure this setting when you add or edit a share. See Section 14.3.1 on page 302 for details on activating the recycle bin in a share.

Later if you want to retrieve a deleted item, you can locate the item in the recycle folder. You may move or copy the deleted item to another share.

14.4.2 Configuring Recycle Bins

In the Sharing > Shares screen, click Recycle Bin to open the following screen.

Figure 170 Sharing > Shares > Recycle Bin
ZYXEL NSA221 - Configuring Recycle Bins - 1

text_image Share Configuration Clean Recycle Bin every 0 days (0~31, 0 means not clean it automatically.) Clean all recycle bins now Apply Cancel

The following table describes the labels in this screen.

Table 97 Sharing > Shares > Recycle Bin

LABELDESCRIPTION
Clean Recycle Bin every N daysSpecify how often you want to clear the contents in all recycle bins. The specified days correspond to how long a file has been stored in a recycle bin. For example, if you set the interval to be 3 days, recycle bins will clean up items deleted or not accessed for 3 days.Note: Cleaning up recycle bins permanently removes the files from the NSA.
Clean all recycle bins nowClick this to immediately remove contents from all recycle bins.
ApplyClick this to save your changes.
CancelClick this to return to the previous screen without saving.

14.5 The Share Browser Screen

Use this screen to create folders, upload files, and edit files within the share.

Figure 171 Sharing > Shares > Share Browser
ZYXEL NSA221 - The Share Browser Screen - 1

text_image Share Browsing Create Folder Upload Rename Delete Move Copy Current Location: /photo Type Name Size Modified Date .. wallpaper 2008-07-21 16:56:01 2008-07-30 16:00:11 070804102634654.jpg 132.74 KB 2008-07-21 16:39:29 070804102644638.jpg 113.22 KB 2008-07-21 16:39:32 NTR_ChildMana_char01.jpg 285.01 KB 2008-07-21 16:36:51 NTR_ChildMana_char02.jpg 337.66 KB 2008-07-21 16:36:53 NTR_ChildMana_char03.jpg 494.30 KB 2008-07-21 16:36:55 test.jpg 137.37 KB 2008-07-21 16:39:30 Close

The following table describes the labels in this screen.

Table 98 Sharing > Shares > Share Browser

LABELDESCRIPTION
Create FolderType a folder name and clickApplyto make a new folder. The name can be 1 to 239 single-byte (no Chinese characters allowed for example) ASCII characters. The name cannot be the same as another existing folder in the same path. SeeSection 3.4.4 on page 59for more information on folder names.
UploadClick this to add files to the share. UseBrowseto locate a file and clickApplyto upload the file. Note that the size of each file should be less than 2 GB.
RenameSelect a folder or file and click this to open a screen. Enter the name you want and click OK to make the changes.Note: When you change a file name, make sure you keep the file extension.ZYXEL NSA221 - The Share Browser Screen - 2
DeleteSelect a file/folder from the list and click this to open a warning screen.Click Yes to delete the file/folder, or click No to close the screen.ZYXEL NSA221 - The Share Browser Screen - 3
MoveSelect a file/folder from the list and click this to relocate the file/folder to another share.
CopySelect a file/folder from the list and click this to make a duplicate of the file/folder to another share.
Current locationThis is the name of the share and folder path that you are in.
TypeThe icon in this column identifies the entry as a folder or a file. Click a music or video file's play icon to play the file.The folder with an arrow pointing up is for the link that takes you to the next higher layer in the share's folder tree.
NameThis section lists the share's existing folders or files. Click to the right of the file/folder name to select the file/folder. You can also click the folder's name to navigate to a sub-folder within the folder.
SizeThis field displays size of the file.
Modified DateThis field displays a file's latest modification date.
CloseClick this to close the screen.

14.5.1 Moving or Copying Files

Use this screen to move or copy files to another share.

In the Share Browser screen, select a file or folder and click Move or Copy to open the following screen.

Figure 172 Sharing > Shares > Share Browser > Move (or Copy)
ZYXEL NSA221 - Moving or Copying Files - 1

text_image Select a folder Shares FamilyPhoto Path /HK Trip Browse ... Note: Files with same filename will be overwritten Yes Close

The following table describes the labels in this screen.

Table 99 Sharing > Shares > Share Browser > Move (or Copy)

LABELDESCRIPTION
SharesSelect the destination share from the drop-down list.
PathThis field displays the share folder's path. You can useBrowseto find or create a folder on the NSA or type the location of the folder using forward slashes as branch separators.
BrowseClick this to open the following screen and navigate to the location of the file/folder.ZYXEL NSA221 - Moving or Copying Files - 2Current Location- This is the location of the selected folder.Folder Name- Enter a new folder name and click 📋 to create it.Type- This identifies the item as a folder or file.Name- This is the name of the folder/file.Select a folder. If you don't select a folder, a forward slash (/) displays in thePathfield. All contents within the specified share are automatically selected.ClickApplyto save your settings andCancelto close the screen.
YesClick this to move or copy the file/folder to the designated share.
CloseClick this to return to theShare Browserscreen.

Maintenance Screens

15.1 Overview

This chapter discusses the Maintenance screens. The Maintenance screens allow you to manage system configurations.

15.2 What You Can Do

  • Use the Power screen (Section 15.3 on page 310) to configure power settings for the NSA, including power saving, UPS, power on/off during power failure and power on/off schedule.
  • Use the Log screen (Section 15.4 on page 314) to check the system's logs.
  • Use the Configuration screen (Section 15.5 on page 318) to backup or restore the NSA configuration file.
  • Use the SSL screen (Section 15.6 on page 319) to configure HTTPS and the NSA's SSL certificate.
  • Use the Firmware Upgrade screen (Section 15.7 on page 322) to upload new firmware.
  • Use the Shutdown screen (Section 15.8 on page 323) to restart or shut down your NSA.

15.3 The Power Screen

Use this screen to manage power settings for the NSA, including power saving, UPS, power on/off during power failure and power on/off schedule.

Click Maintenance > Power to display the following screen.

Figure 173 Maintenance > Power
ZYXEL NSA221 - The Power Screen - 1

text_image Maintenance - Power Power Management Turn off hard disk(s) 3 minutes Minimum UPS Capacity Minimum UPS Capacity 50 % Note: • This feature will not work now because there is no UPS control cable connected. • The NSA automatically shuts down if the UPS's remaining charge gets down to this level. Power On After Power Failure • Keep Former Status If the system was on when the power failed, it restarts automatically when the power is restored. If it was off, it stays off. • Always Power On The system restarts automatically when the power is restored. • Always Power Off The system will not restart after power failure. You must press the power button manually to restart it. Power On/Off Schedule Enable Power Control Schedule Edit Apply Reset

The following table describes the labels in this screen.

Table 100 Maintenance > Power

LABELDESCRIPTION
Power Management
Turn off hard disk(s)Enter the number of minutes the NSA will sit idle before spinning the hard disks down to sleep. The default power-off time is 3 minutes.
Minimum UPS Capacity
Minimum UPS CapacityWhen you use an APC Uninterruptible Power Supply (UPS) with a USB connection to the NSA, the NSA shuts itself down if the APC UPS's battery charge gets down to the percentage you specify in this field. This allows the NSA to shut down properly and avoid data loss caused by a power failure when the UPS stops supplying power.A setting around 50% is recommended. A setting close to 100% is not recommended since it would cause the NSA to shut down whenever the UPS is charging. A setting close to 0 is also not recommended since the UPS would not have enough power to allow the NSA to shutdown properly.
Power On After Power FailureSelect an option to set whether or not the NSA restarts when the power is restored after a power failure.
Keep Former StatusSelect this option to have the NSA automatically restart only if it was operating when the power failed. The NSA remains off if it was already off when the power failed.
Always Power OnSelect this option to keep the NSA operating as much of the time as possible. The NSA restarts automatically even if it was turned off when the power failed.
Always Power OffSelect this option to keep the NSA from automatically restarting when the power is restored after a power failure. This is a computer's "traditional" behavior. Select this if you have other servers such as a domain controller or DNS server that you want to start or check after a power failure before the NSA turns on.
Power On/Off Schedule
Enable Power Control ScheduleSelect this option to have the NSA turn itself off and on or reboot according to the schedules you configured.Click Edit to go to the screen where you can configure the power control schedules.Refer to Section 15.3.1 on page 312 for this screen.
ApplyClick this to save your changes.
ResetClick this to restore previously saved settings.

15.3.1 Editing the Power Control Schedule Screen

Click Maintenance > Power Management > Edit to open this screen. Use this screen to configure power control schedules to have the NSA turn on, turn off, or reboot at specified times.

Figure 174 Maintenance > Power Management > Edit
ZYXEL NSA221 - Editing the Power Control Schedule Screen - 1

text_image Power Control Schedule List Type Frequency Execute Time Actions Power On Monthly : FirstMonday 00:00 Power Off Monthly : FourthFriday 00:00 Note: You must click on the apply button for your power control schedule settings to apply. Add Power Control Schedule Type Power On Frequency Monthly Execute Time (hh:mm) 0 : 0 Please select the day of the month ○ * Day Add ● First ▼ Monday Apply Cancel

The following table describes the labels in this screen.

Table 101 Maintenance > Power Management > Edit

LABELDESCRIPTION
Power Control Schedule ListThis table lists the power on, power off, and reboot schedules. For example, you could have one schedule to turn the NSA on every morning, at 8:00, another schedule to turn it off every evening at 18:00, and a third schedule to have it reboot every Friday at 14:00.Click a column's heading cell to sort the schedules by that column's criteria. Click the heading cell again to reverse the sort order.
TypeThis field displays whether the power control schedule has the NSA turn on, turn off, or reboot.
FrequencyThis field shows how often (monthly, weekly, or daily) the NSA is to apply this power control schedule.
Execute TimeThis field shows when the NSA is to use this power control schedule (when the NSA is to turn on, turn off, or reboot).
ActionsClick the Delete icon to remove a power control schedule from the list.
Add Power Control ScheduleUse this part of the screen to configure power on, power off, and reboot times.
TypeSelect whether this power control schedule has the NSA turn on, turn off, or reboot.
FrequencySelect whether the NSA is to apply this power control schedule entry on a monthly, weekly, or daily basis.
Execute Time (hh:mm)Enter the time, day, and/or day of the month as appropriate for this power control schedule entry. Leave more than 10 minutes between the execution times of the entries.If the NSA turns off or restarts while a user is transferring files to or from the NSA, the transfer fails. The user will need to restart the transfer.The NSA skips a scheduled restart or power off if the execution time comes while the NSA is doing any of the following:Resynchronizing a RAIDUpgrading firmwareReplacing the configuration fileIf the NSA is turned off at the time when a restart or power off is scheduled, the NSA does not perform the restart or power off.If the NSA is turned on at the time when a power on is scheduled, the NSA does not perform the power on.
Use this part of the screen to configure power on, power off, and reboot times.
Please select the day of the monthThis is only available if you set the Frequency to Monthly.Choose the day of each month for the power control schedule entry.
Every how many weeks?This is only available if you set the Frequency to Weekly.Enter the interval between weeks and choose the day of the week for the power control schedule entry.
Every how many days?This is only available if you set the Frequency to Daily.Enter the interval between days for the power control schedule entry.
AddClick this to add the power control schedule to the list.
ApplyClick this to save your changes.
CancelClick this to return to the previous screen without saving.

15.4 The Log Screen

Click Maintenance > Log to open the following screen.

Use this screen to display all NSA logs. There are at most 512 entries in the log. Older logs are removed by the system. You cannot download the log file via FTP or CIFS.

Figure 175 Maintenance > Log

#TimeClassSeverityMessage
12009-05-18 16:03:43userinfoUser admin has logged in from Web!
22009-05-18 16:02:14userinfoUser admin from Web has been logged out (lease timeout)!
32009-05-18 15:33:07userinfoUser admin has logged in from Web!
42009-05-18 15:30:09userinfoUser admin from Web has been logged out (lease timeout)!
52009-05-18 15:14:48userinfoUser admin has logged in from Web!
62009-05-18 15:00:31userinfoUser admin from Web has been logged out (lease timeout)!
72009-05-18 14:43:01usernoticeAdd new group crushes.
82009-05-18 14:41:24userinfoUser admin has logged in from Web!
92009-05-18 14:41:04userinfoUser admin from Web has been logged out (lease timeout)!
102009-05-18 14:36:32built-in-serviceinfoDownload service download http://www.garageband.com /mp3cat/.UZCMbCSD4a2n /01_April_17__2009_Friday_Part_3.mp3 error (0x20000012)
112009-05-18 14:36:31built-in-serviceinfoDownload service start to download http://www.garageband.com/mp3cat/.UZCMbCSD4a2n /01_April_17__2009_Friday_Part_3.mp3

The following table describes the labels in this screen.

Table 102 Maintenance > Log

LABELDESCRIPTION
RefreshClick this to update the log display.
Purge all LogsClick this to erase all logs from the NSA.
Report ConfigClick this to open a screen where you can configure email alerts for logs.Refer to Section 15.4.1 on page 315 to see the screens for this.
DisplayThe screen always shows all logs by default. Choose a specific log category to view logs for just that category.
#This is the log entry's number in the list according to the currently selected sort order.
TimeThis shows the date and time the log was created. Click the top of the column to sort by oldest or newest.
ClassThis displays the log category; see Table 111 on page 324for details.
SeverityThis displays how serious the log is rated by the NSA. See Table 112 on page 324for more information.
MessageThis displays a description of the log. Click the top of the column to sort by alphabetical or reverse alphabetical order.

15.4.1 Report Config Screen

In the Log screen, click Report Config to do the following:

  • Use the Email Setting screen (Section 15.4.2 on page 315) to enable and configure e-mail alerts from the NSA.
  • Use the Report Setting screen (Section 15.4.3 on page 316) to select the type of alerts you want to receive through e-mail and schedule when the NSA e-mails the alerts.
  • Use the Syslog Server Setting screen (Section 15.4.4 on page 317) to enable the syslog server and select the categories to include in the log report.

15.4.2 Email Setting

You can enable and configure e-mail alerts from the NSA. In the Report Config screen, click the Email Setting tab to open the following screen.

Figure 176 Maintenance > Log > Report Config: Email Setting
ZYXEL NSA221 - Email Setting - 1

text_image Log Report Configuration Email Setting Report Setting Syslog Server Setting Email Configuration Enable Log Email Email To Email From Email Server Email Format HTML Plain Text Use SMTP Authentication User Password Password (Confirm) After applying settings, Send a test email Apply Cancel

The following table describes the labels in this screen.

Table 103 Maintenance > Log > Report Config: Email Setting

LABELDESCRIPTION
Enable Log EmailClick this to have the NSA e-mail log alerts to your e-mail account.
Email ToEnter the e-mail address where you want to receive the log alerts.
Email FromEnter the e-mail address the NSA uses in the From field of the e-mail header for its log alerts.
Email ServerEnter the e-mail server address the NSA uses to send e-mail alerts,
Email FormatSelect the e-mail format you want the NSA to use in its e-mail alerts.
Use SMTP AuthenticationClick this if the e-mail server you want the NSA to use for its e-mail alerts requires a username and password.
UserEnter the username for the e-mail server.
PasswordEnter the password for the e-mail server.
Password (Confirm)Re-enter the password to confirm it.
After apply settings, send a test emailClick this to have the NSA send a test e-mail to the settings you have entered.
ApplyClick this to save your changes.
CancelClick this to return to the previous screen without saving.

15.4.3 Report Setting

You can select the type of alerts you want to receive through e-mail and schedule when the NSA e-mails the alerts. In the Report Config screen, click the Report Setting tab to open the following screen.

Figure 177 Maintenance > Log > Report Config: Report Setting
ZYXEL NSA221 - Report Setting - 1

text_image Log Report Configuration Email Setting Report Setting Syslog Server Setting Email Alert All Logs User Shares Services System Network Storage Applications Backup Auto Upload Alert □ □ □ □ □ □ □ □ □ □ □ Email Report Report Time Weekly Sunday at 0 hours 0 minutes All Logs User Shares Services System Network Storage Applications Backup Auto Upload Report □ □ □ □ □ □ □ □ □ □ Apply Cancel

The following table describes the labels in this screen.

Table 104 Maintenance > Log > Report Config: Report Setting

LABELDESCRIPTION
Email AlertCheck the type of log alerts you want to receive in your e-mail.Select All Log to include all types of log alerts.
Email ReportCheck the type of log alerts you want to receive in your e-mail.Select All Log to include all types of log alerts.
Report TimeSelect how often (Weekly, Daily or Hourly), what day in the week (Monday to Sunday) and which time (hour:minutes) the NSA delivers its e-mail alerts.
ApplyClick this to save your changes.
CancelClick this to return to the previous screen without saving.

15.4.4 Syslog Server Setting

You can enable the syslog server and select the categories to include in the log report. In the Report Config screen, click the Syslog Server Setting tab to open the following screen.

Figure 178 Maintenance > Log > Report Config: Syslog Server Setting
ZYXEL NSA221 - Syslog Server Setting - 1

text_image Log Report Configuration Email Setting Report Setting Syslog Server Setting Syslog Server Configuration Enable Syslog Server Server Address Please select which log categories you wish to include in the log report. All Logs User Shares Services System Network Storage Applications Backup Auto Upload Syslog Apply Cancel

The following table describes the labels in this screen.

Table 105 Maintenance > Log > Report Config: Syslog Server Setting

LABELDESCRIPTION
Enable Syslog ServerCheck this to enable syslog server.
Server AddressEnter the syslog server address you want the NSA to use for its log alerts.
In the table below, check the type of log alerts you want to receive in your e-mail. Select All Log to include all types of log alerts.
ApplyClick this to save your changes.
CancelClick this to return to the previous screen without saving.

15.5 The Configuration Screen

Click Maintenance > Configuration to open the following screen. Use this screen to backup or restore the NSA configuration settings.

Figure 179 Maintenance > Configuration
ZYXEL NSA221 - The Configuration Screen - 1

text_image Maintenance - Configuration Backup Current Configuration Settings Click the "Backup" button to save the current configuration of our system to your local computer. Backup Restore Configuration To restore a previously saved configuration file to your system, browse to the location of the configuration file and click Restore. Restore File: Browse... Restore Reset MySQL Database Password Click the Reset MySQL Database Password button to reset the MySQL database password. Reset MySQL Database Password

The following table describes the labels in this screen.

Table 106 Maintenance > Configuration

LABELDESCRIPTION
Backup Current Configuration Settings
BackupClick this to save the current configuration of the NSA to your computer. A pop-up screen appears asking you to confirm. Click OK to continue or Cancel to quit.
Restore ConfigurationWhen you restore a file configuration, the NSA checks the volumes/share paths on the NSA and the configuration file.If the volume exists but the share path is missing in the NSA, the NSA automatically creates this share path.If the volume does not exist on the NSA, the Status of the share will show “missing share icon” in Shares screen (see Table 94 on page 300).
BrowseClick this to locate a previously-saved configuration file.
RestoreClick this to load the previously-saved configuration file to the NSA. This replaces your current NSA configuration settings with the settings in the previously-saved configuration file.A pop-up screen appears asking you to confirm. Click OK to continue or Cancel to quit.
Reset MySQL Database PasswordClick this to reset the password for your MySQL database.

15.6 SSL Certification

Click Maintenance > SSL to open this screen, where you can turn on HTTPS, create a public key certificate, or upload a public key certificate that was issued by a known certificate authority.

Figure 180 Maintenance > SSL
ZYXEL NSA221 - SSL Certification - 1

text_image Force HTTPS (TLS/SSL) Connections ⚠️Caution: Modifications of TLS/SSL certificate settings will restart network services. ☐Force HTTPS Apply Install System Default CA This action will install the system default CA in the trusted CA list of your browser Step1 Download the default CA file Download Step2 Double click on the CA file to install it into your browser Modify the Existing Certificate ⚠️Caution: Modifications of TLS/SSL certificate settings will restart network services. ○Edit a self-signed CA certificate Step1 Edit the Self-signed Certificate Edit Step2 Download the self-signed CA file Download Step3 Double click on the CA file to install it into your browser ○Create a Certificate To Be Authorized By My Own Certificate Authority

The following table describes the labels in this screen.

Table 107 Maintenance > SSL

LABELDESCRIPTION
Force HTTPSSelect theForce HTTPsoption to turn on the NSA's web browser security. Anyone who connects via HTTPS to the NSA must install the public key certificate associated with it.Note: The NSA will restart the web configurator after you clickApply.The NSA displays a warning screen if applying your change may disconnect some users. ClickApplyif you want to continue.ZYXEL NSA221 - SSL Certification - 2ZYXEL NSA221 - SSL Certification - 3
Install System Default CAClickDownloadbutton to save a copy of the NSA's public key certificate to your local computer. This is useful for installing the certificate without having to connect to the NSA, or for sending by email to other users for them to install prior to logging into the NSA for the first time. After saving the certificate to your computer, double-click it to install it.Note: Each web browser handles certificate installation differently. SeeAppendix D on page 399for more information.
Modify the Existing CertificateSelectEdit a self-signed CA certificate, then follow the on-screen instructions for creating a public key certificate signed by the NSA as the local certificate authority.Note: Use certificates created and signed by the NSA if the device is not open to external access.SelectCreate a certificate authorized by other CA, then follow the on-screen instructions to install a certificate that has been authorized by a third-party certificate authority.Note: Use this method if the device is open to external access, such as allowing users to connect through the Internet using FTP over TLS or HTTPS.

15.6.1 Modifying or Creating a Certificate

When you select the Edit a self-signed CA certificate option, then click the Edit button, a screen opens to allow you to make adjustments to the NSA's public key certificate.

The screen is also the same for the Create a certificate authorized by other CA option.

Figure 181 Maintenance > SSL > Create or Edit a Certificate
ZYXEL NSA221 - Modifying or Creating a Certificate - 1

text_image Create a Certificate Signing Request Common Name Host IP Address Host Domain Name Organizational Unit(Optional) Max length: 64 characters Organization(Optional) Max length: 64 characters Country(Optional) Country code only, such as TW, US, JP, etc,... Key Type RSA Key Length 1024 Note: If you choose a large key length, it may take a while to make the certificate file. Apply Cancel

The following table describes the labels in this screen.

Table 108 Maintenance > SSL > Create or Edit a Certificate

LABELDESCRIPTION
Common NameThis name describes the certificate's origin, either in the form of an IP address or a domain name.
Host IP AddressSelect this option and enter the NSA's IP address if you want to use this for the common name.
Host Domain NameSelect this option and enter the NSA's domain name if you want to use this for the common name
Organizational Unit (Optional)Enter this name of the organizational unit which owns or maintains the NSA. This is an optional field.
Organization (Optional)Enter this name of the organization or company which owns or maintains the NSA. This is an optional field.
Country (Optional)Enter this name of the country in which the NSA is located. This is an optional field.
Key TypeSelect the certificate's key type, either RSA or DSA. RSA is a public-key encryption and digital signature algorithm, while DSA is only a digital signature algorithm.
Key LengthSelect the encryption key length. The longer the key, the better the encryption security. The only drawback to having a long key is that the file encrypted with it swells in size as well.

Table 108 Maintenance > SSL > Create or Edit a Certificate

LABELDESCRIPTION
ApplyClick this to save your changes.
CancelClick this to discard changes and close the window.

15.7 The Firmware Upgrade Screen

Use this screen to upgrade the NSA firmware. You should first have downloaded the latest firmware files from the ZyXEL website.

Click Maintenance > FW Upgrade to open the following screen.

Figure 182 Maintenance > FW Upgrade
ZYXEL NSA221 - The Firmware Upgrade Screen - 1

text_image Maintenance - FW Upgrade Firmware Upgrade To upgrade the firmware, browse to the location of the binary (.BIN) upgrade file and click Upload. Upgrade files can be downloaded from the website. If the upgrade file is compressed (.ZIP file), you must first extract the binary (.BIN) file. In some cases, you may need to reconfigure this device after upgrading. You are currently using firmware version : V2010-02-08_01_06_40(AFM.0)b1 Firmware File Browse... Upload Reset Note: SYS led will blink orange while FW is upgrading. Please do not power off NSA while FW is upgrading. Check for Latest Firmware Periodically Check for Latest Firmware Automatically Apply Last check was on N/A Check for Latest Firmware Now

The following table describes the labels in this screen.

Table 109 Maintenance > FW Upgrade

LABELDESCRIPTION
Firmware FileType the location of the firmware file you want to upload
BrowseClick this to find the file on your computer
UploadClick this to upload the new firmware. The NSA automatically restarts after you upgrade. Wait until the restart completes before accessing the NSA again. If you interrupt the upgrade, then the NSA may become unusable.
ResetClick this to refresh the screen.
Periodically Check for Latest Firmware AutomaticallySelect this to have the NSA regularly check ZyXEL's server for updated firmware. The NSA notifies you at login if a new firmware is available.ClickApplyto save this field's setting.
Check for Latest Firmware NowClick this to check ZyXEL's server for updated firmware.

15.8 The Shutdown Screen

Use this screen to turn off the NSA or perform a software restart. A software restart is faster than turning the NSA off and then turning it on again. Before shutting down or restarting, check the System Status > Active Sessions screen to make sure that no one is logged into the NSA or transferring files to or from the NSA.

Click Maintenance > Shutdown to open the following screen.

Figure 183 Maintenance > Shutdown
ZYXEL NSA221 - The Shutdown Screen - 1

text_image Maintenance - Shutdown System Shutdown Click Restart to have the device perform a software restart. The SYS LED blinks as the device restarts and then stays steady on if the restart is successful. Wait a minute before logging into the device again. Restart Shutdown

The following table describes the labels in this screen.

Table 110 Maintenance > Shutdown

LABELDESCRIPTION
RestartClick this to have the device perform a software restart.
ShutdownClick this to shut down the system and restart it again later.

When you click the Restart button a pop-up screen will appear asking you to confirm. Click OK to continue or Cancel to quit the restart.

Figure 184 Maintenance > Shutdown > Confirm Restart
ZYXEL NSA221 - The Shutdown Screen - 2

When you click the Shutdown button a pop-up screen will appear asking you to confirm. Click OK to continue or Cancel to quit the shutdown.

Figure 185 Maintenance > Shutdown > Confirm Shutdown
ZYXEL NSA221 - The Shutdown Screen - 3

15.9 Technical Reference

This section provides technical background information on the topics discussed in this chapter.

15.9.1 Log Classes

The following table shows information on log classes.

Table 111 Log Classes

LOG CATEGORYDESCRIPTION
UsersThis log class shows information on user access to the NSA.
SharesThis log class shows information on shares being created or deleted.
ServicesThis log class shows information on the operation of the NSA's built-in services.
SystemThis log class shows all other system related messages.
NetworkThis log class shows information on network configuration, setting changes and so on.
StorageThis log class shows information on the NSA's internal and external storage activities.
BackupThis log class shows information on all backup-related activities.
Auto UploadThis log class shows information on automatic uploads done by the NSA.

15.9.2 Log Severity Levels

The following table shows information on log severity levels. Levels range from 0 to 6 with 0 being the most severe level log and 6 being an informational log only. Log levels are not displayed in the logs and are for your reference only.

Table 112 Log Severity Levels

LEVELDESCRIPTION
0Emergency
1Alert
2Critical
3Error
4Warning
5Notice
6Info

15.9.3 Log Messages

Here are some example log messages.

Table 113 Log Messages

CLASSSEVERITYMESSAGE
Auto uploadINFO%s is queued.
Auto uploadINFO%s uploaded (Flickr or YouTube Upload).
Auto uploadWARNINGerror uploading "%s" (%s): %s
Auto uploadINFO%s will not be uploaded to %s for there is already a duplicate file.
Auto uploadINFOFailed to upload %s to %s (FTP Upload) : %s
Auto uploadINFOSuccessfully upload %s to %s (FTP Upload)
Copy/Sync ButtonERROR[USB %s] Backup Folder Does Not Exist.
Copy/Sync ButtonERROR[USB %s] Target Folder Does Not Exist.
Copy/Sync ButtonERROR[USB Sync] Failed at %s: It is a Folder in Internal Volume. But It is not a Folder in USB.
Copy/Sync ButtonERROR[USB Sync] Failed at %s: It is a Folder in USB. But It is not a Folder in Internal Volume.
Copy/Sync ButtonERROR[USB Sync] Failed at File %s.
Copy/Sync ButtonERROR[USB Sync] Sync Failed at Folder %s.
Copy/Sync ButtonERRORModify COPY/SYNC Button Configuration: %s
Copy/Sync ButtonERRORPlease Change Your Folder Name. Invalid Path: %s
Copy/Sync ButtonINFO[USB Sync] Copying %s from Internal Volume to Backup Folder.
Copy/Sync ButtonINFO[USB Sync] Copying %s from Internal Volume to USB.
Copy/Sync ButtonINFO[USB Sync] Copying %s from USB to Backup Folder.
Copy/Sync ButtonINFO[USB Sync] Copying %s from USB to Internal Volume.
Copy/Sync ButtonINFO[USB Sync] Deleting %s from Internal Volume.
Copy/Sync ButtonINFO[USB Sync] Deleting %s from USB.
Copy/Sync ButtonINFO[USB Sync] Deleting %s from USB Recursively.
Copy/Sync ButtonINFO[USB Sync] Finished. Elapsed Time %s Seconds.
Copy/Sync ButtonINFO[USB Sync] Moving %s from Internal Volume to Backup Folder.
Copy/Sync ButtonINFO[USB Sync] Moving %s from USB to Backup Folder
Copy/Sync ButtonINFO[USB Sync] Skip %s: File not Exist
Copy/Sync ButtonINFO[USB Sync] Skip %s: Not a Regular File.
Copy/Sync ButtonINFO[USB Sync] Start Pre-Processing: Generating File Lists.
Copy/Sync ButtonNOTICE[USB Sync] Start Copying Files.
Download ServiceERRORDownload service cannot find a volume
Download ServiceERRORDownload service failed to find ipfilter.dat
Download ServiceINFODownload service add a URL download job %s
Download ServiceINFODownload service delete %s by user
Download ServiceINFODownload service download %s error (0x%08x)
Download ServiceINFODownload service download %s finished in %s
Download ServiceINFODownload service found a new torrent file %s
Download ServiceINFODownload service initialized
Download ServiceINFODownload service pause %s by user
Download ServiceINFODownload service set %s to %s priority by user
Download ServiceINFODownload service set default download location to %s
Download ServiceINFODownload service set max BT download rate to %d KB/s by user
Download ServiceINFODownload service set max BT upload rate to %d KB/s by user
Download ServiceINFODownload service set max download slot to %d
Download ServiceINFODownload service set seeding time to %d minutues
Download ServiceINFODownload service set TCP port to %d and UDP port to %d
Download ServiceINFODownload service set torrent monitor location to %s
Download ServiceINFODownload service start to download %s
Download ServiceINFODownload service stopped
Download ServiceINFODownload service suspend %s because of no data income detected or to limit max download slot
Download ServiceINFODownload service add comment %s to %s by user
Download ServiceINFODownload service set min upload/download ratio to %d%
Download ServiceINFODownload service set max seed slot to %d
Download ServiceINFODownload service start loading ipfilter.dat
Download ServiceINFODownload service clear all ipfilter rules
Download ServiceINFODownload service blocked peer removed from peer list
Download ServiceINFODownload service disconnected blocked peer
Download ServiceINFODownload service incoming connection blocked by IP filter
Download ServiceINFODownload service peer from tracker blocked by IP filter
Download ServiceINFODownload service abort loading ipfilter.dat
Download ServiceINFODownload service will update ipfilter.dat from %s after %d day(s)
Download ServiceINFODownload service added %d rules from ipfilter.dat
Download ServiceINFODownload service detected invalid ip range %s in ipfilter.dat
Download ServiceWARNINGDownload service default location does not exist. Load default
Download ServiceWARNINGDownload service default torrent location does not exist. Load default
GroupsNOTICEAdd new group %s.
GroupsNOTICEDelete group %s.
NetworkNOTICE%s is active because of changing Port Group. Enable DHCP client.
NetworkNOTICE%s is inactive because of changing Port Group. Disable DHCP client.
NetworkNOTICE%s MTU > (%s MTU - 8), %s may not work correctly.
NetworkNOTICE(%s MTU - 8) < %s MTU, %s may not work correctly.
NetworkNOTICEAdd interface %s.
NetworkNOTICEBecause %s link down. Default route will not apply until %s link up.
NetworkNOTICEBecause base interface %s will be disabled. Interface %s is disabled now., base_ud_iface
NetworkNOTICENetwork Config setting is changed
NetworkNOTICEInterface %s was disabled.
NetworkNOTICEInterface %s was enabled.
NetworkNOTICEPort Group on %s is changed. Renew DHCP client.
NetworkNOTICEAccount pppoe was changed
NetworkNOTICEAdd account pppoe
NetworkNOTICEADD interface ppp0
NetworkNOTICEInterface ppp0 will reapply because Device-Ha become active status.
NetworkNOTICEInterface ppp0 will reapply because Device-Ha is not running.
NetworkNOTICENetwork port is disabled
NetworkNOTICENetwork port is enabled
ServicesINFOHTTP management port has changed to %s
ServicesINFOClock timezone is set to GMT%s
ServicesINFOClock timezone is set to default
ServicesINFOClock daylight saving is enabled
ServicesINFOClock daylight saving is disabled
ServicesINFOClock has disable daylight saving
ServicesINFOMyClock has enable daylight saving
ServicesINFOMyClock has set timezone to %s
ServicesINFOMyClock has set timezone to default
ServicesINFOThe date and time are updated from NTP server.
ServicesINFOThe date and time are updated manually.
ServicesINFOThe time is updated manually.
ServicesNOTICEFTP server stops
ServicesNOTICEFTP server starts
ServicesNOTICEMyClock has changed daylight saving interval
ServicesNOTICEMyClock has disabled daylight saving interval
ServicesNOTICENTP server has set to '%s'
ServicesNOTICENTP server has set to null
ServicesNOTICEThe NTP service is disabled.
ServicesNOTICEThe NTP service is enabled.
ServicesWARNINGReaching Maximum Allowed Rules
ServicesWARNINGRule is empty
ServicesWARNINGThe Rule Does Not Exist
SharesINFOExpire recycle-bin finish for share %s, process time: %s seconds, remove %s file (%s bytes)
SharesNOTICEAdd new disabled share %s for unshared folder: %s in volume: %s.
SharesNOTICEAdd new share %s.
SharesNOTICEDelete share %s.
SharesNOTICEPurge all files in recycle-bin folder in share: %s.
SharesNOTICERecycle-bin disabled. Remove recycle-bin folder in share: %s.
StorageERROREject External Disk (%s): FAILED
StorageINFOEject External Disk (%s): SUCCESS
StorageERRORRelabel Raid to [%s]: FAILED
StorageERRORStart Repairing Degraded Raid by disk%s: FAILED
StorageINFORelabel Raid to [%s]: SUCCESS
StorageINFOStart Repairing Degraded Raid by disk%s: SUCCESS
StorageNOTICEAuto Repair Degraded RAID by disk%s.
StorageNOTICEThere is a RAID Degraded.
StorageERRORCancel External Volume Scan: FAILED
StorageERRORCancel Internal Volume Scan: FAILED
StorageERRORCannot Unmount Volume and RAID. System Busy Using Volume and RAID: Please Reboot and Try Again
StorageERRORCreate External Normal Volume [%s] (%s): FAILED
StorageERRORCreate Internal Volume [%s] (%s): FAILED
StorageERRORRename External Volume to [%s]: FAILED
StorageERRORScan External Volume: FAILED
StorageERRORScan Internal Volume (%s operation): FAILED
StorageINFOCancel External Volume Scan: SUCCESS
StorageINFOCancel Internal Volume Scan: SUCCESS
StorageINFOCreate External Normal Volume [%s] (%s): SUCCESS
StorageINFOCreate Internal Volume [%s] (%s): SUCCESS
StorageINFORename External Volume to [%s]: SUCCESS
StorageINFOScan External Volume: SUCCESS
StorageINFOScan Internal Volume (%s operation): SUCCESS
SystemINFONTP update failed
SystemINFONTP updates successfully from %s
SystemINFONTP fails to update from %s
SystemINFODevice is rebooted by administrator!
SystemINFODevice is shutdown by administrator!
SystemNOTICEDNS server is changed.
SystemNOTICEHostname is cleared.
SystemNOTICEHostname is set to '%s'.
SystemNOTICESystem description is changed.
SystemNOTICESystem description is empty now.
SystemNOTICEDNS server setting is changed
SystemNOTICEDNS server address is changed to be given from DHCP server
SystemNOTICEDNS server address is changed to be assigned by user
SystemNOTICEName server is changed.
USBNOTICEAn external APC UPS device is plugged/unplugged.
USBNOTICEAn external Mass Storage device is plugged/unplugged.
USBNOTICEAn external Printer device is plugged/unplugged.
USBNOTICEAn external USB hub device is plugged/unplugged.
UsersALERTFailed %s login attempt (incorrect password or inexistent username)
UsersALERTFailed %s login attempt (incorrect password or inexistent username)
UsersINFOUser %s has logged in from %s!
UsersINFOUser %s has logged out from %s!
UsersINFOUser %s from %s has been logged out (re-auth timeout)!
UsersINFOUser %s from %s has been logged out (lease timeout)!
UsersNOTICEAdd new user %s by %s from %s.
UsersNOTICEUser %s password has been changed.
UsersNOTICEDelete user %s by %s from %s.
UsersNOTICEThe user %s from %s has attempted to change the user %s password but old password verification fail.
UsersNOTICEUser %s on %u.%u.%u.%u has been denied access from %s
UsersNOTICEUser %s password has been changed by %s from %s.
Backup/RestoreERRORWhen query remote target [%s]: %s
Backup/RestoreINFOBackup job [%s] successfully
Backup/RestoreERRORWhen backup [%s]: %s
Backup/RestoreERRORWhen backup [%s], error happens: %s
Backup/RestoreINFOStart to restore backup job [%s].
Backup/RestoreINFORestore backup job [%s] successfully.
Backup/RestoreERRORRestore backup job [%s] failed: %s
Backup/RestoreINFOStart to restore backup job [%s] from [%s].
Backup/RestoreINFORestore from [%s] successfully.
Backup/RestoreERRORRestore from [%s] failed: %s
Backup/RestoreERRORWhen restore [%s]: %s
Backup/RestoreERRORWhen restore job [%s], error happens: %s
Power ManagementINFOJob [%s] is triggered by schedule
Power ManagementINFOJob [%s] is triggered by user
Power ManagementERRORJob [%s] is resulted as failed
Power ManagementINFOJob [%s] is finished successfully
Power ManagementINFOJob [%s] is pending because other job is running
Power ManagementINFOJob [%s] is canceled by user
Power ManagementINFORestore job [%s] is triggered by user
Power ManagementINFO[Power On] schedule is triggered.
Power ManagementINFO[Power Off] schedule is triggered.
Power ManagementINFO[Reboot] schedule is triggered.

Protecting Your Data

16.1 Overview

This chapter compares the different ways of protecting data on the NSA and explains how to use backup management software included on the CD.

16.2 Protection Methods

There are a variety of ways to protect your data on the NSA. Below is a summary table of what can be done in each situation.

Table 114 Overview of Protection Methods

SITUATIONACTION
Unexpected NSA behavior after configuration changesBack up the NSA configuration file before you make major configuration changes.
Need to transfer data from your computer to the NSA after volume(s) have been createdUse the Memeo Autobackup program.
Data infected by virusUse anti-virus software on your computer to scan files before saving them onto the NSA. Although this may be slow so you may want to schedule it to occur while no one is using the NSA.Use a firewall with anti-virus capability on your network.
Hard drive malfunction.Use RAID.
NSA malfunctionNetwork downNatural disaster such as a fire or earthquake occurs where your NSA is locatedBack up data to another NSA or external USB hard drive.

The following sections describe these methods in more detail. See Section 7.6.3 on page 157 for more information on RAID.

16.3 Configuration File Backup and Restoration

Use the Maintenance > Configuration menus to create a file of your NSA configurations such as passwords, shares and volumes created, network settings and so on. If you're going to do some major configuration changes, then it is advisable to create a configuration backup file. If things go wrong after you make the configuration changes, you can always go back to the previous configuration by restoring an earlier configuration file.

If you forgot the NSA password, then use the RESET button (see Section 17.4.1 on page 344) to return the NSA to the factory default configuration.

Note: Configuration File Backup and Restoration does not affect data (your files and folders), volumes on the NSA.

16.4 Memeo Autobackup

Use the Memeo Autobackup software (included on the CD) on your computer to schedule and manage backups. You can backup from your computer to the NSA. You can also backup from one NSA on your network to another. You can set the Memeo Autobackup software to automatically back up files from your computer to the NSA whenever you modify the files.

Install the included DLNA-compliant Memeo Autobackup software on your Windows XP or later computers to let them browse and play files stored on the NSA.

Note: The Memeo Autobackup program uses the same network port as the NAS Starter Utility to discover the NSA. To avoid a port conflict, do not run the Memeo Autobackup program at the same time as the NAS Starter Utility.

Use the Memeo Autobackup software included on the CD to automatically back up selected files from your computer to the NSA whenever you modify the files.

Memeo Autobackup works with Windows XP, Windows Vista, and both the 32 bit and 64 bit versions of Windows 7.

16.4.1 Memeo Autobackup Installation and Setup

Note: The Memeo Autobackup program uses the same network port as the discovery utility to discover the NSA. To avoid a port conflict, turn off the discovery utility before using Memeo Autobackup.

1 Since a computer restart is required, close your other files and programs before installing the Memeo Autobackup software.
2 Insert the included CD into your CD-ROM drive. Click the Tools icon in the screen that displays. Then click Memeo Instant Backup Software.

Note: If this screen does not display, use Windows Explorer (My Computer) to go to the CD-ROM (commonly drive D). Double-click setup.exe.

3 Follow the instructions to install the software.

Note: Memeo Autobackup requires Microsoft.NET version 2.0. The wizard installs it for you if it is not already on your computer.

4 When you see the following screen, select Network Places and click the link to select your backup folder.

Figure 186 Memeo Autobackup Configuration
ZYXEL NSA221 - Memeo Autobackup Installation and Setup - 1

text_image Memeo AutoBackup Configuration 1 2 3 SELECT A DESTINATION mëmeo AutoBackup™ Network Places Memeo Internet Disk Network Places Hard Disk Removable Storage Device iPod Device Back up files to Click here to select backup folder Select this backup destination type if you're backing up to a shared folder on your Windows network. For more information about shared folders, see 'shared folders' in Windows Help.

5 Select the NSA's mapped drive and click OK.

Figure 187 Mapped Drive
ZYXEL NSA221 - Memeo Autobackup Installation and Setup - 2

text_image Browse For Folder Select a destination folder for your backups. My Computer 3½ Floppy (A:) Local Disk (C:) Local Disk (D:) Compact Disc (E:) TW-archive on 'Tw1477-testpc' (F:) TWBackup on 'Tw1477-testpc' (G:) public on 'NSA-220 PLUS (nsa220plus)' (V:) Apps on 'zytwfs01.zyxel.com' (W:) Control Panel OK Cancel New Folder

6 In this screen, select the items that you want to back up.

Figure 188 Backup Items
ZYXEL NSA221 - Memeo Autobackup Installation and Setup - 3

text_image Select Items to Back Up SmartPicks Folders Backup Items Files in My Documents Files in My Pictures Files on the Desktop Internet Explorer Favorites MS Outlook - E-mail, Appointments, Contacts, and Tasks MS Outlook Express - E-mail Word processing documents, Spreadsheets, and Presentations Financial Files Photos and Pictures Music and Sound Files Video Files Bookmarks (Firefox and Netscape) Cancel Done

7 This screen lists the items you selected for backup. Confirm your selections and click Next.

Figure 189 Confirm Backup Items
ZYXEL NSA221 - Memeo Autobackup Installation and Setup - 4

text_image Memeo AutoBackup Configuration 1 2 3 SELECT ITEMS TO BACK UP memeo AutoBackup™ Backup Items Files in My Documents Files in My Pictures Total Size 110.4 MB 9.7 KB Files 1G 1 Add Backup Items Remove Selected Item Show Advanced Options Required Space Available Space 0 KB 54.8 GB 109.7 GB Help Back Next

8 Specify a name for your backup plan (or just use the default). Click Next and then Done.

Figure 190 Backup Plan Name
ZYXEL NSA221 - Memeo Autobackup Installation and Setup - 5

text_image Memeco Autofallockup Configuration 1 2 3 PROVIDE BACKUP PLAN NAME memeo AutoBackup™ Enter Backup Plan Name: Administrator's Backup ✓ Copy Memeo OneClick Restore application to backup destination (Learn more) Protect Your Digital Life Help Back Next

16.4.2 Using Memeo Autobackup After the Initial Setup

After you have installed and configured Memeo Autobackup, double-click the icon in the system tray to open the program's start screen.

ZYXEL NSA221 - Using Memeo Autobackup After the Initial Setup - 1

If the icon is not displayed, you can click Start > Programs > Memeo Autobackup > Memeo Autobackup to start it.

Figure 191 Memeo Autobackup
ZYXEL NSA221 - Using Memeo Autobackup After the Initial Setup - 2

text_image Windows 2000 Professional Programs Documents Settings Search Help Run... Shut Down... Memeo AutoBackup Memeo AutoBackup Memeo OneClick Restore Restore Files crop selection Swap: 25922 MB Mem: 53463 KB Start Corel PHOTO-PAINT 8 - [...] Adobe FrameMaker (Stru...)

Troubleshooting

17.1 Troubleshooting Overview

This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories.

• Power, Hardware, Connections, and LEDs
• NAS Starter Utility
• NSA Login and Access
• I Cannot Access The NSA
- Users Cannot Access the NSA
• External USB Drives
- Firmware
- File Transfer
- Networking
- Some Features' Screens Do Not Display
• Media Server Functions
- Download Service and Broadcatching Functions
- Web Publishing
- Auto Upload
• Package Management
- Backups

17.2 Power, Hardware, Connections, and LEDs

The NSA PWR LED does not turn on (no LEDs are on).

- Make sure the NSA is turned on.

  • Make sure you are using the power adaptor or cord included with the NSA.
  • Make sure the power adaptor or cord is connected to the NSA and plugged in to an appropriate power source. Make sure the power source is turned on.
  • Turn the NSA off and on.
  • If the problem continues, contact the vendor.

An HDD LED is off.

The HDD LED is off when the NSA cannot detect a hard drive in the drive bay. Replace or install a hard drive. See Installing or replacing a hard disk.

An HDD LED is red.

Red means that the NSA detected an error on the hard drive (like a bad sector for example). The NSA automatically tries to recover a bad sector, but the LED stays red until the NSA restarts. Even if the hard drive still functions, it is recommended that you replace it since errors are a sign that the hard drive may fail soon. See Installing or replacing a hard disk.

Installing or replacing a hard disk.

Do not remove or install a hard disk while the NSA is turned on. The NSA must be turned off before you remove or install the hard disk.

1 Turn the NSA off, remove the front panel and make sure:

  • there is a SATA I or SATA II (3.0 Gbit/s) compatible hard disk installed.
  • the hard disk is installed correctly in the disk bay. Push the disk back into the NSA disk bay until the hard disk is fitted snugly inside the NSA (see the NSA Quick Start Guide and Section 7.2.1 on page 148).
  • the hard disk could be faulty. Try a different hard drive or test the original hard disk in a different NSA or computer.

2 If you had to replace the drive, turn on the NSA and go to the Storage screen.

  • If you have a RAID I volume click the Repair icon next to the new drive.
  • If you are using RAID 0 you will need to recreate the whole volume. All of your data is lost.

  • If you are using a single-disk JBOD volume, you need to create a new volume on the new drive.

  • If you are using a two-disk JBOD volume, you need to create a whole new volume on both drives.

The LAN LED (by the LAN port) is off.

  • Make sure the Ethernet cable is connected properly to the NSA and connected to another (Ethernet) device. Make sure the other device is turned on. If it's connected directly to a computer, make sure that the computer network card is working (ping 127.0.0.1 on the computer).
  • Use another Ethernet cable. If you're connecting to a Gigabit Ethernet, make sure you're using an 8-wire Ethernet cable.
  • If the problem continues, contact the vendor.

See Section 1.3 on page 23 for a description of NSA LEDs.

The NSA turns off or reboots by itself.

Check the Power Management screen. This is where you configure power settings for the NSA, including power saving, UPS, power on/off during power failure and power on/off schedule. The NSA may be set to turn off under certain conditions.

A power failure occurred while the NSA is downloading files.

  • If power failure occurs during the active download period, the NSA will verify whether the downloaded files were damaged.
  • If a file is corrupted, the NSA will download the file again.
  • If the file is intact but not completely downloaded, the NSA will resume the download task after it restarts.

17.3 NAS Starter Utility

The NAS Starter Utility cannot discover my NSA.

  • Close the NAS Starter Utility and reopen it.
  • Check your hardware connections and make sure they are set up correctly.
  • Only one instance of the NAS Starter Utility can run on your computer. Make sure you close any duplicate windows for this application.
  • Wait for the SYS LED to stop blinking before clicking Discover.
  • Confirm that the computer running the NAS Starter Utility has a network connection. See the section on the NSA's LAN connection for related information.
  • The computer running the NAS Starter Utility can only discover NSAs in the same subnet. NSAs connected to the same switch or router as your NAS Starter Utility computer are usually in the same subnet unless the router is doing subnetting or the switch is implementing VLAN.
  • The Memeo Autobackup program uses the same network port as the NAS Starter Utility to discover the NSA. To avoid a port conflict, do not run the Memeo Autobackup program at the same time as the NAS Starter Utility.

I was able to access the NSA on a previous attempt but I cannot access the NSA anymore.

If you enable jumbo frames on the NSA in a network that does not support them, you will lose access to the NSA. If this occurs, you will have to restore the factory default configuration. The reset process does NOT affect the volume settings, nor data stored on the NSA. Push the RESET button on the NSA's rear panel and release it after you hear a beep (Section 17.4.1 on page 344).

I have at least two NSAs in my network, how do I identify which one I want to configure in the NAS Starter Utility screens.

If you have several NSAs connected to your computer/network, give each a unique name. You may have to disconnect all but one and use the NAS Starter Utility to rename it. Then connect another NSA and rename it and continue to connect and rename the NSAs one-by-one until they are all connected and each has a unique name.

Alternatively, if you have a DHCP server on your network and you can access it's list of assigned IP addresses, you could see which IP address belongs to which NSA. You can check the MAC address of your NSA by checking the attached sticker in the device housing.

17.4 NSA Login and Access

I forgot the server name of the NSA.

  • The default server name is nsa221.
  • Use the NAS Starter Utility to discover your NSA. If you have admin privileges, you can directly change the IP address of the NSA using the NAS Starter Utility.
  • If the server name has changed and you don't have the NAS Starter Utility, see Section 17.4.1 on page 344 to use the RESET button to return the default setting.

I cannot get to the NSA login screen.

  • Use the NAS Starter Utility to discover your NSA. If you have admin privileges, you can directly change the IP address of the NSA using the NAS Starter Utility.
  • Make sure you have used the NAS Starter Utility to initialize your NSA.
  • If you used the RESET button, the NSA may have a new IP address. Close and reopen the NAS Starter Utility to discover the NSA.
  • Make sure the NSA is turned on.
  • If you are trying to login directly by typing the server name into your web browser's address field, make sure you are using the correct server name as the web site address.
  • The default server name is nsa221, if you have changed the server name, use the new one.
  • If the server name has been changed and you do not know the new server name, see the troubleshooting suggestions for I forgot the server name of the NSA.
  • If it still doesn't work, try using the NAS Starter Utility.
  • Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 1.3 on page 23.

  • By default, the NSA gets an IP address automatically. The NSA assigns itself an IP address if no device assigns one. If your computer is also set to get an IP address automatically, the computer and the NSA can both assign themselves IP addresses and communicate. See Section 8.4 on page 163 if you need to configure the NSA with a static IP address.

  • Make sure your computer's IP address is in the same subnet as the NSA's IP address. You can use the NAS Starter Utility to find the NSA's IP address. See Appendix A on page 369 for how to change your computer's IP address. Skip this if you know that there are routers between your computer and the NSA.
  • Ping the NSA from your computer. Make sure your computer's Ethernet adapter is installed and functioning properly. In a (Windows) computer, click Start, (All) Programs, Accessories and then Command Prompt. In the Command Prompt window, type "ping" followed by the NSA's IP address (use the NAS Starter Utility to find the NSA's IP address if you don't know it) and then press [ENTER].
  • Make sure you are using Internet Explorer 6.0 (and later) or Firefox 1.07 (and later).
  • Make sure your Internet browser does not block pop-up windows and has JavaScript and Java enabled. See Appendix B on page 385. With Internet Explorer 6, you may also have to enable scripting of safe ActiveX controls. See Section 17.4.2 on page 345.

17.4.1 Reset the NSA

If you forget your password or cannot access the web configurator, use the RESET button at the rear of the NSA. When you use the following reset procedure, the system name and admin password are returned to the factory defaults.

You may need to close and re-open the NAS Starter Utility to discover the NSA. This is because the NSA automatically re-acquires IP address information, so its IP address may change since. If no IP address information is assigned, the NSA uses Auto-IP to assign itself an IP address and subnet mask. For example, you could connect the NSA directly to your computer. If the computer is also set to get an IP address automatically, the computer and the NSA will choose addresses for themselves and be able to communicate.

1 Press and hold the RESET button (for about two seconds) until you hear a beep, and then release it.

2 The NSA automatically restarts to complete the reset.

I forgot the password.

• The default password is 1234.

- If you have changed the password and forgotten it, you will have to reset the NSA.

17.4.2 Enabling Scripting of Safe ActiveX Controls

If pages of the web configurator do not display properly in Internet Explorer, check that scripting of safe ActiveX controls is enabled.

1 In Internet Explorer, click Tools, Internet Options and then the Security tab.

Figure 192 Internet Options: Security
ZYXEL NSA221 - Enabling Scripting of Safe ActiveX Controls - 1

text_image Internet Options General Security Privacy Content Connections Programs Advanced Select a Web content zone to specify its security settings. Internet Local intranet Trusted sites Restricted sites Internet This zone contains all Web sites you haven't placed in other zones Sites... Security level for this zone Move the slider to set the security level for this zone. Medium - Safe browsing and still functional - Prompts before downloading potentially unsafe content - Unsigned ActiveX controls will not be downloaded - Appropriate for most Internet sites Custom Level... Default Level OK Cancel Apply

2 Click the Custom Level... button.
3 Under Script ActiveX controls marked safe for scripting, make sure that Enable is selected (the default).

4 Click OK to close the window.

Figure 193 Security Settings - Script Safe ActiveX Controls
ZYXEL NSA221 - Click OK to close the window. - 1

text_image Security Settings Settings: Run ActiveX controls and plug-ins Administrator approved Disable Enable Prompt Script ActiveX controls marked safe for scripting Disable Enable Prompt Downloads File download Disable Enable Font download Reset custom settings Reset to: Medium Reset OK Cancel

I can see the login screen, but I cannot log in to the NSA.

  • Make sure you have entered the username and password correctly. The default username is admin, and the default password is 1234. These fields are case-sensitive, so make sure [Caps Lock] is not on.
  • Turn the NSA off and on.
  • If this does not work, see Section 17.4.1 on page 344 to reset the device.

I cannot see the multi-language web configurator screens while using Internet Explorer.

Use Section 17.4.2 on page 345 to enable the scripting of safe ActiveX controls.

The Web \Configurator logs out by itself.

The web configurator management session automatically times out if it is left idle for 15 minutes. Simply log back into the NSA if this happens to you.

17.5 I Cannot Access The NSA

I cannot access a share.

  • Check that the NSA is turned on and connected to the network. Try to ping the NSA or use the NAS Starter Utility to discover it.
  • Make sure you have used the NAS Starter Utility to initialize your NSA. See Chapter 2 on page 27 for more information.
  • Check that you entered your login name and password correctly.
  • Check that the share exists and check its access settings.
  • Check if the shared folder is a subfolder of another (parent) share. Check that the parent share's access rights do not conflict with the subfolder share. It is recommended that you do not create subfolder shares.
  • Check if there are any existing mapped network drives to the NSA. You may need to disconnect existing mapped network drives as a new mapped network drive connection may use (different) previously-saved login information. To do this, open Windows Explorer and click Tools > Disconnect Mapped Network Drives.
  • Check that the volume in which the share resides, exists and is not down or degraded. If it is down or degraded, see Section 17.2 on page 339.
  • Make sure you have the client for Microsoft networks installed and enabled in your network connection's properties.
  • In Windows XP or 2000, click Start > Settings > Control Panel > Network Connections (Network and Dial-up Connections in Windows 2000/NT) > Local Area Connection > Properties.
  • Check that Client for Microsoft Networks is in the list of components and has its check box selected.

17.6 Users Cannot Access the NSA

A local user cannot access a share

  • Check that the NSA is turned on and connected to the network. The local user should try to ping the NSA or use the NAS Starter Utility to discover it.
  • The local user should check that he entered his login name and password correctly.
  • Check if the share exists and has the correct access settings for this user.

  • Check the Access Control List (ACL) of read/write permissions associated with specific files and/or folders. Account names added to the list are linked to the files and folders that they are allowed to access, along with what kinds of actions they are allowed to perform with those files and folders (delete, move, rename, and so on).

  • The user's computer may already be connected to another of the NSA's shares using a different user name and/or password. This can happen without the user realizing it if the user's computer automatically connects to a share at logon. Right-click any other connected shares and click Disconnect. Then re-attempt to connect to the desired share.
  • Check if the share has an ANONYMOUS or EVERYONE access right. If the user is already logged into a share using her username and password, she will NOT be able to access a share that has ANONYMOUS FTP only access rights (as these require 'no login'). In this case she should log out and try to access the share again without logging in. See Section 9.4 on page 176 for more details.
  • Check if the shared folder is a subfolder of another (parent) share. Check that the parent share's access rights do not conflict with the subfolder share. It is recommended that you do not create subfolder shares.
  • Check if the user belongs to a group with conflicting access rights. DENY always takes precedence. If you allow a user FULL access to a share but set his group to DENY, then he will NOT be able to access the share.
  • The local user should check if there are any existing mapped network drives to the NSA. He may need to disconnect existing CIFS connections as new CIFS connection may use previously-saved login information that may be different to NSA login.
  • Check that the array in which the share resides, exists and is not down or degraded. If the array is down or degraded, see Section 17.2 on page 339.
  • If the user is using DFS links, then he can only access the NSA using CIFS and not FTP.
  • Check that the share has not been disabled.

I cannot import domain user or user group information even though testing of the connection to the domain controller is OK.

- Check the NSA's DNS setting. The DNS server the NSA is using must be able to resolve the domain controller's address. If the domain controller uses a private IP address, the NSA needs to use a private DNS server. If the domain controller uses a public IP address, the NSA needs to use a public DNS server.

- Leave the domain and re-join it.

A domain user can't access a share.

In addition to the checks listed previously for local users, check that the domain controller is turned on and connected to the network.

A user can access a share but cannot access individual folders or files within the share.

- Check the Access Control List (ACL) of read/write permissions associated with the share's specific files and/or folders. Account names added to the list are linked to the files and folders that they are allowed to access, along with what kinds of actions they are allowed to perform with those files and folders (delete, move, rename, and so on).

17.7 External USB Drives

The COPY LED is red.

Copying files from a USB device failed. The USB device may not be compatible with the NSA. Try save the files onto a computer and then from the computer to the NSA (through the network connection).

17.8 Firmware

I want to know the firmware version on the NSA.

Go to the Status screen. The Firmware field shows you the current firmware version running.

17.9 File Transfer

I want to transfer my file(s) from my local computer or storage device to the NSA.

- After you initialize your hard disk, you can directly access the folders in your NSA and transfer files in the same way you transfer files in your local computer:

1 On your Windows computer, click Start > Run or open a web browser.
2 Enter \nsa221 (default) or the Server Name you assigned the NSA. This shows you the folders in the NSA.
3 Use drag-and-drop or copy-and-paste to transfer files over to your NSA.

- Use the COPY/SYNC button to transfer files from an external (USB) storage device to the NSA.

- If the file you want to transfer is less than or equal to 2GB, you can use the NSA Starter Utility's zPilot screen (see Section 2.6 on page 41).

I want to transfer my file(s) from the NSA to my local computer or storage device.

- After you initialize your hard disk, you can directly access the folders in your NSA and transfer files in the same way you transfer files in your local computer:

1 On your Windows computer, click Start > Run or open a web browser.
2 Enter \nsa221 (default) or the Server Name you assigned the NSA. This shows you the folders in the NSA.
3 Use drag-and-drop or copy-and-paste to transfer files from your NSA to your local computer's folder or your storage device.

- You can download the files from your NSA. Just click on the file(s) in the Share Browsing screen (Section 3.4.3 on page 55). Your computer will prompt you for the location where you want to save the file.

17.10 Networking

I want to control who can access my folder(s)/file(s).

  • If you are an administrator, you can configure a user's access rights. Use the Shares screen (Section 14.3 on page 300) to do this.
  • If you enabled Web Publishing for a folder, anyone on your network can play the media files in the published shares. No user name and password or other form of security is used. The media server is enabled by default with the video, photo, and music shares published.

One of the computers in my network cannot use the printer I connected to the NSA.

  • You must install the printer driver on each computer that will use the printer.
  • Check Section 17.4 on page 343 and check for related connectivity issues.

17.11 Some Features' Screens Do Not Display

Many NSA features require a valid internal volume.

Features like the print server, download service, broadcatching, FTP and Windows/CIFS access will not work without a valid internal volume. Make sure you have a volume on an internal disk and that the volume is in the healthy state.

  • Install an internal disk if one is not installed yet or has failed. See the Quick Start Guide for how to install an internal disk.
  • Create a new volume if you do not have one on the internal disk yet.
  • Make sure the volume on the installed internal disk is in a healthy state.

I cannot use some applications in the Web Configurator.

  • The firmware installed in your NSA includes the features mentioned in Section 3.5.2 on page 64. This does not include the applications you can install using the Package Management screen.
  • You can use the Package Management screen (Chapter 10 on page 219) to install more applications from a web location (specified in the firmware) to your NSA.
  • If you have installed the application and can see the application's configuration screen but still cannot use it, check that you have Enabled the application.

17.12 Media Server Functions

I set the media server function to publish a folder, but some of the files in the folder do not display in the list on the media client.

Files with formats that are not supported on the media server may not display in the list. See Section 18.4 on page 366 for the file formats that the media server supports.

I published a folder with the media server function, but the media client does not play some of the files (or does not play them properly).

1 Files with formats that are not supported on the media server may not display in the list. See Section 18.4 on page 366 for the file formats that the media server supports.
2 If you are using media client software, you may need to install codecs on your computer. Since the media client software uses your computer's installed codecs, files do not play if the required codec is not installed on your computer.
3 The media client may not support the file's format.

iTunes does not display the names of all the music or video files I just put on the NSA.

1 Make sure the files are a format supported by iTunes. See Section 18.5 on page 367.
2 Go to Applications > Media Server. Make sure the share containing the music and video files is published and the iTunes server option is enabled.

3 If an iTunes client is connected, the NSA's iTunes server function scans the published media server folders for files every three minutes. Leave iTunes connected to the NSA for three minutes. Then use the NSA's eject button (as shown next) to disconnect.

Figure 194 iTunes Eject Button
ZYXEL NSA221 - Media Server Functions - 1

text_image File Edit View Controls Store Advanced Help iTunes View LIBRARY Music Movies TV Shows Podcasts Radio STORE iTunes Store SHARED nsa PLAYLISTS Party Shuffle Name Time Artist Album Annie's Song 3:49 «~~a aù SÃê I Can Wait Forever 5:11 Air Supply The Defini Every Woman In the World 3:30 Air Supply Can't Take My Eyes Off You 3:23 Al Green 10 Things The Name Of The Game 4:56 Amanda Seyfried & S... Mamma Mi Honey, Honey 3:07 Amanda Seyfried, As... Mamma Mi Money, Money, Money 3:07 Amanda Seyfried, As... Mamma Mi Gimme! Gimme! Gimme! (A Man Af 3:53 Amanda Seyfried, As... Mamma Mi Music to watch girls go by 2:36 Andy Williams The Best o Walk on by 2:48 Aretha Franklin Bandits O'S I Write The Songs 3:55 Barry Manilow Ain't No Sunshine 2:03 Bill Withers Smooth Ja Chances Are 3:22 Bob Marley We're all alone 4:04 Boz Scaggs Some Cha

4 Then click the NSA's link to reconnect.

Figure 195 iTunes Reconnected
ZYXEL NSA221 - Media Server Functions - 2

text_image File Edit View Controls Store Advanced Help iTunes View LIBRARY Music Movies TV Shows Podcasts Radio STORE iTunes Store SHAPED nsa220plus PLAYLISTS Party Shuffle Albums Artists Genres Composers

5 Another way to get the NSA's iTunes server function to scan the published media server folders for files is to go to Applications > Media Server and disable and re-enable the iTunes server option. If you uploaded many files, it may take awhile for the NSA to find and list all of them. Then try reconnecting your iTunes client.

I cannot use iTunes to play files located on my NSA.

1 Make sure the files are a format supported by iTunes. See Section 18.5 on page 367.
2 If you have files from the iTunes Store that use DRM, you need to use your Apple account ID and password to authorize other computers to play the files. Apple permits you to authorize up to five computers at a time. To authorize a computer, open iTunes and click Store > Authorize Computer.
3 If you are connecting through a NAT router, make sure that TCP port 3689 and UDP port 5353 are open for traffic on both the server and the client and all points in between (especially the NAT router). If your router includes a firewall, make sure it also allows TCP port 3689 and UDP port 5353 traffic.

17.13 Download Service and Broadcasting Functions

The download list or broadcatching items are missing after I removed a hard drive.

The NSA's download and broadcasting lists are stored on the system volume. If you have two JBOD volumes, it is possible to remove one and still use the other. However if you remove the system volume, you may lose the download and broadcasting lists. With two JBOD volumes, the hard disk that was installed first is usually the system volume.

The channel I added in the Broadcasting screen is active but no files are downloaded to the NSA.

Check the Download Policy for that channel (see Section 9.8.1 on page 196). It may be set to manual download. You can configure your NSA to download all items or only new items automatically once the channel is updated.

I cannot find the download files.

By default, the Download Service and Broadcasting features store downloaded files as follows:

  • BitTorrent jobs are stored in /*/incoming (where '*' is a folder that you have set.)
  • HTTP/FTP jobs are stored in /* (where '*' is a folder that you have set.)
  • All jobs triggered by RSS channels create the subfolder in /* using the channel name where it store all files downloaded from that channel (where ‘*’ is a folder that you have set.)

Check your Preferences in the Download Service (Section 9.6 on page 179) and Broadcatching (Section 9.8 on page 194) screens to know or configure where downloaded files are stored.

17.14 Web Publishing

A web-published share cannot be accessed by web browser from the Internet.

  • Make sure the person trying to access the share is using the correct web address (and port number if the NSA's web publishing feature is not using port 80). See page 213 for details.
  • Make sure the publishing feature is turned on and the share is in the list of published shares.
  • Make sure the person trying to access the share is using Internet Explorer 6.0 (and later) or Firefox 1.07 (and later).
  • You need to use a public address to access the NSA's web-published shares from the Internet. If your NSA uses a private IP address, use the public IP address of your Internet gateway (firewall) and configure NAT or port forwarding on your Internet gateway and possibly firewall rules in order to let people access the NSA's web-published shares from the Internet.
  • Make sure the firewall's public IP address is static or that the firewall uses a Dynamic Domain Name (DDNS).
  • Web publishing uses TCP protocol and the port number you specify. Make sure there is not another service using TCP protocol with the same port number. See Appendix C on page 395 for a list of common services and their associated protocols and port numbers.
  • If Firefox access to the share does not work, check that you did not set the Web publishing feature to use one of the following ports. (Firefox blocks these ports by default.)

Table 115 Ports Blocked By Default in Firefox

PORTSERVICE
1tcpmux
7echo
9discard
PORTSERVICE
95supdup
101hostriame
102iso-tsap
PORTSERVICE
513login
514shell
515printer

Table 115 Ports Blocked By Default in Firefox

PORTSERVICE
11systat
13daytime
15netstat
17qotd
19chargen
20ftp data
21ftp control
22ssh
23telnet
25smtp
37time
42name
43nicname
53domain
77priv-rjs
79finger
87ttylink
PORTSERVICE
103gppitnp
104acr-nema
109POP2
110POP3
111sunrpc
113auth
115sftp
117uucp-path
119NNTP
123NTP
135loc-srvepmap
139netbios
143IMAP2
179BGP
389LDAP
465SMTP+SSL
512print exec
PORTSERVICE
526tempo
530courier
531chat
532netnews
540uucp
556remotefs
563NNTP+SSL
587submission
601syslog
636LDAP+SSL
993IMAP+SSL
995POP3+SSL
2049nfs
4045lockd
6000X11
  • Make sure your ISP allows you to run a server and is not blocking the port number of the NSA's web publishing feature.

17.15 Auto Upload

The NSA does not automatically upload files to Flickr or YouTube.

1 Make sure the NSA is connected to the Internet. See Section 8.4 on page 163 for details about testing network connections.
2 Click Maintenance > Log to check the NSA's log for a message about the file.

2a If the log message displays "no such file or directory", the file may have been removed from the NSA. Make sure the file still exists in the watch folder.
2b If the log message displays "filename is queued", the file may still be waiting for auto upload. Check the grace period setting in the service's Configuration screen. You can set a smaller grace period to shorten the queue time.
2c If you cannot find any log messages about the file:

  • Make sure the Folder Watch List includes the folder containing the file. You can upload the file to the watch folder again.
  • Make sure the file's format is supported by Flickr or YouTube. You can find the supported file extensions in the Folder Watch List.

2d If the log message displays "not authorized yet", check if you can enter the NSA's Configuration screen for the service. If you changed the password of your Flickr or YouTube account, you cannot access the service's Configuration screen, and the NSA cannot auto upload files. Make sure you also update the account information in the NSA.

3 Make sure the file size does not exceed the limit imposed by the service. At the time of writing, Flickr restricts the file size to 10 MB, and YouTube restricts the file size to 100 MB.
4 Make sure you did not exceed the service's upload quota. Flickr and YouTube have different policies about how much you can upload within a certain period, for example, 100 MB/week.
5 The NSA may have temporarily failed to connect to the service. You can upload the file to the watch folder again.

17.16 Package Management

The NSA won't install the package(s) I selected in the Package Management screen.

  • The web location of the package may be undergoing maintenance. Try again at a later time. Upgrade the firmware of the NSA.
  • If a new firmware is available, do an upgrade and try installing the package(s) again.

The eMule Search screen does not work.

You need to be connected to an eMule server before you can use the Search screen. Wait for the NSA to connect to a server before configuring the Search screen.

I want to know how my hard disk is performing.

Use S.M.A.R.T. (Self Monitoring, Analysis, and Reporting Technology) to monitor hard disks. It detects and reports the reliability of hard disks using standard indicators, enabling administrators to anticipate possible disk failures. Go to the Package Management screen to install the S.M.A.R.T. application.

17.17 Backups

I cannot make a backup.

  • Check that enough space is available on the external disk. If there isn't you may need to purge older backups or delete other files on the backup USB disk or NSA (see Section 10.9 on page 249).
  • If you are using BackupPlanner (Section 10.10 on page 249):
  • You can look at the Backup screen's Last Run Result display.
  • If you're backing up to another NSA, another NSA, or a computer, check that it allows the NSA to write files to it. For a synchronization backup, the target must be another NSA or another compatible model.
  • Check that the NSA is not performing another backup job. Scheduler queues backups when a different backup is already going on at the time a backup is scheduled.

The backup does not run at the time configured.

  • Check that the correct time is configured on the NSA.
  • Check that the NSA is able to access the time server from which it gets the time; see Section 6.5 on page 143.

Product Specifications

See also Chapter 1 on page 21 for a general overview of the key features.

18.1 Physical Features

These are the main external physical features.

Table 116 Physical Features

USB Ports3 USB (version 2) ports.Copy or sync files directly from the NSA to compatible USB devices like card readers, MP3 players, mass storage devices, and digital cameras without using a computer. Copy or sync files directly from a USB device to the NSA.Expand the NSA's storage capacity with compatible USB devices (like hard drives).
Gigabit Ethernet PortThe 10/100/1000 Mbps auto-negotiating Ethernet port allows the NSA to detect the speed of incoming transmissions and adjust appropriately without manual intervention. It allows data transfer of either 100 Mbps or 1000 Mbps in either half-duplex or full-duplex mode depending on your Ethernet network. Use an 8-wire Ethernet cable for Gigabit connections. The port is also auto-crossover (MDI/MDI-X) meaning it automatically adjusts to either a crossover or straight-through Ethernet cable.Actual data throughput varies depending on the network conditions and environmental factors, including volume of network traffic, network overhead and building materials.
SATA InterfaceSerial ATA is a low cost interface technology that allows high speed data transfer. Serial ATA also allows more efficient internal airflow and smaller chassis design.
Power ButtonPress the Power button for one second to turn it on.Turn off the NSA before unplugging it.Press the Power button for 3 seconds until you hear one beep, then release it. The NSA goes starts to shutdown its software and turns off.Press the Power button for 5 seconds until you hear two beeps, then release it. The NSA turns off immediately.
COPY/SYNC ButtonThe COPY/SYNC button is used to copy or sync data from the NSA to a compatible external (USB) storage device or from the external (USB) storage device to the NSA.Press the COPY/SYNC button to copy data from Public folder (default) of the NSA. Use the Web Configurator to configure the folder locations for the COPY/SYNC function.During the data transfer, the COPY LED blinks and stops when the transfer is complete.If you want to sync the data in the NSA with the external (USB) storage device, press the COPY/SYNC button until you hear one beep.If the COPY LED turns red, an error has occurred and the transfer is stopped. Press the COPY/SYNC button once and the COPY LED turns green.
RESET ButtonPress the RESET button for 2 seconds to restart the NSA.If you forget your (admin) password, press the RESET button for 10 seconds to restore the factory default password to “1234” (with username “admin”), and auto-IP address (DHCP client).

18.2 Firmware Features

These are some of the main firmware features of the NSA.

Table 117 Firmware Features

DLNA ServerThe NSA is a DLNA-compliant media server that lets DLNA-compliant media clients play video, audio, and photo content files stored on the NSA.
RAID File StorageUse RAID 1 if you have two drives and want to mirror primary data to the second drive. If one drive fails, replace it and then re-synchronize to recover all data.
User PasswordsConfigure a password for an individual User to restrict access to the NSA.
Client SupportData can be shared among all Windows, Mac, Linux, and UNIX users that have FTP client software or CIFS file sharing support (such as Samba for Linux and UNIX users).The NSA is also a DLNA-certified media server that lets DLNA-compliant media clients play video, audio, and photo content files stored on the NSA.
HTTP and HTTPSAccess the NSA using a regular web connection (HTTP) or secure web connection (HTTPS).
DHCP (Dynamic Host Configuration Protocol)DHCP (Dynamic Host Configuration Protocol) allows the NSA to obtain an IP address and subnet mask at start-up from a centralized DHCP server. Alternatively, you can give the NSA a static IP address and subnet mask.
Full Network ManagementThe embedded web configurator is an platform-independent web-based utility that allows you to easily access the NSA's management settings.
Hard Disk Drive Power SavingIf a hard disk inside the NSA is idle for six minutes, the NSA puts it to sleep until you use it again.
Firmware Upload and Configuration File ManagementUpload new firmware to the NSA using the web configurator. You can also back up and restore the NSA configuration file containing all its settings to/from your computer.
NAS Starter UtilityUse the NAS Starter Utility from a Windows computer to find NSA(s) in your network, access the NSA login page, change its IP address configuration or map to a Windows network drive.
Memeo AutobackupMemeo Autobackup is a tool for Windows users to create backups of data stored on their Windows computers to an NSA. This software is included on the CD.
Time and DateConfigure a time server and set a time zone for your NSA to show the correct times in logs.
Auto UploadThe auto upload feature uploads media files stored in the NSA to the Flickr and/or YouTube sharing websites. It is a convenient way to share media files with your friends and family. You can link the NSA to your Flickr and/or YouTube account and select shares for the NSA to upload. The NSA uploads the media files stored in the specified shares to your Flickr and/or YouTube account. When you add new files to the specified shares, the NSA also automatically uploads the new files to your Flickr and/or YouTube account.
iTunes ServerThe NSA can mimic the iTunes application and download content from the iTunes server.
Package ManagementPackage Management can be used to set up more useful applications in your NSA, including eMule, DyDNS, NFS, SMART, BackupPlanner, Gallery, PHP-MySQL-phpMyAdmin, SqueezeCenter and WordPress. The NSA can download multiple packages/files at once and automatically goes through all the installation steps.
DyDNSDynamic DNS allows you to update your current dynamic IP address with a dynamic DNS service so that anyone can contact you (in NetMeeting, CUSeeMe, etc.). You can also access your FTP server or Web site on your own computer using a domain name (for instance myhost.dhs.org, where myhost is a name of your choice) that will never change instead of using an IP address that changes each time you reconnect. Your friends or relatives will always be able to call you even if they don't know your IP address.
Download ServiceThe NSA's download service downloads files from the Internet directly to the NSA. You do not have to download to your computer and then copy to the NSA. This can free up your computer's system resources. The download service also handles your broadcatching downloads.
Power ScheduleUse this screen to manage power settings for the NSA, including power saving, UPS, power on/off during power failure and power on/off schedule.

18.3 Specification Tables

The NSA hardware specifications are shown in the following table.

A. Use an 8-wire Ethernet cable for Gigabit connections.
Table 118 NSA Hardware Specifications

Default IP AddressDHCP client. If no DHCP server is found, the NSA uses Auto-IP to choose an IP address in the 169.254.X.X subnet (where X is a number from 1 to 254).
Default Subnet MaskDHCP client by default. If no DHCP server is found, the subnet mask defaults to 255.255.255.0 (24 bits).
Default Usernameadmin
Default Password1234
Dimensions108 (W) x 205 (D) x147 (H) mm(4.3 (W) x 5.8 (D) x 8.1 (H) inch)
Weight1.06 kg (2.34 lb.) without hard drives
Drive BaysTwo
Compatible Hard DisksSATA I and SATA II 3.0 Gbit/s (Serial Advanced Technology Attachment) compatible hard drives.
Maximum Number of Folders Per ShareThe NSA's media server function can detect up to 8,000 folders within a single published share.After 8,000 folders have been created, new folder contents will not be added to the media server's list. However you can still access the folders using Samba.
Ports
EthernetOne auto-negotiating, auto MDI/MDI-X 10/100/1000AMbps RJ-45 Ethernet port (1000BASE-T)
USB v2.0 StorageTwo ports in the back panel and one port in the front panel.Windows: FAT32 and FAT16Linux: ReiserFS, XFS, EXT2, and EXT3.
LEDsPWR, SYSTEM, HDD1, HDD2, USB and COPY.
Operating Temperature0°C ~ 40°C
Power SupplyInput: 100 - 240 V ACOutput: 19 V DC, 2.1 A
Storage Temperature-30°C ~ 70°C
Operating Humidity0% ~ 95% RH (non-condensing)
Storage Humidity0% ~ 95% RH (non-condensing)
CertificationsDevice: CE, FCC Part 15B, C-Tick, BSMIPower Adapter: CE, FCC, CUL, TUV/GS, RCM, BSMI, Efficiency Level V (CEC regulation)

The NSA firmware specifications are shown in the following table

A. Limits may vary depending on user-share resource usage.
Table 119 NSA Firmware Specifications

File Storage SystemJBOD, RAID 0, RAID 1
Network ProtocolsTCP/IP, UDP/IPDHCP ClientFTP, FTPES (TLS explicit mode)HTTP, HTTPS
File ManagementCreate/Delete System Volume
Network File Sharing ProtocolCIFS/SMB for WindowsHTTP for web browserFTP, FTPES (TLS explicit mode)
Network SecurityAuthenticationShare level
NAS Starter Utility Supported ClientsWindows XP (SP2, SP3)Windows Vista (32 bit)Windows 7 (32 and 64 bit)
Maximum Number of Users Allowed 64^A
Maximum Number of Concurrent FTP Sessions 32^A
Maximum Number of Concurrent CIFS Sessions 32^A
System ManagementRemote Management via Web Configurator (HTTP and HTTPS)NAS Starter Utility
Logging/MonitoringCentralized Logs
Firmware UpgradeWeb Configurator
Web Browsers SupportedInternet Explorer 6.0 and later versionsFirefox 2.00 and later versions

The following list, which is not exhaustive, illustrates the standards and recommendations supported in the NSA.

Table 120 Supported Standards and Recommendations

CSS level 1Cascading Style Sheets.
CSS level 2 revision 1 ("CSS 2.1")Cascading Style Sheets.
DATETIME"Date and Time Formats", W3C (World Wide Web Consortium) Note, M. Wolf and C. Wicksteed, 15 September 1997. Revised 27 August 1998. See http://www.w3.org/TR/1998/NOTE-datetime-19980827
DLNA v1.5 ServerThe DLNA (Digital Living Network Alliance) group of companies works to make products compatible and able to work in a home network in order to make digital living easy and seamless. DLNA clients play files stored on DLNA servers.
ECMA-262The original ECMAScript standard, also known as JavaScript.
ECMA-262 Edition 2The ECMAScript standard's second revision; also ISO standard 16262.
ECMA-262 Edition 3The ECMAScript standard's third revision; corresponds to JavaScript 1.5.
ECMA-357ECMAScript for XML (E4X). See also the E4X errata.
HTML 3.2 Reference SpecificationThe HyperText Markup Language (HTML).
HTML 4.01 SpecificationDefines the HyperText Markup Language (HTML), the publishing language of the World Wide Web.
ISO 3166-1Country names (official short names in English) in alphabetical order as given in ISO 3166-1 and the corresponding ISO 3166-1-alpha-2 code elements.
ISO 639-2Two-letter and three-letter language code sets.
MIMETYPESIANA registered content types (MIME types). See the IANA web site (ftp://ftp.isi.edu/in-notes/iana/assignments/media-types/).
ISO 15740Picture Transfer Protocol (PTP) from the International imaging Industry Association allows you to transfer pictures from digital cameras or other devices without needing additional device drivers.
RFC 1001(STD-19) - Protocol standard for NetBIOS service on a TCP/UDP transport: Concepts and methods
RFC 1002(STD-19) - Protocol standard for NetBIOS service on a TCP/UDP transport: Detailed specifications
RFC 1034(STD-13) - Domain names - concepts and facilities
RFC 1035(STD-13) - Domain names - implementation and specification
RFC 1305Network Time Protocol (NTP version 3)
RFC 1415FTP-FTAM Gateway Specification
RFC 1510The Kerberos Network Authentication Service (V5)
RFC 1738Uniform Resource Locators (URL)
RFC 1808Relative Uniform Resource Locators
RFC 1945The Hypertext Transfer Protocol (HTTP) 1.0.
RFC 2131Dynamic Host Configuration Protocol
RFC 2396Uniform Resource Identifier (URI)
RFC 2396Uniform Resource Identifiers (URI): Generic Syntax
RFC 2616Hypertext Transfer Protocol (HTTP) 1.1.
RFC 2854History of HTML development, and lists the relevant W3C (World Wide Web Consortium) recommendations for the "text/html" MIME type.
RFC 3066, BCP 47 (Best Current Practice)Language tags
RFC 3282"Content-language:" headers.
RFC 3986(STD-66) - Uniform Resource Identifier (URI): Generic Syntax
RFC 4120The Kerberos Network Authentication Service (V5)
RFC 4248The telnet URI Scheme
RFC 793(STD-7) - Transmission Control Protocol
RFC 959(STD-9) - File Transfer Protocol
SATASATA I and SATA II 3.0 Gbit/s (Serial Advanced Technology Attachment) compatible hard drives.
UPnPUniversal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices.
USB 2.0USB (Universal Serial Bus) version 2.0 allows for interfacing devices with data transfers rates of up to 480 Mbps.
XHTML 1.0Extensible HyperText Markup Language (Second Edition)
XHTML 1.1Module-based XHTML

18.4 Supported Media Server Content Formats

The following describes the details about the files that the NSA media server can publish.

Table 121 Supported Media Server Content Formats
Note: Not all published file types can be viewed by all client applications.

CATEGORYFILE TYPEEXTENSION
VideoMPEG-1/MPEG-2dat, dvr-ms, iso, m1v, m2p, m2t, m2v, mp2, mpe, mpeg, mpeg2, mpg, mpg2, ts, vob, m2ts, tts
MPEG-4m4v, mp4
AVIavi
DivXdivx, avi
Motion JPEGmjpeg, mjpg
Quick Time Videomov, qt
RealMediarmvb, rm
Oggogm
Matroskamkv
ASFasf
Windows Media Videoasf, wmv
ISOiso
Subtitlesrt, ssa, idx, sub
MusicMP3mp3, mpa
Ogg Vorbisogg
RealMediara, ram
WAVEwav
Windows Media Audiowma
Matroskamka
Monkeys Audioape
MP1mp1
MP4mp4, m4a, m4p
PCMpcm
LPCMlpcm
DTSdts
AC3ac3
Free Lossless Audio Codecflac
Auau
AACaac
3GPP3gp, 3g2
AIFFaif, aiff
RIFF-based MIDIrmi
Playlistwpl, pls, asx, wax, m3u
PhotoBitmapbmp
JPEGjpe, jpeg, jpg
PNGpng

18.5 Supported iTunes Server Content Formats

At the time of writing, the NSA supports iTunes publishing audio files of the following formats: mp3, m4a, m4p, wav, and mp4.

18.6 Power Consumption

The NSA's power consumption was tested using two 7,200 RPM 1.5 TB hard drives and 3 USB storage devices.

Note: These are results from a laboratory test and are for your reference only.

Table 122 Power Consumption in Watts (W)

POWER MODEPOWER CONSUMPTION
Access Mode32.75 Watts
Hard Disk Hibernation Mode19 Watts

Setting up Your Computer's IP Address

All computers must have a 10M or 100M Ethernet adapter card and TCP/IP installed.

Windows 95/98/Me/NT/2000/XP, Macintosh OS 7 and later operating systems and all versions of UNIX/LINUX include the software components you need to install and use TCP/IP on your computer. Windows 3.1 requires the purchase of a third-party TCP/IP application package.

TCP/IP should already be installed on computers using Windows NT/2000/XP, Macintosh OS 7 and later operating systems.

After the appropriate TCP/IP components are installed, configure the TCP/IP settings in order to "communicate" with your network.

Windows 95/98/Me

Click Start, Settings, Control Panel and double-click the Network icon to open the Network window.

Figure 196 Windows 95/98/Me: Network: Configuration
ZYXEL NSA221 - Windows 95/98/Me - 1

text_image Network Configuration | Identification | Access Control | The following network components are installed: LPR for TCP/IP Printing 3Com EtherLink 10/100 PCI TX NIC (3C905B-TX) Dial-Up Adapter USB Fast Ethernet Adapter TCP/IP -> 3Com EtherLink 10/100 PCI TX NIC (3C905B-T Add... Remove Properties Primary Network Logon: Client for Microsoft Networks File and Print Sharing... Description TCP/IP is the protocol you use to connect to the Internet and wide-area networks. OK Cancel

Installing Components

The Network window Configuration tab displays a list of installed components. You need a network adapter, the TCP/IP protocol and Client for Microsoft Networks.

If you need the adapter:

1 In the Network window, click Add.
2 Select Adapter and then click Add.
3 Select the manufacturer and model of your network adapter and then click OK.
If you need TCP/IP:

1 In the Network window, click Add.
2 Select Protocol and then click Add.

3 Select Microsoft from the list of manufacturers.
4 Select TCP/IP from the list of network protocols and then click OK.

If you need Client for Microsoft Networks:

1 Click Add.
2 Select Client and then click Add.
3 Select Microsoft from the list of manufacturers.
4 Select Client for Microsoft Networks from the list of network clients and then click OK.
5 Restart your computer so the changes you made take effect.

Configuring

1 In the Network window Configuration tab, select your network adapter's TCP/IP entry and click Properties
2 Click the IP Address tab.

  • If your IP address is dynamic, select Obtain an IP address automatically.
  • If you have a static IP address, select Specify an IP address and type your information into the IP Address and Subnet Mask fields.

Figure 197 Windows 95/98/Me: TCP/IP Properties: IP Address
ZYXEL NSA221 - Configuring - 1

text_image TCP/IP Properties Bindings Advanced NetsBIOS DNS Configuration Gateway WINS Configuration IP Address An IP address can be automatically assigned to this computer. If your network does not automatically assign IP addresses, ask your network administrator for an address, and then type it in the space below. Obtain an IP address automatically Specify an IP address: IP Address: .... Subnet Mask: .... Detect connection to network media OK Cancel

3 Click the DNS Configuration tab.

  • If you do not know your DNS information, select Disable DNS.
  • If you know your DNS information, select Enable DNS and type the information in the fields below (you may not need to fill them all in).

Figure 198 Windows 95/98/Me: TCP/IP Properties: DNS Configuration
ZYXEL NSA221 - Click the DNS Configuration tab. - 1

text_image TCP/IP Properties Bindings Advanced NetsBIOS DNS Configuration Gateway WINS Configuration IP Address Disable DNS Enable DNS Host: Domain: DNS Server Search Order Add Remove Domain Suffix Search Order Add Remove OK Cancel

4 Click the Gateway tab.

  • If you do not know your gateway's IP address, remove previously installed gateways.
  • If you have a gateway IP address, type it in the New gateway field and click Add.

5 Click OK to save and close the TCP/IP Properties window.

6 Click OK to close the Network window. Insert the Windows CD if prompted.
7 Restart your computer when prompted.

Verifying Settings

1 Click Start and then Run.
2 In the Run window, type "winipcfg" and then click OK to open the IP Configuration window.
3 Select your network adapter. You should see your computer's IP address, subnet mask and default gateway.

Windows 2000/NT/XP

The following example figures use the default Windows XP GUI theme.

1 Click start (Start in Windows 2000/NT), Settings, Control Panel.

Figure 199 Windows XP: Start Menu
ZYXEL NSA221 - Windows 2000/NT/XP - 1

text_image user Internet Explorer Outlook Express Paint Files and Settings Transfer W... Command Prompt Acrobat Reader 4.0 Tour Windows XP Windows Movie Maker All Programs My Documents My Recent Documents My Pictures My Music My Computer Control Panel Printers and Faxes ? Help and Support Search Run... Log Off Turn Off Computer start untitled - Paint

2 In the Control Panel, double-click Network Connections (Network and Dial-up Connections in Windows 2000/NT).

Figure 200 Windows XP: Control Panel
ZYXEL NSA221 - Windows 2000/NT/XP - 2

text_image Control Panel File Edit View Favorites Tools Help Back Search Folders Address Control Panel Control Panel Switch to Category View Network Connections Add Hardware See Also Windows Update Fonts Game Controllers

3 Right-click Local Area Connection and then click Properties.

Figure 201 Windows XP: Control Panel: Network Connections: Properties
ZYXEL NSA221 - Windows 2000/NT/XP - 3

text_image Network Connections File Edit View Favorites Tools Advanced Help Back Search Folders Address Network Connections LAN or High-Speed Internet Network Tasks Create a new connection Set up a home or small office network Disable this network device Repair this connection Rename this connection View status of this connection Change settings of this connection Local Area Connection Enabled Standard PCI Fast Ethernet Adapter Disable Status Repair Bridge Connections Create Shortcut Delete Rename Properties

4 Select Internet Protocol (TCP/IP) (under the General tab in Win XP) and then click Properties.

Figure 202 Windows XP: Local Area Connection Properties
ZYXEL NSA221 - Windows 2000/NT/XP - 4

text_image Local Area Connection Properties General Authentication Advanced Connect using: Accton EN1207D-TX PCI Fast Ethernet Adapter Configure... This connection uses the following items: Client for Microsoft Networks File and Printer Sharing for Microsoft Networks QoS Packet Scheduler Internet Protocol (TCP/IP) Install... Uninstall Properties Description Transmission Control Protocol/Internet Protocol. The default wide area network protocol that provides communication across diverse interconnected networks. Show icon in notification area when connected OK Cancel

5 The Internet Protocol TCP/IP Properties window opens (the General tab in Windows XP).

  • If you have a dynamic IP address click Obtain an IP address automatically.
  • If you have a static IP address click Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields.
  • Click Advanced.

Figure 203 Windows XP: Internet Protocol (TCP/IP) Properties
ZYXEL NSA221 - Windows 2000/NT/XP - 5

text_image Internet Protocol (TCP/IP) Properties General Alternate Configuration You can get IP settings assigned automatically if your network supports this capability. Otherwise, you need to ask your network administrator for the appropriate IP settings. Obtain an IP address automatically Use the following IP address: IP address: . Subnet mask: . Default gateway: . Obtain DNS server address automatically Use the following DNS server addresses: Preferred DNS server: . Alternate DNS server: . Advanced... OK Cancel

6 If you do not know your gateway's IP address, remove any previously installed gateways in the IP Settings tab and click OK.

Do one or more of the following if you want to configure additional IP addresses:

  • In the IP Settings tab, in IP addresses, click Add.
  • In TCP/IP Address, type an IP address in IP address and a subnet mask in Subnet mask, and then click Add.
  • Repeat the above two steps for each IP address you want to add.
  • Configure additional default gateways in the IP Settings tab by clicking Add in Default gateways.
  • In TCP/IP Gateway Address, type the IP address of the default gateway in Gateway. To manually configure a default metric (the number of transmission hops), clear the Automatic metric check box and type a metric in Metric.
  • Click Add.
  • Repeat the previous three steps for each default gateway you want to add.

- Click OK when finished.

Figure 204 Windows XP: Advanced TCP/IP Properties
ZYXEL NSA221 - Windows 2000/NT/XP - 6

text_image Advanced TCP/IP Settings IP Settings DNS WINS Options IP addresses IP address Subnet mask DHCP Enabled Add... Edit... Remove Default gateways: Gateway Metric Add... Edit... Remove Automatic metric Interface metric: OK Cancel

7 In the Internet Protocol TCP/IP Properties window (the General tab in Windows XP):

  • Click Obtain DNS server address automatically if you do not know your DNS server IP address(es).
  • If you know your DNS server IP address(es), click Use the following DNS server addresses, and type them in the Preferred DNS server and Alternate DNS server fields.

If you have previously configured DNS servers, click Advanced and then the DNS tab to order them.

Figure 205 Windows XP: Internet Protocol (TCP/IP) Properties
ZYXEL NSA221 - Windows 2000/NT/XP - 7

text_image Internet Protocol (TCP/IP) Properties General Alternate Configuration You can get IP settings assigned automatically if your network supports this capability. Otherwise, you need to ask your network administrator for the appropriate IP settings. Obtain an IP address automatically Use the following IP address: IP address: ... Subnet mask: ... Default gateway: ... Obtain DNS server address automatically Use the following DNS server addresses: Preferred DNS server: ... Alternate DNS server: Advanced... OK Cancel

8 Click OK to close the Internet Protocol (TCP/IP) Properties window.
9 Click Close (OK in Windows 2000/NT) to close the Local Area Connection Properties window.
10 Close the Network Connections window (Network and Dial-up Connections in Windows 2000/NT).
11 Restart your computer (if prompted).

Verifying Settings

1 Click Start, All Programs, Accessories and then Command Prompt.
2 In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also open Network Connections, right-click a network connection, click Status and then click the Support tab.

Macintosh OS X

1 Click the Apple menu, and click System Preferences to open the System Preferences window.

Figure 206 Macintosh OS X: Apple Menu
ZYXEL NSA221 - Macintosh OS X - 1

text_image Grab File Edit Captu About This Mac Get Mac OS X Software... System Preferences... Dock Location

2 Click Network in the icon bar.

  • Select Automatic from the Location list.
  • Select Built-in Ethernet from the Show list.
  • Click the TCP/IP tab.

3 For dynamically assigned settings, select Using DHCP from the Configure list.

Figure 207 Macintosh OS X: Network
ZYXEL NSA221 - Macintosh OS X - 2

text_image Network Show All Displays Network Startup Disk Location: Automatic Show: Built-in Ethernet TCP/IP PPPoE AppleTalk Proxies Configure: Using DHCP IP Address: 192.168.11.12 (Provided by DHCP Server) Subnet Mask: 255.255.254.0 Router: 192.168.10.11 DHCP Client ID: (Optional) Ethernet Address: 00:05:02:43:93:ff Domain Name Servers (Optional) 168.95.1.1 Search Domains (Optional) Example: apple.com, earthlink.net Click the lock to prevent further changes. Apply Now

4 For statically assigned settings, do the following:

  • From the Configure box, select Manually.
  • Type your IP address in the IP Address box.
  • Type your subnet mask in the Subnet mask box.
  • Type the IP address of your gateway in the Router address box.

5 Click Apply Now and close the window.

6 Restart your computer (if prompted).

Verifying Settings

Check your TCP/IP properties in the Network window.

Linux

This section shows you how to configure your computer's TCP/IP settings in Red Hat Linux 9.0. Procedure, screens and file location may vary depending on your Linux distribution and release version.

Note: Make sure you are logged in as the root administrator.

Using the K Desktop Environment (KDE)

Follow the steps below to configure your computer IP address using the KDE.

1 Click the Red Hat button (located on the bottom left corner), select System Setting and click Network.

Figure 208 Red Hat 9.0: KDE: Network Configuration: Devices
ZYXEL NSA221 - Using the K Desktop Environment (KDE) - 1

text_image Network Configuration File Profile Help New Edit Copy Delete Activate Deactivate Devices Hardware DNS Hosts You may configure network devices associated with physical hardware here. Multiple logical devices can be associated with a single piece of hardware. Profile Status Device Nickname Way Type ✓ Inactive eth0 eth0 Ethernet Edit Device...

2 Double-click on the profile of the network card you wish to configure. The Ethernet Device General screen displays as shown.

Figure 209 Red Hat 9.0: KDE: Ethernet Device: General
ZYXEL NSA221 - Using the K Desktop Environment (KDE) - 2

text_image Ethernet Device General Route Hardware Device Nickname: eth0 ✓ Activate device when computer starts ☐ Allow all users to enable and disable the device ● Automatically obtain IP address settings with: dhcp DHCP Settings Hostname (optional): ✓ Automatically obtain DNS information from provider ○ Statically set IP addresses: Manual IP Address Settings Address: Subnet Mask: Default Gateway Address: OK Cancel
  • If you have a dynamic IP address, click Automatically obtain IP address settings with and select dhcp from the drop down list.
  • If you have a static IP address, click Statically set IP Addresses and fill in the Address, Subnet mask, and Default Gateway Address fields.

3 Click OK to save the changes and close the Ethernet Device General screen.
4 If you know your DNS server IP address(es), click the DNS tab in the Network Configuration screen. Enter the DNS server information in the fields provided.

Figure 210 Red Hat 9.0: KDE: Network Configuration: DNS
ZYXEL NSA221 - Using the K Desktop Environment (KDE) - 3

text_image Network Configuration File Profile Help New Edit Copy Delete Devices Hardware DNS Hosts You may configure the system's hostname, domain, name servers, and search domain. Name servers are used to look up other hosts on the network. Hostname: Primary DNS: Secondary DNS: Tertiary DNS: DNS Search Path: Active Profile: Common (modified)

5 Click the Devices tab.
6 Click the Activate button to apply the changes. The following screen displays. Click Yes to save the changes in all screens.

Figure 211 Red Hat 9.0: KDE: Network Configuration: Activate
ZYXEL NSA221 - Using the K Desktop Environment (KDE) - 4

text_image redhat-config-network: You have made some changes in your configuration. To activate the network device eth0, the changes have to be saved. Do you want to continue?

7 After the network card restart process is complete, make sure the Status is Active in the Network Configuration screen.

Using Configuration Files

Follow the steps below to edit the network configuration files and set your computer IP address.

1 Assuming that you have only one network card on the computer, locate the ifconfig-eth0 configuration file (where eth0 is the name of the Ethernet card). Open the configuration file with any plain text editor.

- If you have a dynamic IP address, enter dhcp in the BOOTPROTO= field. The following figure shows an example.

Figure 212 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0

DEVICE=eth0
ONBOOT=yes
BOOTPROTO=dhcp
USERCTL=no
PEERDNS=yes
TYPE=Ethernet 

- If you have a static IP address, enter static in the BOOTPROTO= field. Type IPADDR= followed by the IP address (in dotted decimal notation) and type NETMASK= followed by the subnet mask. The following example shows an example where the static IP address is 192.168.1.10 and the subnet mask is 255.255.255.0.

Figure 213 Red Hat 9.0: Static IP Address Setting in ifconfig-eth0

DEVICE=eth0
ONBOOT=yes
BOOTPROTO=static
IPADDR=192.168.1.10
NETMASK=255.255.255.0
USERCTL=no
PEERDNS=yes
TYPE=Ethernet 

2 If you know your DNS server IP address(es), enter the DNS server information in the resolv.conf file in the /etc directory. The following figure shows an example where two DNS server IP addresses are specified.

Figure 214 Red Hat 9.0: DNS Settings in resolv.conf

nameserver 172.23.5.1
nameserver 172.23.5.2 

3 After you edit and save the configuration files, you must restart the network card. Enter./network restart in the /etc/rc.d/init.d directory. The following figure shows an example.

Figure 215 Red Hat 9.0: Restart Ethernet Card

[root@localhost init.d]# network restart
Shutting down interface eth0: [OK]
Shutting down loopback interface: [OK]
Setting network parameters: [OK]
Bringing up loopback interface: [OK]
Bringing up interface eth0: [OK] 

Verifying Settings

Enter ifconfig in a terminal screen to check your TCP/IP properties.

Figure 216 Red Hat 9.0: Checking TCP/IP Properties

[root@localhost]# ifconfig
eth0 Link encap:Ethernet HWaddr 00:50:BA:72:5B:44
inet addr:172.23.19.129 Bcast:172.23.19.255 Mask:255.255.255.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:717 errors:0 dropped:0 overruns:0 frame:0
TX packets:13 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:100
RX bytes:730412 (713.2 Kb) TX bytes:1570 (1.5 Kb)
Interrupt:10 Base address:0x1000
[root@localhost]# 

Pop-up Windows, JavaScripts and Java Permissions

In order to use the web configurator you need to allow:

  • Web browser pop-up windows from your device.
  • JavaScripts (enabled by default).
  • Java permissions (enabled by default).

Note: Internet Explorer 6 screens are used here. Screens for other Internet Explorer versions may vary.

Internet Explorer Pop-up Blockers

You may have to disable pop-up blocking to log into your device.

Either disable pop-up blocking (enabled by default in Windows XP SP (Service Pack) 2) or allow pop-up blocking and create an exception for your device's IP address.

Disable Pop-up Blockers

1 In Internet Explorer, select Tools, Pop-up Blocker and then select Turn Off Pop-up Blocker.

Figure 217 Pop-up Blocker
ZYXEL NSA221 - Disable Pop-up Blockers - 1

text_image Tools Mail and News Pop-up Blocker Manage Add-ons... Synchronize... Windows Update Windows Messenger Internet Options... Turn Off Pop-up Blocker Pop-up Blocker Settings...

You can also check if pop-up blocking is disabled in the Pop-up Blocker section in the Privacy tab.

1 In Internet Explorer, select Tools, Internet Options, Privacy.
2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled.

Figure 218 Internet Options: Privacy
ZYXEL NSA221 - Disable Pop-up Blockers - 2

text_image Internet Options General Security Privacy Content Connections Programs Advanced Settings Move the slider to select a privacy setting for the Internet zone. Medium - Blocks third-party cookies that do not have a compact privacy policy - Blocks third-party cookies that use personally identifiable information without your implicit consent - Restricts first-party cookies that use personally identifiable information without implicit consent Sites... Import... Advanced... Default Pop-up Blocker Prevent most pop-up windows from appearing. Block pop-ups Settings... OK Cancel Apply

3 Click Apply to save this setting.

Enable Pop-up Blockers with Exceptions

Alternatively, if you only want to allow pop-up windows from your device, see the following steps.

1 In Internet Explorer, select Tools, Internet Options and then the Privacy tab.

2 Select Settings...to open the Pop-up Blocker Settings screen.

Figure 219 Internet Options: Privacy
ZYXEL NSA221 - Enable Pop-up Blockers with Exceptions - 1

text_image Internet Options General Security Privacy Content Connections Programs Advanced Settings Move the slider to select a privacy setting for the Internet zone. Medium - Blocks third-party cookies that do not have a compact privacy policy - Blocks third-party cookies that use personally identifiable information without your implicit consent - Restricts first-party cookies that use personally identifiable information without implicit consent Sites... Import... Advanced... Default Pop-up Blocker Prevent most pop-up windows from appearing. ✓ Block pop-ups Settings... OK Cancel Apply

3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix "http://". For example, http://192.168.167.1.

4 Click Add to move the IP address to the list of Allowed sites.

Figure 220 Pop-up Blocker Settings
ZYXEL NSA221 - Enable Pop-up Blockers with Exceptions - 2

text_image Pop-up Blocker Settings Exceptions Pop-ups are currently blocked. You can allow pop-ups from specific Web sites by adding the site to the list below. Address of Web site to allow: http://192.168.1.1 Add Allowed sites: Remove Remove All Notifications and Filter Level ✓ Play a sound when a pop-up is blocked. ✓ Show Information Bar when a pop-up is blocked. Filter Level: Medium: Block most automatic pop-ups Pop-up Blocker FAQ Close

5 Click Close to return to the Privacy screen.
6 Click Apply to save this setting.

JavaScript

If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed.

1 In Internet Explorer, click Tools, Internet Options and then the Security tab.

Figure 221 Internet Options: Security
ZYXEL NSA221 - JavaScript - 1

text_image Internet Options General Security Privacy Content Connections Programs Advanced Select a Web content zone to specify its security settings. Internet Local intranet Trusted sites Restricted sites Internet This zone contains all Web sites you haven't placed in other zones Sites... Security level for this zone Move the slider to set the security level for this zone. Medium - Safe browsing and still functional - Prompts before downloading potentially unsafe content - Unsigned ActiveX controls will not be downloaded - Appropriate for most Internet sites Custom Level... Default Level OK Cancel Apply

2 Click the Custom Level... button.
3 Scroll down to Scripting.
4 Under Active scripting make sure that Enable is selected (the default).
5 Under Scripting of Java applets make sure that Enable is selected (the default).

6 Click OK to close the window.

Figure 222 Security Settings - Java Scripting
ZYXEL NSA221 - JavaScript - 2

text_image Security Settings Settings: Scripting Active scripting Disable Enable Prompt Allow paste operations via script Disable Enable Prompt Scripting of Java applets Disable Enable Prompt User Authentication Reset custom settings Reset to: Medium Reset OK Cancel

Java Permissions

1 From Internet Explorer, click Tools, Internet Options and then the Security tab.
2 Click the Custom Level... button.
3 Scroll down to Microsoft VM.
4 Under Java permissions make sure that a safety level is selected.

5 Click OK to close the window.

Figure 223 Security Settings - Java
ZYXEL NSA221 - Java Permissions - 1

text_image Security Settings Settings: Disable Enable Font download Disable Enable Prompt Microsoft VM Java permissions Custom Disable Java High safety Low safety Medium safety Reset custom settings Reset to: Medium Reset OK Cancel

JAVA (Sun)

1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab.
2 Make sure that Use Java 2 for under Java (Sun) is selected.

3 Click OK to close the window.

Figure 224 Java (Sun)
ZYXEL NSA221 - Click OK to close the window. - 1

text_image Internet Options General Security Privacy Content Connections Programs Advanced Settings: Use inline AutoComplete Use Passive FTP (for firewall and DSL modem compatibility) Use smooth scrolling HTTP 1.1 settings Use HTTP 1.1 Use HTTP 1.1 through proxy connections Java (Sun) Use Java 2 v1.4.1_07 for (requires restart) Microsoft VM Java console enabled (requires restart) Java logging enabled JIT compiler for virtual machine enabled (requires restart) Multimedia Always show Internet Explorer (5.0 or later) Radio toolbar Don't display online media content in the media bar Enable Automatic Image Resizing Restore Defaults OK Cancel Apply

Mozilla Firefox

Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary.

You can enable Java, Javasccripts and pop-ups in one screen. Click Tools, then click Options in the screen that appears.

Figure 225 Mozilla Firefox: Tools > Options
ZYXEL NSA221 - Mozilla Firefox - 1

text_image Tools Help Web Search Ctrl+K Downloads Ctrl+J Add-ons Web Developer Error Console Adblock Plus... Ctrl+Shift+A Page Info FireFTP Clear Private Data... Ctrl+Shift+Del Tab Mix Plus Options Session Manager Options...

Click Content. to show the screen below. Select the check boxes as shown in the following screen.

Figure 226 Mozilla Firefox Content Security
ZYXEL NSA221 - Mozilla Firefox - 2

text_image Options Main Tabs Content Feeds Privacy Security Advanced ✓ Block pop-up windows Exceptions... ✓ Load images automatically Exceptions... ✓ Enable JavaScript Advanced... ✓ Enable Java Fonts & Colors Default font: Times New Roman Size: 16 Advanced... Colors... File Types Configure how Firefox handles certain types of files Manage... OK Cancel Help

Common Services

The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/code numbers and services, visit the IANA (Internet Assigned Number Authority) web site.

  • Name: This is a short, descriptive name for the service. You can use this one or create a different one, if you like.
  • Protocol: This is the type of IP protocol used by the service. If this is TCP/UDP, then the service uses the same port number with TCP and UDP. If this is USER-DEFINED, the Port(s) is the IP protocol number, not the port number.
  • Port(s): This value depends on the Protocol. Please refer to RFC 1700 for further information about port numbers.

  • If the Protocol is TCP, UDP, or TCP/UDP, this is the IP port number.

  • If the Protocol is USER, this is the IP protocol number.

- Description: This is a brief explanation of the applications that use this service or the situations in which this service is used.

Table 123 Commonly Used Services

NAMEPROTOCOLPORT(S)DESCRIPTION
AH (IPSEC_TUNNEL)User-Defined51The IPSEC AH (Authentication Header) tunneling protocol uses this service.
AIM/New-ICQTCP5190AOL's Internet Messenger service. It is also used as a listening port by ICQ.
AUTHTCP113Authentication protocol used by some servers.
BGPTCP179Border Gateway Protocol.
BOOTP_CLIENTUDP68DHCP Client.
BOOTP_SERVERUDP67DHCP Server.
CU-SEEMETCP7648A popular videoconferencing solution from White Pines Software.
UDP24032
DNSTCP/UDP53Domain Name Server, a service that matches web names (for example www.zyxel.com) to IP numbers.
ESP (IPSEC_TUNNEL)User-Defined50The IPSEC ESP (Encapsulation Security Protocol) tunneling protocol uses this service.
FINGERTCP79Finger is a UNIX or Internet related command that can be used to find out if a user is logged on.
FTPTCPTCP2021File Transfer Program, a program to enable fast transfer of files, including large files that may not be possible by e-mail.
H.323TCP1720NetMeeting uses this protocol.
HTTPTCP80Hyper Text Transfer Protocol - a client/server protocol for the world wide web.
HTTPSTCP443HTTPS is a secured http session often used in e-commerce.
ICMPUser-Defined1Internet Control Message Protocol is often used for diagnostic or routing purposes.
ICQUDP4000This is a popular Internet chat program.
IGMP (MULTICAST)User-Defined2Internet Group Management Protocol is used when sending packets to a specific group of hosts.
IKEUDP500The Internet Key Exchange algorithm is used for key distribution and management.
IRCTCP/UDP6667This is another popular Internet chat program.
MSN MessengerTCP1863Microsoft Networks' messenger service uses this protocol.
NEW-ICQTCP5190An Internet chat program.
NEWSTCP144A protocol for news groups.
NFSUDP2049Network File System - NFS is a client/server distributed file service that provides transparent file sharing for network environments.
NNTPTCP119Network News Transport Protocol is the delivery mechanism for the USENET newsgroup service.
PINGUser-Defined1Packet INternet Groper is a protocol that sends out ICMP echo requests to test whether or not a remote host is reachable.
POP3TCP110Post Office Protocol version 3 lets a client computer get e-mail from a POP3 server through a temporary connection (TCP/IP or other).
PPTPTCP1723Point-to-Point Tunneling Protocol enables secure transfer of data over public networks. This is the control channel.
PPTP_TUNNEL (GRE)User-Defined47PPTP (Point-to-Point Tunneling Protocol) enables secure transfer of data over public networks. This is the data channel.
RCMDTCP512Remote Command Service.
REAL_AUDIOTCP7070A streaming audio service that enables real time sound over the web.
REXECTCP514Remote Execution Daemon.
RLOGINTCP513Remote Login.
RTELNETTCP107Remote Telnet.
RTSPTCP/UDP554The Real Time Streaming (media control) Protocol (RTSP) is a remote control for multimedia on the Internet.
SFTPTCP115Simple File Transfer Protocol.
SMTPTCP25Simple Mail Transfer Protocol is the message-exchange standard for the Internet. SMTP enables you to move messages from one e-mail server to another.
SNMPTCP/UDP161Simple Network Management Program.
SNMP-TRAPSTCP/UDP162Traps for use with the SNMP (RFC: 1215).
SQL-NETTCP1521Structured Query Language is an interface to access data on many different types of database systems, including mainframes, midrange systems, UNIX systems and network servers.
SSHTCP/UDP22Secure Shell Remote Login Program.
STRM WORKSUDP1558Stream Works Protocol.
SYSLOGUDP514Syslog allows you to send system logs to a UNIX server.
TACACSUDP49Login Host Protocol used for (Terminal Access Controller Access Control System).
TELNETTCP23Telnet is the login and terminal emulation protocol common on the Internet and in UNIX environments. It operates over TCP/IP networks. Its primary function is to allow users to log into remote host systems.
TFTPUDP69Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP, but uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol).
VDOLIVETCP7000Another videoconferencing solution.

Importing Certificates

This appendix shows you how to import public key certificates into your web browser.

Public key certificates are used by web browsers to ensure that a secure web site is legitimate. When a certificate authority such as VeriSign, Comodo, or Network Solutions, to name a few, receives a certificate request from a website operator, they confirm that the web domain and contact information in the request match those on public record with a domain name registrar. If they match, then the certificate is issued to the website operator, who then places it on the site to be issued to all visiting web browsers to let them know that the site is legitimate.

Many ZyXEL products, such as the NSA-2401, issue their own public key certificates. These can be used by web browsers on a LAN or WAN to verify that they are in fact connecting to the legitimate device and not one masquerading as it. However, because the certificates were not issued by one of the several organizations officially recognized by the most common web browsers, you will need to import the ZyXEL-created certificate into your web browser and flag that certificate as a trusted authority.

Note: You can see if you are browsing on a secure website if the URL in your web browser's address bar begins with https:// or there is a sealed padlock icon ( ) somewhere in the main browser window (not all browsers show the padlock in the same location.)

In this appendix, you can import a public key certificate for:

  • Internet Explorer on page 400
  • Firefox on page 410
  • Opera on page 416
    • Konqueror on page 424

Internet Explorer

The following example uses Microsoft Internet Explorer 7 on Windows XP Professional; however, they can also apply to Internet Explorer on Windows Vista.

1 If your device's Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.

Figure 227 Internet Explorer 7: Certification Error
ZYXEL NSA221 - Internet Explorer - 1

text_image There is a problem with this website's security certificate. The security certificate presented by this website was not issued by a trusted certificate authority. The security certificate presented by this website was issued for a different website's address. Security certificate problems may indicate an attempt to fool you or intercept any data you send to the server. We recommend that you close this webpage and do not continue to this website. ✓ Click here to close this webpage. ✗ Continue to this website (not recommended). ▼ More information

2 Click Continue to this website (not recommended).

Figure 228 Internet Explorer 7: Certification Error
ZYXEL NSA221 - Internet Explorer - 2

Continue to this website (not recommended).

3 In the Address Bar, click Certificate Error > View certificates.

Figure 229 Internet Explorer 7: Certificate Error
ZYXEL NSA221 - Internet Explorer - 3

text_image Certificate Invalid The security certificate presented by this website has errors. This problem may indicate an attempt to fool you or intercept any data you send to the server. We recommend that you close this webpage. About certificate errors View certificates

4 In the Certificate dialog box, click Install Certificate.

Figure 230 Internet Explorer 7: Certificate
ZYXEL NSA221 - Internet Explorer - 4

text_image Certificate General Details Certification Path Certificate Information This CA Root certificate is not trusted. To enable trust, install this certificate in the Trusted Root Certification Authorities store. Issued to: nsa2401 Issued by: nsa2401 Valid from 5/20/2008 to 5/20/2011 Install Certificate...

5 In the Certificate Import Wizard, click Next.

Figure 231 Internet Explorer 7: Certificate Import Wizard
ZYXEL NSA221 - In the Certificate Import Wizard, click Next. - 1

text_image Certificate Import Wizard Welcome to the Certificate Import Wizard This wizard helps you copy certificates, certificate trust lists, and certificate revocation lists from your disk to a certificate store. A certificate, which is issued by a certification authority, is a confirmation of your identity and contains information used to protect data or to establish secure network connections. A certificate store is the system area where certificates are kept. To continue, click Next. < Back Next > Cancel

6 If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9.

Figure 232 Internet Explorer 7: Certificate Import Wizard
ZYXEL NSA221 - If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9. - 1

text_image Certificate Import Wizard Certificate Store Certificate stores are system areas where certificates are kept. Windows can automatically select a certificate store, or you can specify a location for Automatically select the certificate store based on the type of certificate Place all certificates in the following store Certificate store: Browse... < Back Next > Cancel

7 Otherwise, select Place all certificates in the following store and then click Browse.

Figure 233 Internet Explorer 7: Certificate Import Wizard
ZYXEL NSA221 - If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9. - 2

text_image Place all certificates in the following store Certificate store: Browse...

8 In the Select Certificate Store dialog box, choose a location in which to save the certificate and then click OK.

Figure 234 Internet Explorer 7: Select Certificate Store
ZYXEL NSA221 - If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9. - 3

text_image Select Certificate Store Select the certificate store you want to use. Personal Trusted Root Certification Authorities Enterprise Trust Intermediate Certification Authorities Active Directory User Object Trusted Publishers Show physical stores OK Cancel

9 In the Completing the Certificate Import Wizard screen, click Finish.

Figure 235 Internet Explorer 7: Certificate Import Wizard
ZYXEL NSA221 - If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9. - 4

text_image Certificate Import Wizard Completing the Certificate Import Wizard You have successfully completed the Certificate Import wizard. You have specified the following settings: Certificate Store Selected Automatically determined by 1 Content Certificate < Back Finish Cancel

10 If you are presented with another Security Warning, click Yes.

Figure 236 Internet Explorer 7: Security Warning
ZYXEL NSA221 - If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9. - 5

text_image Security Warning You are about to install a certificate from a certification authority (CA) claiming to represent: nsa2401 Windows cannot validate that the certificate is actually from "nsa2401". You should confirm its origin by contacting "nsa2401". The following number will assist you in this process: Thumbprint (sha1): 35D1C9AC DBC0E654 FE327C71 464D154B 242E5B93 Warning: If you install this root certificate, Windows will automatically trust any certificate issued by this CA. Installing a certificate with an unconfirmed thumbprint is a security risk. If you click "Yes" you acknowledge this risk. Do you want to install this certificate? Yes No

11 Finally, click OK when presented with the successful certificate installation message.

Figure 237 Internet Explorer 7: Certificate Import Wizard
ZYXEL NSA221 - If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9. - 6

text_image Certificate Import Wizard The import was successful. OK

12 The next time you start Internet Explorer and go to a ZyXEL Web Configurator page, a sealed padlock icon appears in the address bar. Click it to view the page's Website Identification information.

Figure 238 Internet Explorer 7: Website Identification
ZYXEL NSA221 - If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9. - 7

text_image Website Identification 172.20.37.202 has identified this site as: 172.20.37.202 This connection to the server is encrypted. Should I trust this site? View certificates

Installing a Stand-Alone Certificate File in Internet Explorer

Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you.

1 Double-click the public key certificate file.

Figure 239 Internet Explorer 7: Public Key Certificate File
ZYXEL NSA221 - Installing a Stand-Alone Certificate File in Internet Explorer - 1

ZYXEL NSA221 - Installing a Stand-Alone Certificate File in Internet Explorer - 2

2 In the security warning dialog box, click Open.

Figure 240 Internet Explorer 7: Open File - Security Warning
ZYXEL NSA221 - Installing a Stand-Alone Certificate File in Internet Explorer - 3

text_image Open File - Security Warning Do you want to open this file? Name: CA.cer Publisher: Unknown Publisher Type: Security Certificate From: D:\Documents and Settings\13435\Desktop Open Cancel ✓ Always ask before opening this file While files from the Internet can be useful, this file type can potentially harm your computer. If you do not trust the source, do not open this software. What's the risk?

3 Refer to steps 4-12 in the Internet Explorer procedure beginning on page 400 to complete the installation process.

Removing a Certificate in Internet Explorer

This section shows you how to remove a public key certificate in Internet Explorer 7.

1 Open Internet Explorer and click Tools > Internet Options.

Figure 241 Internet Explorer 7: Tools Menu
ZYXEL NSA221 - Removing a Certificate in Internet Explorer - 1

text_image Delete Browsing History... Pop-up Blocker Phishing Filter Manage Add-ons Work Offline Windows Update Full Screen F11 Menu Bar Toolbars Windows Messenger Diagnose Connection Problems... Sun Java Console Internet Options

2 In the Internet Options dialog box, click Content > Certificates.

Figure 242 Internet Explorer 7: Internet Options
ZYXEL NSA221 - Removing a Certificate in Internet Explorer - 2

text_image Internet Options General Security Privacy Content Connections Programs Advanced Content Advisor Ratings help you control the Internet content that can be viewed on this computer. Enable... Settings Certificates Use certificates for encrypted connections and identification. Clear SSL state Certificates Publishers AutoComplete AutoComplete stores previous entries on webpages and suggests matches for you. Settings Feeds Feeds provide updated content from websites that can be read in Internet Explorer and other programs. Settings OK Cancel Apply

3 In the Certificates dialog box, click the Trusted Root Certificates Authorities tab, select the certificate that you want to delete, and then click Remove.

Figure 243 Internet Explorer 7: Certificates
ZYXEL NSA221 - Removing a Certificate in Internet Explorer - 3

text_image Certificates Intended purpose: Intermediate Certification Authorities Trusted Root Certification Authorities Trusted Publ Issued To Issued By Expiratio... Friendly Name 172.20.37.202 172.20.37.202 5/21/2011 ABA.ECOM Root CA ABA.ECOM Root CA 7/10/2009 DST (ABA.ECOM... Autoridad Certifica... Autoridad Certificador... 6/29/2009 Autoridad Certifi... Autoridad Certifica... Autoridad Certificador... 6/30/2009 Autoridad Certifi... Baltimore EZ by DST Baltimore EZ by DST 7/4/2009 DST (Baltimore E... Belgacom E-Trust P... Belgacom E-Trust Prim... 1/21/2010 Belgacom E-Trus... C&W HKT SecureN... C&W HKT SecureNet ... 10/16/2009 CW HKT Secure... C&W HKT SecureN... C&W HKT SecureNet ... 10/16/2009 CW HKT Secure... C&W HKT SecureN... C&W HKT SecureNet ... 10/16/2010 CW HKT Secure... Import... Export... Remove Advanced... Certificate intended purposes View Close

4 In the Certificates confirmation, click Yes.

Figure 244 Internet Explorer 7: Certificates
ZYXEL NSA221 - Removing a Certificate in Internet Explorer - 4

text_image Certificates Deleting system root certificates might prevent some Windows components from working properly. If Update Root Certificates is installed, any deleted third-party root certificates will be restored automatically, but the system root certificates will not. Do you want to delete the selected certificate(s)? Yes No

5 In the Root Certificate Store dialog box, click Yes.

Figure 245 Internet Explorer 7: Root Certificate Store
ZYXEL NSA221 - Removing a Certificate in Internet Explorer - 5

text_image Root Certificate Store Do you want to DELETE the following certificate from the Root Store? Subject : 172.20.37.202, ZyXEL Issuer : Self Issued Time Validity : Wednesday, May 21, 2008 through Saturday, May 21, 2011 Serial Number : 00846BC7 4BBF7C2E CB Thumbprint (sha1) : DC44635D 10FE2D0D E76A72ED 002B9AF7 677EB0E9 Thumbprint (md5) : 65F5E948 F0BC9598 50803387 C6A18384 Yes No

6 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.

Firefox

The following example uses Mozilla Firefox 2 on Windows XP Professional; however, the screens can also apply to Firefox 2 on all platforms.

1 If your device's Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.
2 Select Accept this certificate permanently and click OK.

Figure 246 Firefox 2: Website Certified by an Unknown Authority
ZYXEL NSA221 - Firefox - 1

text_image Website Certified by an Unknown Authority Unable to verify the identity of 172.20.37.202 as a trusted site. Possible reasons for this error: - Your browser does not recognize the Certificate Authority that issued the site's certificate. - The site's certificate is incomplete due to a server misconfiguration. - You are connected to a site pretending to be 172.20.37.202, possibly to obtain your confidential information. Please notify the site's webmaster about this problem. Before accepting this certificate, you should examine this site's certificate carefully. Are you willing to to accept this certificate for the purpose of identifying the Web site 172.20.37.202? Examine Certificate... Accept this certificate permanently Accept this certificate temporarily for this session Do not accept this certificate and do not connect to this Web site OK Cancel

3 The certificate is stored and you can now connect securely to the Web Configurator. A sealed padlock appears in the address bar, which you can click to open the Page Info > Security window to view the web page's security information.

Figure 247 Firefox 2: Page Info
ZYXEL NSA221 - Firefox - 2

ZYXEL NSA221 - Firefox - 3

text_image Page Info General Forms Links Media Security Web Site Identity Verified The web site 172.20.37.202 supports authentication for the page you are viewing. The identity of this web site has been verified by ZyXEL, a certificate authority you trust for this purpose. View View the security certificate that verifies this web site's identity. Connection Encrypted: High-grade Encryption (AES-256 256 bit) The page you are viewing was encrypted before being transmitted over the Internet. Encryption makes it very difficult for unauthorized people to view information traveling between computers. It is therefore very unlikely that anyone read this page as it traveled across the network.

Installing a Stand-Alone Certificate File in Firefox

Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you.

1 Open Firefox and click Tools > Options.

Figure 248 Firefox 2: Tools Menu
ZYXEL NSA221 - Open Firefox and click Tools &gt; Options. - 1

text_image Tools Web Search Ctrl+K Downloads Ctrl+J Add-ons Java Console Error Console Page Info Clear Private Data... Ctrl+Shift+Del Options...

2 In the Options dialog box, click Advanced > Encryption > View Certificates.

Figure 249 Firefox 2: Options
ZYXEL NSA221 - In the Options dialog box, click Advanced &gt; Encryption &gt; View Certificates. - 1

text_image Options Main Tabs Content Feeds Privacy Security Advanced General Network Update Encryption Protocols Use SSL 3.0 Use TLS 1.0 Certificates When a web site requires a certificate: Select one automatically Ask me every time View Certificates Revocation Lists Verification Security Devices OK Cancel Help

3 In the Certificate Manager dialog box, click Web Sites > Import.

Figure 250 Firefox 2: Certificate Manager
ZYXEL NSA221 - In the Options dialog box, click Advanced &gt; Encryption &gt; View Certificates. - 2

text_image Certificate Manager Your Certificates Other Peoples Web Sites Authorities You have certificates on file that identify these web sites: Certificate Name Purposes Import View Edit Delete OK

4 Use the Select File dialog box to locate the certificate and then click Open.

Figure 251 Firefox 2: Select File
ZYXEL NSA221 - In the Options dialog box, click Advanced &gt; Encryption &gt; View Certificates. - 3

text_image Select File containing Web Site certificate to import Look in: Desktop My Computer My Documents My Network Places CA.cer File name: CA.cer Files of type: Certificate Files Open Cancel

5 The next time you visit the web site, click the padlock in the address bar to open the Page Info > Security window to see the web page's security information.

Removing a Certificate in Firefox

This section shows you how to remove a public key certificate in Firefox 2.

1 Open Firefox and click Tools > Options.

Figure 252 Firefox 2: Tools Menu
ZYXEL NSA221 - Removing a Certificate in Firefox - 1

text_image Tools Web Search Ctrl+K Downloads Ctrl+J Add-ons Java Console Error Console Page Info Clear Private Data... Ctrl+Shift+Del Options...

2 In the Options dialog box, click Advanced > Encryption > View Certificates.

Figure 253 Firefox 2: Options
ZYXEL NSA221 - Removing a Certificate in Firefox - 2

text_image Options Main Tabs Content Feeds Privacy Security Advanced General Network Update Encryption Protocols Use SSL 3.0 Use TLS 1.0 Certificates When a web site requires a certificate: Select one automatically Ask me every time View Certificates Revocation Lists Verification Security Devices OK Cancel Help

3 In the Certificate Manager dialog box, select the Web Sites tab, select the certificate that you want to remove, and then click Delete.

Figure 254 Firefox 2: Certificate Manager
ZYXEL NSA221 - Removing a Certificate in Firefox - 3

text_image Certificate Manager Your Certificates Other People's Web Sites Authorities You have certificates on file that identify these web sites: Certificate Name Purposes ZyXEL 172.20.37.202 Client,Server,Status Responder View Edit Import Delete OK

4 In the Delete Web Site Certificates dialog box, click OK.

Figure 255 Firefox 2: Delete Web Site Certificates
ZYXEL NSA221 - Removing a Certificate in Firefox - 4

text_image Delete Web Site Certificates Are you sure you want to delete these web site certificates? 172.20.37.202 If you delete a web site certificate, you will be asked to accept it again the next time you visit the web site. OK Cancel

5 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.

Opera

The following example uses Opera 9 on Windows XP Professional; however, the screens can apply to Opera 9 on all platforms.

1 If your device's Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.
2 Click Install to accept the certificate.

Figure 256 Opera 9: Certificate signer not found
ZYXEL NSA221 - Opera - 1

text_image Certificate signer not found The root certificate for this server is not registered. You may install this certificate. Accept/install? 172.20.37.202 View - The root certificate from "172.20.37.202" is not known to Opera. Opera cannot decide if this certificate can be trusted. Accept Install Cancel Help

3 The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page's security details.

Figure 257 Opera 9: Security information
ZYXEL NSA221 - Opera - 2

text_image ZyXEL (US) Security information for 172.20.37.202 Security Fraud Protection Certificate Secure site The connection to 172.20.37.202 is secure. Certificate summary Holder: 172.20.37.202, ZyXEL Issuer: 172.20.37.202, ZyXEL Expires: 05/21/2011 Encryption protocol TLS v1.0 256 bit AES (1024 bit DHE_RSA/SHA) OK Help

Installing a Stand-Alone Certificate File in Opera

Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you.

1 Open Opera and click Tools > Preferences.

Figure 258 Opera 9: Tools Menu
ZYXEL NSA221 - Open Opera and click Tools &gt; Preferences. - 1

text_image Tools Mail and chat accounts... Delete private data... Notes Ctrl+Alt+E Transfers Ctrl+Alt+T History Ctrl+Alt+H Links Ctrl+Alt+L Advanced ► Quick preferences F12 ► Appearance... Shift+F12 Preferences... Ctrl+F12

2 In Preferences, click Advanced > Security > Manage certificates.

Figure 259 Opera 9: Preferences
ZYXEL NSA221 - In Preferences, click Advanced &gt; Security &gt; Manage certificates. - 1

text_image Preferences General Wand Search Web pages Advanced Tabs Browsing Notifications Content Fonts Downloads Programs History Cookies Security Network Toolbars Shortcuts Voice Choose a master password to protect personal certificates Set master password... Ask for password Every time needed Use as master password for e-mail and Wand Enable Fraud Protection Manage certificates... Security protocols... OK Cancel Help

3 In the Certificates Manager, click Authorities > Import.

Figure 260 Opera 9: Certificate manager
ZYXEL NSA221 - In the Certificates Manager, click Authorities &gt; Import. - 1

text_image Certificate manager Personal Authorities •Certificate authorities AAA Certificate Services Actalis Root CA AddTrust Class 1 CA Root AddTrust External CA Root AddTrust Public CA Root AddTrust Qualified CA Root Baltimore CyberTrust Code Signing Root Baltimore CyberTrust Mobile Root Baltimore CyberTrust Root Certum CA Certum CA Level I Certum CA Level II Certum CA Level III Certum CA Level IV Class 1 Public Primary Certification Authority Class 1 Public Primary Certification Authority - G2, (c) 1998 VeriSig... Class 2 Public Primary Certification Authority Class 2 Public Primary Certification Authority - G2, (c) 1998 VeriSig... View Delete Import... Export... OK Cancel Help

4 Use the Import certificate dialog box to locate the certificate and then click Open.

Figure 261 Opera 9: Import certificate
ZYXEL NSA221 - Use the Import certificate dialog box to locate the certificate and then click Open. - 1

text_image Import certificate Look in: Desktop Desktop My Computer My Documents My Network Places CA.cer File name: CA.cer Files of type: X509 (*.ca) Open Cancel

5 In the Install authority certificate dialog box, click Install.

Figure 262 Opera 9: Install authority certificate
ZYXEL NSA221 - Use the Import certificate dialog box to locate the certificate and then click Open. - 2

text_image Install authority certificate Install this certificate authority's certificate chain in the database? 172.20.37.202 View Install Cancel Help

6 Next, click OK.

Figure 263 Opera 9: Install authority certificate
ZYXEL NSA221 - Use the Import certificate dialog box to locate the certificate and then click Open. - 3

text_image Install authority certificate Are you sure you want to trust this issuer? OK Cancel Help

7 The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page's security details.

Removing a Certificate in Opera

This section shows you how to remove a public key certificate in Opera 9.

1 Open Opera and click Tools > Preferences.

Figure 264 Opera 9: Tools Menu
ZYXEL NSA221 - Removing a Certificate in Opera - 1

text_image Tools Mail and chat accounts... Delete private data... Notes Ctrl+Alt+E Transfers Ctrl+Alt+T History Ctrl+Alt+H Links Ctrl+Alt+L Advanced ► Quick preferences F12 ► Appearance... Shift+F12 Preferences... Ctrl+F12

2 In Preferences, Advanced > Security > Manage certificates.

Figure 265 Opera 9: Preferences
ZYXEL NSA221 - Removing a Certificate in Opera - 2

text_image Preferences General Wand Search Web pages Advanced Tabs Browsing Notifications Content Fonts Downloads Programs History Cookies Security Network Toolbars Shortcuts Voice Choose a master password to protect personal certificates Set master password... Ask for password Every time needed Use as master password for e-mail and Wand Enable Fraud Protection Manage certificates... Security protocols... OK Cancel Help

3 In the Certificates manager, select the Authorities tab, select the certificate that you want to remove, and then click Delete.

Figure 266 Opera 9: Certificate manager
ZYXEL NSA221 - Removing a Certificate in Opera - 3

text_image Certificate manager Personal Authorities ▲Certificate authorities 172.20.37.202 AAA Certificate Services Actalis Root CA AddTrust Class 1 CA Root AddTrust External CA Root AddTrust Public CA Root AddTrust Qualified CA Root Baltimore CyberTrust Code Signing Root Baltimore CyberTrust Mobile Root Baltimore CyberTrust Root Certum CA Certum CA Level I Certum CA Level II Certum CA Level III Certum CA Level IV Class 1 Public Primary Certification Authority Class 1 Public Primary Certification Authority - G2, (c) 1998 VeriSig... Class 2 Public Primary Certification Authority View Delete Import... Export... OK Cancel Help

4 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.

Note: There is no confirmation when you delete a certificate authority, so be absolutely certain that you want to go through with it before clicking the button.

Konqueror

The following example uses Konqueror 3.5 on openSUSE 10.3, however the screens apply to Konqueror 3.5 on all Linux KDE distributions.

1 If your device's Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error.
2 Click Continue.

Figure 267 Konqueror 3.5: Server Authentication
ZYXEL NSA221 - Konqueror - 1

text_image Server Authentication - Konqueror The server certificate failed the authenticity test (172.20.37.202). Details Continue Cancel

3 Click Forever when prompted to accept the certificate.

Figure 268 Konqueror 3.5: Server Authentication
ZYXEL NSA221 - Konqueror - 2

text_image Server Authentication - Konqueror Would you like to accept this certificate forever without being prompted? Forever Current Sessions Only

4 Click the padlock in the address bar to open the KDE SSL Information window and view the web page's security details.

Figure 269 Konqueror 3.5: KDE SSL Information
ZYXEL NSA221 - Konqueror - 3

ZYXEL NSA221 - Konqueror - 4

text_image KDE SSL Information - Konqueror Current connection is secured with SSL. Chain: Peer certificate: Organization: ZyXEL Organizational unit: XYZ200 Country: US Common name: 172.23.37.202 Issuer: Organization: ZyXEL Organizational unit: XYZ200 Country: US Common name: 172.23.37.202 IP address: 172.23.37.202 URL: https://172.23.37.202/loginwrap.html Certificate state: Certificate is self-signed and thus may not be trustworthy. Valid from: Wednesday 21 May 2008 06:42:35 am GMT Valid until: Saturday 21 May 2011 06:42:35 am GMT Serial number: 11139321193569894228 MD5 digest: 3F:9A:76:6E:A9:F5:07:41:BE:4C:8B:8B:A2:D3:F0:2F Cipher in use: DHE-RSA-AES256-SHA Details: DHE-RSA-AES256-SHA SSLv3 Kx=DH Au=RSA Enc=AES(256) Mac=SHA1 SSL version: TLSv1/SSLv3 Cipher strength: 256 bits used of a 256 bit cipher Cryptography Configuration... Close

Installing a Stand-Alone Certificate File in Konqueror

Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you.

1 Double-click the public key certificate file.

Figure 270 Konqueror 3.5: Public Key Certificate File
ZYXEL NSA221 - Installing a Stand-Alone Certificate File in Konqueror - 1

2 In the Certificate Import Result - Kleopatra dialog box, click OK.

Figure 271 Konqueror 3.5: Certificate Import Result
ZYXEL NSA221 - Installing a Stand-Alone Certificate File in Konqueror - 2

text_image Certificate Import Result - Kleopal Detailed results of importing CA.der: Total number processed: 1 Imported: 1 OK

The public key certificate appears in the KDE certificate manager, Kleopatra.

Figure 272 Konqueror 3.5: Kleopatra
ZYXEL NSA221 - Installing a Stand-Alone Certificate File in Konqueror - 3

text_image Kleopatra File View Certificates CRLs Tools Settings Help Search: In Local Certificates Subject Issuer Serial CN=10R-CA 1:PN,O=Bundesnetzagentur,C... CN=10R-CA 1:PN,O=B... 2A CN=11R-CA 1:PN,O=Bundesnetzagentur,C... CN=11R-CA 1:PN,O=B... 2D CN=172.20.37.202,OU=XYZ200,O=ZyXEL,... CN=172.20.37.202,O... 009A... CN=6R-Ca 1:PN,NAMEDISTINGUISHER=1,O... CN=6R-Ca 1:PN,NAME... 32D1... CN=7R-CA 1:PN,NAMEDISTINGUISHER=1,O... CN=7R-CA 1:PN,NAME... 00C4... CN=8R-CA 1:PN,O=Regulierungsbehörde f... CN=8R-CA 1:PN,O=Re... 01 CN=9R-CA 1:PN,O=Regulierungsbehörde f... CN=9R-CA 1:PN,O=Re... 02 CN=CA Cert Signing Authority,EMAIL=supp... CN=CA Cert Signing A... 00 CN=D-TRUST Qualified Root CA 1 2006:PN,... CN=D-TRUST Qualifie... 00B95F CN=D-TRUST Qualified Root CA 2 2006:PN,... CN=D-TRUST Qualifie... 00B9... CN=S-TRUST Qualified Root CA 2006-001:P... CN=S-TRUST Qualifie... 00DF... 11 Keys.

3 The next time you visit the web site, click the padlock in the address bar to open the KDE SSL Information window to view the web page's security details.

Removing a Certificate in Konqueror

This section shows you how to remove a public key certificate in Konqueror 3.5.

1 Open Konqueror and click Settings > Configure Konqueror.

Figure 273 Konqueror 3.5: Settings Menu
ZYXEL NSA221 - Removing a Certificate in Konqueror - 1

text_image Settings Hide Menubar Ctrl+M Toolbars Full Screen Mode Ctrl+Shift+F Save View Changes per Folder Remove Folder Properties Load View Profile Save View Profile "Web Browsing" Configure View Profiles... Configure Extensions... Configure Spell Checking... Configure Shortcuts... Configure Toolbars... Configure Konqueror...

2 In the Configure dialog box, select Crypto.
3 On the Peer SSL Certificates tab, select the certificate you want to delete and then click Remove.

Figure 274 Konqueror 3.5: Configure
ZYXEL NSA221 - Removing a Certificate in Konqueror - 2

text_image Configure - Konqueror Configure SSL, manage certificates, and other cryptography settings SSL OpenSSL Your Certificates Authentication Peer SSL Certificates SSL Signers Organization Common Name ZyXEL 172.20.37.202 Export... Remove Verify Crypto Browser Identification Plugins Performance Organization: ZyXEL Organizational unit: XYZ200 Valid from: Wednesday 21 May 2008 06:42:35 am GMT Valid until: Saturday 21 May 2011 06:42:35 am GMT Cache Permanently Until 01/01/00 12:00 am Policy Accept Reject Prompt MD5 digest: 3F:9A:76:6E:A9:F5:07:41:BE:4C:8B:8B:A2:D3:F0:2F Help Defaults OK Apply Cancel

4 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.

Note: There is no confirmation when you remove a certificate authority, so be absolutely certain you want to go through with it before clicking the button.

Open Source Licences

End-User License Agreement for “NSA221”

WARNING: ZyXEL Communications Corp. IS WILLING TO LICENSE THE SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT. PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM. IF YOU DO NOT AGREE TO THESE TERMS, THEN ZyXEL, IS UNWILLING TO LICENSE THE SOFTWARE TO YOU, IN WHICH EVENT YOU SHOULD RETURN THE UNINSTALLED SOFTWARE AND PACKAGING TO THE PLACE FROM WHICH IT WAS ACQUIRED OR ZyXEL, AND YOUR MONEY WILL BE REFUNDED.

1. Grant of License for Personal Use

ZyXEL Communications Corp. ("ZyXEL") grants you a non-exclusive, non-sublicense, non-transferable license to use the program with which this license is distributed (the "Software"), including any documentation files accompanying the Software ("Documentation"), for internal business use only, for up to the number of users specified in sales order and invoice. You have the right to make one backup copy of the Software and Documentation solely for archival, back-up or disaster recovery purposes. You shall not exceed the scope of the license granted hereunder. Any rights not expressly granted by ZyXEL to you are reserved by ZyXEL, and all implied licenses are disclaimed.

2. Ownership

You have no ownership rights in the Software. Rather, you have a license to use the Software as long as this License Agreement remains in full force and effect. Ownership of the Software, Documentation and all intellectual property rights therein shall remain at all times with ZyXEL. Any other use of the Software by any other entity is strictly forbidden and is a violation of this License Agreement.

The Software and Documentation contain material that is protected by International Copyright Law and trade secret law, and by international treaty provisions. All rights not granted to you herein are expressly reserved by ZyXEL. You may not remove any proprietary notice of ZyXEL or any of its licensors from any copy of the Software or Documentation.

4. Restrictions

You may not publish, display, disclose, sell, rent, lease, modify, store, loan, distribute, or create derivative works of the Software, or any part thereof. You may not assign, sublicense, convey or otherwise transfer, pledge as security or otherwise encumber the rights and licenses granted hereunder with respect to the Software. Certain components of the Software, and third party open source programs included with the Software, have been or may be made available by ZyXEL listed in the below Table (collectively the "Open-Sourced Components") You may modify or replace only these Open-Sourced Components; provided that you comply with the terms of this License and any applicable licensing terms governing use of the Open-Sourced Components, which have been provided on the License Notice as below for the Software. ZyXEL is not obligated to provide any maintenance, technical or other support for the resultant modified Software. You may not copy, reverse engineer, decompile, reverse compile, translate, adapt, or disassemble the Software, or any part thereof, nor shall you attempt to create the source code from the object code for the Software. Except as and only to the extent expressly permitted in this License, by applicable licensing terms governing use of the Open-Sourced Components, or by applicable law, you may not market, co-brand, private label or otherwise permit third parties to link to the Software, or any part thereof. You may not use the Software, or any part thereof, in the operation of a service bureau or for the benefit of any other person or entity. You may not cause, assist or permit any third party to do any of the foregoing. Portions of the Software utilize or include third party software and other copyright material. Acknowledgements, licensing terms and disclaimers for such material are contained in the License Notice as below for the Software, and your use of such material is governed by their respective terms. ZyXEL has provided, as part of the Software package, access to certain third party software as a convenience. To the extent that the Software contains third party software, ZyXEL has no express or implied obligation to provide any technical or other support for such software. Please contact the appropriate software vendor or manufacturer directly for technical support and customer service related to its software and products.

5. Confidentiality

You acknowledge that the Software contains proprietary trade secrets of ZyXEL and you hereby agree to maintain the confidentiality of the Software using at least as great a degree of care as you use to maintain the confidentiality of your own most confidential information. You agree to reasonably communicate the terms and conditions of this License Agreement to those persons employed by you who come into contact with the Software, and to use reasonable best efforts to ensure

their compliance with such terms and conditions, including, without limitation, not knowingly permitting such persons to use any portion of the Software for the purpose of deriving the source code of the Software.

6. No Warranty

THE SOFTWARE IS PROVIDED "AS IS." TO THE MAXIMUM EXTENT PERMITTED BY LAW, ZyXEL DISCLAIMS ALL WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. ZyXEL DOES NOT WARRANT THAT THE FUNCTIONS CONTAINED IN THE SOFTWARE WILL MEET ANY REQUIREMENTS OR NEEDS YOU MAY HAVE, OR THAT THE SOFTWARE WILL OPERATE ERROR FREE, OR IN AN UNINTERUPTED FASHION, OR THAT ANY DEFECTS OR ERRORS IN THE SOFTWARE WILL BE CORRECTED, OR THAT THE SOFTWARE IS COMPATIBLE WITH ANY PARTICULAR PLATFORM. SOME JURISDICTIONS DO NOT ALLOW THE WAIVER OR EXCLUSION OF IMPLIED WARRANTIES SO THEY MAY NOT APPLY TO YOU. IF THIS EXCLUSION IS HELD TO BE UNENFORCEABLE BY A COURT OF COMPETENT JURISDICTION, THEN ALL EXPRESS AND IMPLIED WARRANTIES SHALL BE LIMITED IN DURATION TO A PERIOD OF THIRTY (30) DAYS FROM THE DATE OF PURCHASE OF THE SOFTWARE, AND NO WARRANTIES SHALL APPLY AFTER THAT PERIOD.

7. Limitation of Liability

IN NO EVENT WILL ZyXEL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING, WITHOUT LIMITATION, INDIRECT, SPECIAL, PUNITIVE, OR EXEMPLARY DAMAGES FOR LOSS OF BUSINESS, LOSS OF PROFITS, BUSINESS INTERRUPTION, OR LOSS OF BUSINESS INFORMATION) ARISING OUT OF THE USE OF OR INABILITY TO USE THE PROGRAM, OR FOR ANY CLAIM BY ANY OTHER PARTY, EVEN IF ZyXEL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. ZyXEL's AGGREGATE LIABILITY WITH RESPECT TO ITS OBLIGATIONS UNDER THIS AGREEMENT OR OTHERWISE WITH RESPECT TO THE SOFTWARE AND DOCUMENTATION OR OTHERWISE SHALL BE EQUAL TO THE PURCHASE PRICE, BUT SHALL IN NO EVENT EXCEED THE PRODUCT'S PRICE. BECAUSE SOME STATES/COUNTRIES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATION MAY NOT APPLY TO YOU.

8. Export Restrictions

THIS LICENSE AGREEMENT IS EXPRESSLY MADE SUBJECT TO ANY APPLICABLE LAWS, REGULATIONS, ORDERS, OR OTHER RESTRICTIONS ON THE EXPORT OF THE SOFTWARE OR INFORMATION ABOUT SUCH SOFTWARE WHICH MAY BE IMPOSED FROM TIME TO TIME. YOU SHALL NOT EXPORT THE SOFTWARE, DOCUMENTATION OR INFORMATION ABOUT THE SOFTWARE AND DOCUMENTATION WITHOUT COMPLYING WITH SUCH LAWS, REGULATIONS, ORDERS, OR OTHER RESTRICTIONS. YOU AGREE TO INDEMNIFY ZyXEL AGAINST

ALL CLAIMS, LOSSES, DAMAGES, LIABILITIES, COSTS AND EXPENSES, INCLUDING REASONABLE ATTORNEYS' FEES, TO THE EXTENT SUCH CLAIMS ARISE OUT OF ANY BREACH OF THIS SECTION 8.

9.Audit Rights

ZyXEL SHALL HAVE THE RIGHT, AT ITS OWN EXPENSE, UPON REASONABLE PRIOR NOTICE, TO PERIODICALLY INSPECT AND AUDIT YOUR RECORDS TO ENSURE YOUR COMPLIANCE WITH THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT.

10. Termination

This License Agreement is effective until it is terminated. You may terminate this License Agreement at any time by destroying or returning to ZyXEL all copies of the Software and Documentation in your possession or under your control. ZyXEL may terminate this License Agreement for any reason, including, but not limited to, if ZyXEL finds that you have violated any of the terms of this License Agreement. Upon notification of termination, you agree to destroy or return to ZyXEL all copies of the Software and Documentation and to certify in writing that all known copies, including backup copies, have been destroyed. All provisions relating to confidentiality, proprietary rights, and non-disclosure shall survive the termination of this Software License Agreement.

11. General

This License Agreement shall be construed, interpreted and governed by the laws of Republic of China without regard to conflicts of laws provisions thereof. The exclusive forum for any disputes arising out of or relating to this License Agreement shall be an appropriate court or Commercial Arbitration Association sitting in ROC, Taiwan. This License Agreement shall constitute the entire Agreement between the parties hereto. This License Agreement, the rights granted hereunder, the Software and Documentation shall not be assigned by you without the prior written consent of ZyXEL. Any waiver or modification of this License Agreement shall only be effective if it is in writing and signed by both parties hereto. If any part of this License Agreement is found invalid or unenforceable by a court of competent jurisdiction, the remainder of this License Agreement shall be interpreted so as to reasonably effect the intention of the parties.

NOTE: Some components of this product incorporate source code covered under the open source code licenses. To obtain the source code covered under those Licenses, please check ZyXEL Technical Support (support@zyxel.com.tw) to get it.

Open-Sourced Components

3RD PARTY SOFTWAREVERSIONWEB ADDRESS OF THE SOFTWARE LICENSE TERM
Linux Kernel-2.6.24.42.6.24.4http://www.kernel.org/
uboot-1.1.21.1.2http://sourceforge.net/projects/uboot
busybox-1.1.11.1.1http://www.busybox.net/
curl-7.18.27.18.2http://curl.haxx.se/
dhcpcd-1.3.22-p141.3.22-p14http://www.phystech.com/download/
dojo-0.4.30.4.3http://dojotoolkit.org/downloads
boost-1.38.01.38.0http://www.boost.org/users/download/
libeeproghttp://codesink.org/eeprog.html
libgcgi-0.9.50.9.5http://www.catchen.org/gcgi/
libiconv1.111.11http://www.gnu.org/software/libiconv/
libol-0.3.160.3.16http://dir.filewatcher.com/d/FreeBSD/distfiles/Other/libol-0.3.16.tar.gz.345231.html
libraw1394-1.2.11.2.1http://sourceforge.net/projects/libraw1394/
openssl-0.9.7m0.9.7mhttp://www.openssl.org/
libtecla-1.6.11.6.1http://www.astro.caltech.edu/~mcs/tecla/index.html
libtorrent-rasterbar-0.14.30.14.3http://sourceforge.net/projects/libtorrent/files/
libxml2-2.6.82.6.8http://ftp.gnome.org/pub/gnome/sources/libxml2/2.6/
lm-sensors-2.10.02.10.0http://www.lm-sensors.org/wiki/Download
mtd-utils-1.0.01.0.0ftp://ftp.infradead.org/pub/mtd-utils/mtd-utils-1.0.0.tar.gz
ntfs-3g-1.7.11.7.1http://www.ntfs-3g.org/quality.html
ntp-4.1.24.1.2http://bugs.ntp.org/
pam-0.760.76http://www.netsw.org/system/libs/pam/
pam_mount-0.9.5GPL 2.1http://sourceforge.net/projects/pam-mount/files/
pciutils-2.2.42.2.4http://www.kernel.org/pub/software/utils/pciutils/
quotatool-1.4.9setsystz1.4.9http://quotatool.ekenberg.se/index.php?node=downloadhttp://lkml.indiana.edu/hypermail/linux/kernel/0702.2/1182.html
sqlite-3.5.63.5.6http://www.sqlite.org/
syslog-ng-1.6.81.6.8http://www.balabit.hu/network-security/syslog-ng/
tz32ftp://elsie.nci.nih.gov/pub/
libupnp-1.3.11.3.1http://upnp.sourceforge.net/
upnpigdctrl-0.0.10.0.1http://ftp.heanet.ie/mirrors/sourceforge/u/project/up/upnpigdctrl/upnpigdctrl/
cups-1.1.231.1.23http://www.cups.org
fuse-2.7.02.7.0http://sourceforge.net/projects/fuse/files/fuse-2.X/
gphoto2-2.4.02.4.0http://sourceforge.net/projects/gphoto/files/gphoto/
gphotofs-0.4.00.4.0http://sourceforge.net/projects/gphoto/files/
httpd-2.2.92.2.9http://sunsite.bilkent.edu.tr/pub/apache/httpd/
libgphoto2-2.4.02.4.0http://sourceforge.net/projects/gphoto/files/
libid3tag-0.15.1b0.15.1bhttp://sourceforge.net/projects/mad/files/
mdadm-2.6.22.6.2http://www.hu.kernel.org/pub/linux/utils/raid/mdadm/
mt-daapd-svn1586svn1586http://www.fireflymediaserver.org/
pure-ftpd-1.0.211.0.21http://download.pureftpd.org/pub/pure-ftpd/releases/
reiserfsprogs-3.6.193.6.19http://www.kernel.org/pub/linux/utils/fs/reiserfs/
samba-3.0.25b3.0.25bhttp://www.samba.org/
sg3_utils-1.251.25http://sg.danny.cz/sg/sg3_utils.html
sqeezecenter-7.27.2http://www.logitechsqueezebox.com/support/download-squeezebox-server.html
ipkg-0.99.1630.99.163http://www.handhelds.org/moin/moin.cgi/lpkg
cherrypy-3.1.23.1.2http://www.cherrypy.org/wiki/CherryPyLicense
mediainfo-0.7.270.7.27http://mediainfo.sourceforge.net
wxWidgets-2.9.02.9.0http://www.wxwidgets.org/about/newlicen.htm
dar2.3.6http://dar.linux.free.fr/
rsync3.0.0http://rsync.samba.org/
ez-ipupdate3.0.10http://ez-ipupdate.com/
inadyn1.96.2http://www.inatech.eu/inadyn/
aMule2.2.3http://www.amule.org/
crypto++5.5.2http://www.cryptopp.com
GLib2.18.3http://www.gtk.org/
libupnp1.6.6http://pupnp.sourceforge.net/
pango1.22.4http://www.pango.org/
pkg-config0.23http://pkg-config.freedesktop.org/
wxWidgets2.8.9http://www.wxwidgets.org/
gallery2.3http://codex.gallery2.org/
nfs-utils1.1.4http://sourceforge.net/projects/nfs/
mysql5.1.30http://www.mysql.com/
php5.2.8http://php.net/
phpMyAdmin3.1.1http://www.phpmyadmin.net/
smartmontools5.38http://smartmontools.sourceforge.net/
squeezeboxserver7.4.1http://www.logitechsqueezebox.com/support/download-squeezebox-server.html
WordPress2.7http://wordpress.org/
Audio-Scan0.44http://search.cpan.org/~agrundma/Audio-Scan-0.44/
AutoXS-Header1.02http://search.cpan.org/dist/AutoXS-Header/
Class-C3-XS0.11http://search.cpan.org/dist/Class-C3-XS/
Class-XSAccessor1.03http://search.cpan.org/dist/Class-XSAccessor/
Class-XSAccessor-Array1.04http://search.cpan.org/dist/Class-XSAccessor-Array/
Compress-Raw-Zlib2.017http://search.cpan.org/dist/Compress-Raw-Zlib/
DBD-mysql4.011http://search.cpan.org/dist/DBD-mysql/
DBI1.608http://search.cpan.org/dist/DBI/
Digest-SHA12.11http://search.cpan.org/dist/Digest-SHA1/
Encode-Detect1.00http://search.cpan.org/dist/Encode-Detect/
EV3.8http://search.cpan.org/~mlehmann/EV-3.8/
ExtUtils-Cbuilder0.24http://search.cpan.org/dist/ExtUtils-CBuilder/
flac1.2.1http://flac.sourceforge.net/
gd2.0.35http://www.libgd.org/
GD2.41http://search.cpan.org/~lds/GD-2.41/
HTML-Parser3.60http://htmlparser.sourceforge.net/
JSON-XS2.232http://search.cpan.org/dist/JSON-XS/
Module-Build0.31012http://search.cpan.org/dist/Module-Build/
PERL5.8.8http://www.perl.org/
Sub-Name0.04http://search.cpan.org/perldoc?Sub%3A%3AName
Template-Toolkit2.21http://template-toolkit.org/
XML-Parser2.36http://search.cpan.org/~msergeant/XML-Parser-2.36/
YAML-Syck1.05http://search.cpan.org/dist/YAML-Syck/

Notice

Information herein is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, except the express written permission of ZyXEL Communications Corporation.

This Product includes cups 1.1.23, libgcgi 0.9.5, libgphoto2 2.4.0, libraw1394 1.2.1, pam_mount 0.9.5, wxWidgets 2.8.9, wxWidgets 2.9.0 and flac 1.2.1 software under LGPL 2.1 license.

GNU LESSER GENERAL PUBLIC LICENSE

Version 2.1, February 1999

Copyright (C) 1991, 1999 Free Software Foundation, Inc.

59 Temple Place, Suite 330, Boston, MA 02111-1307 USA

Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts

as the successor of the GNU Library Public License, version 2, hence the version number 2.1.

Preamble

The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users.

This license, the Lesser General Public License, applies to some specially designated software packages--typically libraries--of the Free Software Foundation and other authors who decide to use it. You can use it too, but we suggest you first think carefully about whether this license or the ordinary General Public License is the better strategy to use in any particular case, based on the explanations below.

When we speak of free software, we are referring to freedom of use, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish); that you receive source code or can get

it if you want it; that you can change the software and use pieces of it in new free programs; and that you are informed that you can do these things.

To protect your rights, we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights. These restrictions translate to certain responsibilities for you if you distribute copies of the library or if you modify it.

For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you. You must make sure that they, too, receive or can get the source code. If you link other code with the library, you must provide complete object files to the recipients, so that they can relink them with the library after making changes to the library and recompiling it. And you must show them these terms so they know their rights.

We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license, which gives you legal permission to copy, distribute and/or modify the library.

To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the library is modified by someone else and passed on, the recipients should know that what they have is not the original version, so that the original author's reputation will not be affected by problems that might be introduced by others.

Finally, software patents pose a constant threat to the existence of any free program. We wish to make sure that a company cannot effectively restrict the

users of a free program by obtaining a restrictive license from a patent holder. Therefore, we insist that any patent license obtained for a version of the library must be consistent with the full freedom of use specified in this license.

Most GNU software, including some libraries, is covered by the ordinary GNU General Public License. This license, the GNU Lesser General Public License, applies to certain designated libraries, and is quite different from the ordinary General Public License. We use this license for certain libraries in order to permit linking those libraries into non-free programs.

When a program is linked with a library, whether statically or using a shared library, the combination of the two is legally speaking a combined work, a derivative of the original library. The ordinary General Public License therefore permits such linking only if the entire combination fits its criteria of freedom. The Lesser General Public License permits more lax criteria for linking other code with the library.

We call this license the "Lesser" General Public License because it does Less to protect the user's freedom than the ordinary General Public License. It also provides other free software developers Less of an advantage over competing non-free programs. These disadvantages are the reason we use the ordinary General Public License for many libraries. However, the Lesser license provides advantages in certain special circumstances.

For example, on rare occasions, there may be a special need to encourage the widest possible use of a certain library, so that it becomes a de-facto standard. To achieve this, non-free programs must be allowed to use the library. A more frequent case is that a free library does the same job as widely used non-free libraries. In this case, there is little to gain by limiting the free library to free software only, so we use the Lesser General Public License. In other cases, permission to use a particular library in non-free programs enables a greater number of people to use a large body of free software. For example, permission to use the GNU C Library in non-free programs enables many more people to use the whole GNU operating system, as well as its variant, the GNU/Linux operating system.

Although the Lesser General Public License is Less protective of the users' freedom, it does ensure that the user of a program that is linked with the Library has the freedom and the wherewithal to run that program using a modified version of the Library.

The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a "work based on the library" and a "work that uses the library". The former contains code derived from the library, whereas the latter must be combined with the library in order to run.

GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION

  1. This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also called "this License").

Each licensee is addressed as "you".

A "library" means a collection of software functions and/or data prepared so as to be conveniently linked with application programs (which use some of those functions and data) to form executables. The "Library", below, refers to any such software library or work which has been distributed under these terms. A "work based on the Library" means either the Library or any derivative work under copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another language. (Hereinafter, translation is included without limitation in the term "modification".)

"Source code" for a work means the preferred form of the work for making modifications to it. For a library, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the library. Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running a program using the Library is not restricted, and output from such a program is covered only if its contents constitute a work based on the Library (independent of the use of the Library in a tool for writing it). Whether that is true depends on what the Library does and what the program that uses the Library does.

  1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and distribute a copy of this License along with the Library. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.

  2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) The modified work must itself be a software library. b) You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change. c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License. d) If a facility in the modified Library refers to a function or a table of data to be supplied

by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, in the event an application does not supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful. (For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application. Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Library, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Library, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote

it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library. In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.

  1. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinary GNU General Public License, version 2, instead of to this License. (If a newer version than version 2 of the ordinary GNU General Public License has appeared, then you can specify that version instead if you wish.) Do not make any other change in these notices. Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy. This option is useful when you wish to copy part of the code of the Library into a program that is not a library.

  2. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange. If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not

compelled to copy the source along with the object code.

  1. A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being compiled or linked with it, is called a "work that uses the Library". Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License.

However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than a "work that uses the library". The executable is therefore covered by this License. Section 6 states terms for distribution of such executables. When a "work that uses the Library" uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially significant if the work can be linked without the Library, or if the work is itself a library. The threshold for this to be true is not precisely defined by law. If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines or less in length), then the use of the object file is unrestricted, regardless of whether it is legally a derivative work. (Executables containing this object code plus portions of the Library will still fall under Section 6.) Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the terms of Section 6. Any executables containing that work also fall under Section 6, whether or not they are linked directly with the Library itself.

  1. As an exception to the Sections above, you may also combine or link a "work that uses the Library" with the Library to produce a work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms permit modification of the work for the customer's own use and reverse engineering for debugging such modifications. You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this License. You must supply a copy of this License. If the work during execution displays copyright notices, you must include the copyright notice for the Library among them, as well as a reference directing the user to the copy of this License. Also, you must do one of these things: a) Accompany the work with the complete corresponding

machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete machine-readable "work that uses the Library", as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library. (It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions.) b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a

copy of the library already present on the user's computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was made with. c) Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution. d) If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy the above specified materials from the same place. e) Verify that the user has already received a copy of these materials or that you have already sent this user a copy. For an executable, the required form of the "work that uses the Library" must include any data and utility programs needed for reproducing the executable from it. However, as a special exception, the materials to be distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.

It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system. Such a contradiction means you cannot use both them and the Library together in an executable that you distribute.

  1. You may place library facilities that are a work based on the Library side-by-side in a single library together with other library facilities not covered by this License, and distribute such a combined library, provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted, and provided that you do these two things: a) Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities. This must be distributed under the terms of the Sections above. b) Give prominent notice with the combined library of the fact that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work.

  2. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.

  3. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Library or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Library (or any work based on the Library), you indicate your acceptance of this License to do so, and all its

terms and conditions for copying, distributing or modifying the Library or works based on it.

  1. Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a license from the original licensor to copy, distribute, link with or modify the Library subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties with this License.

  2. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Library at all. For example, if a patent license would not permit royalty-free redistribution of the Library by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to

refrain entirely from distribution of the Library. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.

  1. If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License.

  2. The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Library specifies a version number of this License which applies to it and "any later

version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Library does not specify a license version number, you may choose any version ever published by the Free Software Foundation.

  1. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing

and reuse of software generally.

NO WARRANTY

  1. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

  2. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCHDAMAGES.

END OF TERMS AND CONDITIONS.

This Product includes Linux Kernel 2.6.24.4, uboot 1.1.2, cups 1.1.23, busybox 1.1.1, dhcpd 1.3.22-p14, fuse 2.7.0, gphoto2 2.4.0, gphotofs 0.4.0, ipkg 0.99.163, libeeprog, libiconv 1.11, libid3tag 0.15.1b, libol 0.3.16, lm-sensors 2.10.0, mdadm 2.6.2, mt-daapd svn-1586, mtd-utils 1.0.0, ntfs-3g 1.71, pciutils

2.2.4, quotatool 1.4.9, reiserfsprogs 3.6.19, samba 3.0.25b, sg3_utils 1.25, syslog-ng 1.6.8, upnpigdctrl 0.01, dar 2.3.6 ez-ipupdate 3.0.10, inadyn 1.96.2, aMule 2.2.3, Glib 2.18.3, pango 1.22.4, pkg-config 0.23, gallery 2.3, nfs-utils 1.1.4, mysql 5.1.30, phpMyAdmin 3.1.1, smartmontools 5.38, squeezeboxserver 7.4.1, WordPress 2.7, Audio-Scan 0.44, DBD-mysql 4.011, DBI 1.608, flac 1.2.1, PERL 5.8.8, AutoXS-Header 1.02, Class-C3-XS 0.11, Class-XSAccessor 1.03, Class-XSAccessor-Array 1.04, Compress-Raw-Zlib 2.017, Digest-SHA1 2.11, EV 3.8, ExtUtils-Cbuilder 0.24, GD 2.41, HTML-Parser 3.60, JSON-XS 2.232, Module-Build 0.31012, Sub-Name 0.04, Template-Toolkit 2.21 and XML-Parser 2.36 software under GPL 2.0 license.

GNU GENERAL PUBLIC LICENSE

Version 2, June 1991

Copyright (C) 1989, 1991 Free Software Foundation, Inc.

59 Temple Place - Suite 330, Boston, MA 02111-1307, USA

Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.

Preamble

The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too.

When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things.

To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate

to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights.

We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations.

Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all.

The precise terms and conditions for copying, distribution and modification follow.

TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION

  1. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program" means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term "modification".) Each licensee is addressed as "you". Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does.

  2. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.

  3. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions:

a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change.

b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License.

c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.)

These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program. In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.

  1. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following:

a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,

b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code,

to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.) The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the

scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code.

  1. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.

  2. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it.

  3. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License.

  4. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this

License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.

  1. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License.

  2. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation.

  3. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.

NO WARRANTY

  1. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.

EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

  1. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

END OF TERMS AND CONDITIONS

All other trademarks or trade names mentioned herein, if any, are the property of their respective owners.

This Product includes mediainfo-0.7.27 software under below license

MediaInfo(Lib) License

Version 1.1, 3 January 2010

Copyright 2002-2010 MediaArea.net SARL. All rights reserved.

Redistribution and use in source and binary forms, without modification, are permitted provided that the following conditions are met:

  1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

  2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

Redistribution and use in source and binary forms, with modification, are permitted provided that the GNU Lesser General Public

License as published by the Free Software Foundation, either version 3 of the License, or any later version is met.

Dynamic or static linking to this software are not deemed a modification.

THIS SOFTWARE IS PROVIDED BY MEDIAAREA.NET SARL ``AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL MEDIAAREA.NET OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

GNU LESSER GENERAL PUBLIC LICENSE

Version 3, 29 June 2007

Copyright (C) 2007 Free Software Foundation, Inc. http://fsf.org/

Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.

This version of the GNU Lesser General Public License incorporates the terms and conditions of version 3 of the GNU General Public License, supplemented by the additional permissions listed below.

  1. Additional Definitions.

As used herein, “this License” refers to version 3 of the GNU Lesser General Public License, and the “GNU GPL” refers to version 3 of the GNU General Public License.

"The Library" refers to a covered work governed by this License, other than an Application or a Combined Work as defined below.

An “Application” is any work that makes use of an interface provided by the Library, but which is not otherwise based on the Library. Defining a subclass of a class defined by the Library is deemed a mode of using an interface provided by the Library.

A “Combined Work” is a work produced by combining or linking an Application with the Library. The particular version of the Library with which the Combined Work was made is also called the “Linked Version”.

The “Minimal Corresponding Source” for a Combined Work means the Corresponding Source for the Combined Work, excluding any source code for portions of the Combined Work that, considered in isolation, are based on the Application, and not on the Linked Version.

The “Corresponding Application Code” for a Combined Work means the object code and/or source code for the Application, including any data and utility programs needed for reproducing the Combined Work from the Application, but excluding the System Libraries of the Combined Work.

  1. Exception to Section 3 of the GNU GPL.

You may convey a covered work under sections 3 and 4 of this License without being bound by section 3 of the GNU GPL.

  1. Conveying Modified Versions.

If you modify a copy of the Library, and, in your modifications, a facility refers to a function or data to be supplied by an Application that uses the facility (other than as an argument passed when the facility is invoked), then you may convey a copy of the modified version:

- a) under this License, provided that you make a good faith effort to ensure that, in the event an Application does not supply the function or data, the facility still operates, and performs whatever part of its purpose remains meaningful, or

- b) under the GNU GPL, with none of the additional permissions of this License applicable to that copy.

  1. Object Code Incorporating Material from Library Header Files.

The object code form of an Application may incorporate material from a header file that is part of the Library. You may convey such object code under terms of your choice, provided that, if the incorporated material is not limited to numerical parameters, data structure layouts and accessors, or small macros, inline functions and templates (ten or fewer lines in length), you do both of the following:

  • a) Give prominent notice with each copy of the object code that the Library is used in it and that the Library and its use are covered by this License.
  • b) Accompany the object code with a copy of the GNU GPL and this license document.

  • Combined Works.

You may convey a Combined Work under terms of your choice that, taken together, effectively do not restrict modification of the portions of the Library contained in the Combined Work and reverse engineering for debugging such modifications, if you also do each of the following:

- a) Give prominent notice with each copy of the Combined Work that the Library is used in it and that the Library and its use are covered by this License.

- b) Accompany the Combined Work with a copy of the GNU GPL and this license document.

•c) For a Combined Work that displays copyright notices during execution, include the copyright notice for the Library among these notices, as well as a reference directing the user to the copies of the GNU GPL and this license document.

•d) Do one of the following:

o0) Convey the Minimal Corresponding Source under the terms of this License, and the Corresponding Application Code in a form suitable for, and under terms that permit, the user to recombine or relink the Application with a modified version of the Linked Version to produce a modified Combined Work, in the manner specified by section 6 of the GNU GPL for conveying Corresponding Source.

o1) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (a) uses at run time a copy of the Library already present on the user's computer system, and (b) will operate properly with a modified version of the Library that is interface-compatible with the Linked Version.

- e) Provide Installation Information, but only if you would otherwise be required to provide such information under section 6 of the GNU GPL, and only to the extent that such information is necessary to install and execute a modified version of the Combined Work produced by recombining or relinking the Application with a modified version of the Linked Version. (If you use option 4d0, the Installation Information must accompany the Minimal Corresponding Source and Corresponding Application Code. If you use option 4d1, you must provide the Installation Information in the manner specified by section 6 of the GNU GPL for conveying Corresponding Source.)

5. Combined Libraries.

You may place library facilities that are a work based on the Library side by side in a single library together with other library facilities that are not Applications and are not covered by this License, and convey such a combined library under terms of your choice, if you do both of the following:

- a) Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities, conveyed under the terms of this License.

- b) Give prominent notice with the combined library that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work.

  1. Revised Versions of the GNU Lesser General Public License.

The Free Software Foundation may publish revised and/or new versions of the GNU Lesser General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.

Each version is given a distinguishing version number. If the Library as you received it specifies that a certain numbered version of the GNU Lesser General Public License “or any later version” applies to it, you have the option of following the terms and conditions either of that published version or of any later version published by the Free Software Foundation. If the Library as you received it does not specify a version number of the GNU Lesser General Public License, you may choose any version of the GNU Lesser General Public License ever published by the Free Software Foundation.

If the Library as you received it specifies that a proxy can decide whether future versions of the GNU Lesser General Public License shall apply, that proxy's public statement of acceptance of any version is permanent authorization for you to choose that version for the Library.

GNU GENERAL PUBLIC LICENSE

Version 3, 29 June 2007

Copyright (C) 2007 Free Software Foundation, Inc. http://fsf.org/

Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.

Preamble

The GNU General Public License is a free, copyleft license for software and other kinds of works.

The licenses for most software and other practical works are designed to take away your freedom to share and change the works. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change all versions of a program--to make sure it remains free software for all its users. We, the Free Software Foundation, use the GNU General Public License for most of our software; it applies also to any other work released this way by its authors. You can apply it to your programs, too.

When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for them if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs, and that you know you can do these things.

To protect your rights, we need to prevent others from denying you these rights or asking you to surrender the rights. Therefore, you have certain responsibilities if you distribute copies of the software, or if you modify it: responsibilities to respect the freedom of others.

For example, if you distribute copies of such a program, whether gratis or for a fee, you must pass on to the recipients the same freedoms that you received. You must make sure that they, too, receive or can get the source code. And you must show them these

terms so they know their rights.

Developers that use the GNU GPL protect your rights with two steps: (1) assert copyright on the software, and (2) offer you this License giving you legal permission to copy, distribute and/or modify it.

For the developers' and authors' protection, the GPL clearly explains that there is no warranty for this free software. For both users' and authors' sake, the GPL requires that modified versions be marked as changed, so that their problems will not be attributed erroneously to authors of previous versions.

Some devices are designed to deny users access to install or run modified versions of the software inside them, although the manufacturer can do so. This is fundamentally incompatible with the aim of protecting users' freedom to change the software. The systematic pattern of such abuse occurs in the area of products for individuals to use, which is precisely where it is most

unacceptable. Therefore, we have designed this version of the GPL to prohibit the practice for those products. If such problems arise substantially in other domains, we stand ready to extend this provision to those domains in future versions of the GPL, as needed to protect the freedom of users.

Finally, every program is threatened constantly by software patents. States should not allow patents to restrict development and use of software on general-purpose computers, but in those that do, we wish to avoid the special danger that patents applied to a free program could make it effectively proprietary. To prevent this, the GPL assures that patents cannot be used to render the program non-free.

The precise terms and conditions for copying, distribution and modification follow.

TERMS AND CONDITIONS

0. Definitions.

"This License" refers to version 3 of the GNU General Public License.

“Copyright” also means copyright-like laws that apply to other kinds of works, such as semiconductor masks.

“The Program” refers to any copyrightable work licensed under this License. Each licensee is addressed as “you”. “Licensees” and “recipients” may be individuals or organizations.

To “modify” a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission, other than the making of an exact copy. The resulting work is called a “modified version” of the earlier work or a work “based on” the earlier work.

A “covered work” means either the unmodified Program or a work based on the Program.

To “propagate” a work means to do anything with it that, without permission, would make you directly or secondarily liable for infringement under applicable copyright law, except executing it on a computer or modifying a private copy. Propagation includes copying, distribution (with or without modification), making available to the public, and in some countries other activities as well. To “convey” a work means any kind of propagation that enables other parties to make or receive copies. Mere interaction with a user through a computer network, with no transfer of a copy, is not conveying.

An interactive user interface displays “Appropriate Legal Notices” to the extent that it includes a convenient and prominently visible feature that (1) displays an appropriate copyright notice, and (2) tells the user that there is no warranty for the work (except to the extent that warranties are provided), that licensees may convey the work under this License, and how to view a copy of this License. If the interface presents a list of user commands or options, such as a menu, a prominent item in the list meets this criterion.

1. Source Code.

The “source code” for a work means the preferred form of the work for making modifications to it. “Object code” means any non-source form of a work.

A “Standard Interface” means an interface that either is an official standard defined by a recognized standards body, or, in the case of interfaces specified for a particular programming language, one that is widely used among developers working in that language.

The “System Libraries” of an executable work include anything, other than the work as a whole, that (a) is included in the normal form of packaging a Major Component, but which is not part of that Major Component, and (b) serves only to enable use of the work with that Major Component, or to implement a Standard Interface for which an implementation is available to the public in source code form. A “Major Component”, in this context, means a major essential component (kernel, window system, and so on)

of the specific operating system (if any) on which the executable work runs, or a compiler used to produce the work, or an object code interpreter used to run it.

The “Corresponding Source” for a work in object code form means all the source code needed to generate, install, and (for an executable work) run the object code and to modify the work, including scripts to control those activities. However, it does not include the work's System Libraries, or general-purpose tools or generally available free programs which are used unmodified in performing those activities but which are not part of the work. For example, Corresponding Source includes interface definition files associated with source files for the work, and the source code for shared libraries and dynamically linked subprograms that the work is specifically designed to require, such as by intimate data communication or control flow between those subprograms and other parts of the work.

The Corresponding Source need not include anything that users can regenerate automatically from other parts of the Corresponding Source.

The Corresponding Source for a work in source code form is that same work.

  1. Basic Permissions.

All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program. The output from running a covered work is covered by this License only if the output, given its content, constitutes a covered work. This License acknowledges your rights of fair use or other equivalent, as provided by copyright law.

You may make, run and propagate covered works that you do not convey, without conditions so long as your license otherwise remains in force. You may convey covered works to others for the sole purpose of having them make modifications exclusively for you, or provide you with facilities for running those works, provided that you comply with the terms of this License in conveying all material for which you do not control copyright. Those thus making or running the covered works for you must do so exclusively on your behalf, under your direction and control, on terms that prohibit them from making any copies of your copyrighted material outside their relationship with you.

Conveying under any other circumstances is permitted solely under the conditions stated below. Sublicensing is not allowed; section 10 makes it unnecessary.

  1. Protecting Users' Legal Rights From Anti-Circumvention Law.

No covered work shall be deemed part of an effective technological measure under any applicable law fulfilling obligations under article 11 of the WIPO copyright treaty adopted on 20 December 1996, or similar laws prohibiting or restricting circumvention of such measures.

When you convey a covered work, you waive any legal power to forbid circumvention of technological measures to the extent such circumvention is effected by exercising rights under this License with respect to the covered work, and you disclaim any intention to limit operation or modification of the work as a means of enforcing, against the work's users, your or third parties' legal rights to forbid circumvention of technological measures.

  1. Conveying Verbatim Copies.

You may convey verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that this License and any non-permissive terms added in accord with section 7 apply to the code; keep intact all notices of the absence of any warranty; and give all recipients a copy of this License along with the Program.

You may charge any price or no price for each copy that you convey, and you may offer support or warranty protection for a fee.

  1. Conveying Modified Source Versions.

You may convey a work based on the Program, or the modifications to produce it from the Program, in the form of source code under the terms of section 4, provided that you also meet all of these conditions:

- a) The work must carry prominent notices stating that you modified it, and giving a relevant date.

  • b) The work must carry prominent notices stating that it is released under this License and any conditions added under section 7. This requirement modifies the requirement in section 4 to “keep intact all notices”.
    •c) You must license the entire work, as a whole, under this License to anyone who comes into possession of a copy. This License will therefore apply, along with any applicable section 7 additional terms, to the whole of the work, and all its parts, regardless of how they are packaged. This License gives no permission to license the work in any other way, but it does not invalidate such permission if you have separately received it.
  • d) If the work has interactive user interfaces, each must display Appropriate Legal Notices; however, if the Program has interactive interfaces that do not display Appropriate Legal Notices, your work need not make them do so.

A compilation of a covered work with other separate and independent works, which are not by their nature extensions of the covered work, and which are not combined with it such as to form a larger program, in or on a volume of a storage or distribution medium, is called an “aggregate” if the compilation and its resulting copyright are not used to limit the access or legal rights of the compilation's users beyond what the individual works permit. Inclusion of a covered work in an aggregate does not cause this License to apply to the other parts of the aggregate.

  1. Conveying Non-Source Forms.

You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways:

  • a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software interchange.
  • b) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by a written offer, valid for at least three years and valid for as long as you offer spare parts or customer support for that product model, to give anyone who possesses the object code either (1) a copy of the Corresponding Source for all the software in the product that is covered by this License, on a durable physical medium customarily used for software interchange, for a price no more than your reasonable cost of physically performing this conveying of source, or (2) access to copy the Corresponding Source from a network server at no charge.
    •c) Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source. This alternative is allowed only occasionally and noncommercially, and only if you received the object code with such an offer, in accord with subsection 6b.
  • d) Convey the object code by offering access from a designated place (gratis or for a charge), and offer equivalent access to the Corresponding Source in the same way through the same place at no further charge. You need not require recipients to copy the Corresponding Source along with the object code. If the place to copy the object code is a network server, the Corresponding Source may be on a different server (operated by you or a third party) that supports equivalent copying facilities, provided you maintain clear directions next to the object code saying where to find the Corresponding Source. Regardless of what server hosts the Corresponding Source, you remain obligated to ensure that it is available for as long as needed to satisfy these requirements.

- e) Convey the object code using peer-to-peer transmission, provided you inform other peers where the object code and Corresponding Source of the work are being offered to the general public at no charge under subsection 6d.

A separable portion of the object code, whose source code is excluded from the Corresponding Source as a System Library, need not be included in conveying the object code work.

A “User Product” is either (1) a “consumer product”, which means any tangible personal property which is normally used for personal, family, or household purposes, or (2) anything designed or sold for incorporation into a dwelling. In determining whether a product is a consumer product, doubtful cases shall be resolved in favor of coverage. For a particular product received by a particular user, “normally used” refers to a typical or common use of that class of product, regardless of the status of the particular user or of the way in which the particular user actually uses, or expects or is expected to use, the product. A product is a consumer product regardless of whether the product has substantial commercial, industrial or non-consumer uses, unless such uses represent the only significant mode of use of the product.

“Installation Information” for a User Product means any methods, procedures, authorization keys, or other information required to install and execute modified versions of a covered work in that User Product from a modified version of its Corresponding Source. The information must suffice to ensure that the continued functioning of the modified object code is in no case prevented or interfered with solely because modification has been made.

If you convey an object code work under this section in, or with, or specifically for use in, a User Product, and the conveying occurs as part of a transaction in which the right of possession and use of the User Product is transferred to the recipient in perpetuity or for a fixed term (regardless of how the transaction is characterized), the Corresponding Source conveyed under this section must be accompanied by the Installation Information. But this requirement does not apply if neither you nor any third party retains the ability to install modified object code on the User Product (for example, the work has been installed in ROM).

The requirement to provide Installation Information does not include a requirement to continue to provide support service, warranty, or updates for a work that has been modified or installed by the recipient, or for the User Product in which it has been modified or installed. Access to a network may be denied when the modification itself materially and adversely affects the operation of the network or violates the rules and protocols for communication across the network.

Corresponding Source conveyed, and Installation Information provided, in accord with this section must be in a format that is publicly documented (and with an implementation available to the public in source code form), and must require no special password or key for unpacking, reading or copying.

  1. Additional Terms.

“Additional permissions” are terms that supplement the terms of this License by making exceptions from one or more of its conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law. If additional permissions apply only to part of the Program, that part may be used separately under those permissions, but the entire Program remains governed by this License without regard to the additional permissions.

When you convey a copy of a covered work, you may at your option remove any additional permissions from that copy, or from any part of it. (Additional permissions may be written to require their own removal in certain cases when you modify the work.) You may place additional permissions on material, added by you to a covered work, for which you have or can give appropriate copyright permission.

Notwithstanding any other provision of this License, for material you add to a covered work, you may (if authorized by the copyright holders of that material) supplement the terms of this License with terms:

- a) Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License; or

- b) Requiring preservation of specified reasonable legal notices or author attributions in that material or in the Appropriate Legal Notices displayed by works containing it; or

•c) Prohibiting misrepresentation of the origin of that material, or requiring that modified versions of such material be marked in reasonable ways as different from the original version; or
- d) Limiting the use for publicity purposes of names of licensors or authors of the material; or
- e) Declining to grant rights under trademark law for use of some trade names, trademarks, or service marks; or
- f) Requiring indemnification of licensors and authors of that material by anyone who conveys the material (or modified versions of it) with contractual assumptions of liability to the recipient, for any liability that these contractual assumptions directly impose on those licensors and authors.

All other non-permissive additional terms are considered “further restrictions” within the meaning of section 10. If the Program as you received it, or any part of it, contains a notice stating that it is governed by this License along with a term that is a further restriction, you may remove that term. If a license document contains a further restriction but permits relicensing or conveying under this License, you may add to a covered work material governed by the terms of that license document, provided that the further restriction does not survive such relicensing or conveying.

If you add terms to a covered work in accord with this section, you must place, in the relevant source files, a statement of the additional terms that apply to those files, or a notice indicating where to find the applicable terms.

Additional terms, permissive or non-permissive, may be stated in the form of a separately written license, or stated as exceptions; the above requirements apply either way.

  1. Termination.

You may not propagate or modify a covered work except as expressly provided under this License. Any attempt otherwise to propagate or modify it is void, and will automatically terminate your rights under this License (including any patent licenses granted under the third paragraph of section 11).

However, if you cease all violation of this License, then your license from a particular copyright holder is reinstated (a) provisionally, unless and until the copyright holder explicitly and finally terminates your license, and (b) permanently, if the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation.

Moreover, your license from a particular copyright holder is reinstated permanently if the copyright holder notifies you of the violation by some reasonable means, this is the first time you have received notice of violation of this License (for any work) from that copyright holder, and you cure the violation prior to 30 days after your receipt of the notice.

Termination of your rights under this section does not terminate the licenses of parties who have received copies or rights from you under this License. If your rights have been terminated and not permanently reinstated, you do not qualify to receive new licenses for the same material under section 10.

  1. Acceptance Not Required for Having Copies.

You are not required to accept this License in order to receive or run a copy of the Program. Ancillary propagation of a covered work occurring solely as a consequence of using peer-to-peer transmission to receive a copy likewise does not require acceptance. However, nothing other than this License grants you permission to propagate or modify any covered work. These actions infringe copyright if you do not accept this License. Therefore, by modifying or propagating a covered work, you indicate your acceptance of this License to do so.

  1. Automatic Licensing of Downstream Recipients.

Each time you convey a covered work, the recipient automatically receives a license from the original licensors, to run, modify and propagate that work, subject to this License. You are not responsible for enforcing compliance by third parties with this License.

An “entity transaction” is a transaction transferring control of an organization, or substantially all assets of one, or subdividing an organization, or merging organizations. If propagation of a covered work results from an entity transaction, each party to that transaction who receives a copy of the work also receives whatever licenses to the work the party's predecessor in interest had or

could give under the previous paragraph, plus a right to possession of the Corresponding Source of the work from the predecessor in interest, if the predecessor has it or can get it with reasonable efforts.

You may not impose any further restrictions on the exercise of the rights granted or affirmed under this License. For example, you may not impose a license fee, royalty, or other charge for exercise of rights granted under this License, and you may not initiate litigation (including a cross-claim or counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or any portion of it.

  1. Patents.

A “contributor” is a copyright holder who authorizes use under this License of the Program or a work on which the Program is based. The work thus licensed is called the contributor's “contributor version”.

A contributor's “essential patent claims” are all patent claims owned or controlled by the contributor, whether already acquired or hereafter acquired, that would be infringed by some manner, permitted by this License, of making, using, or selling its contributor version, but do not include claims that would be infringed only as a consequence of further modification of the contributor version. For purposes of this definition, “control” includes the right to grant patent sublicenses in a manner consistent with the requirements of this License.

Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributor's essential patent claims, to make, use, sell, offer for sale, import and otherwise run, modify and propagate the contents of its contributor version. In the following three paragraphs, a “patent license” is any express agreement or commitment, however denominated, not to enforce a patent (such as an express permission to practice a patent or covenant not to sue for patent infringement). To “grant” such a patent license to a party means to make such an agreement or commitment not to enforce a patent against the party.

If you convey a covered work, knowingly relying on a patent license, and the Corresponding Source of the work is not available for anyone to copy, free of charge and under the terms of this License, through a publicly available network server or other readily accessible means, then you must either (1) cause the Corresponding Source to be so available, or (2) arrange to deprive yourself of the benefit of the patent license for this particular work, or (3) arrange, in a manner consistent with the requirements of this License, to extend the patent license to downstream recipients. “Knowingly relying” means you have actual knowledge that, but for the patent license, your conveying the covered work in a country, or your recipient's use of the covered work in a country, would infringe one or more identifiable patents in that country that you have reason to believe are valid.

If, pursuant to or in connection with a single transaction or arrangement, you convey, or propagate by procuring conveyance of, a covered work, and grant a patent license to some of the parties receiving the covered work authorizing them to use, propagate, modify or convey a specific copy of the covered work, then the patent license you grant is automatically extended to all recipients of the covered work and works based on it.

A patent license is “discriminatory” if it does not include within the scope of its coverage, prohibits the exercise of, or is conditioned on the non-exercise of one or more of the rights that are specifically granted under this License. You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software, under which you make payment to the third party based on the extent of your activity of conveying the work, and under which the third party grants, to any of the parties who would receive the covered work from you, a discriminatory patent license (a) in connection with copies of the covered work conveyed by you (or copies made from those copies), or (b) primarily for and in connection with specific products or compilations that contain the covered work, unless you entered into that arrangement, or that patent license was granted, prior to 28 March 2007.

Nothing in this License shall be construed as excluding or limiting any implied license or other defenses to infringement that may otherwise be available to you under applicable patent law.

  1. No Surrender of Others' Freedom.

If conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot convey a covered work so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not convey it at all. For example, if you agree to terms that obligate you to collect a royalty for further conveying from those to whom you convey the Program, the only way you could satisfy both those terms and this License would be to refrain entirely from conveying the Program.

  1. Use with the GNU Affero General Public License.

Notwithstanding any other provision of this License, you have permission to link or combine any covered work with a work licensed under version 3 of the GNU Affero General Public License into a single combined work, and to convey the resulting work. The terms of this License will continue to apply to the part which is the covered work, but the special requirements of the GNU Affero General Public License, section 13, concerning interaction through a network will apply to the combination as such. 14. Revised Versions of this License.

The Free Software Foundation may publish revised and/or new versions of the GNU General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies that a certain numbered version of the GNU General Public License “or any later version” applies to it, you have the option of following the terms and conditions either of that numbered version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of the GNU General Public License, you may choose any version ever published by the Free Software Foundation. If the Program specifies that a proxy can decide which future versions of the GNU General Public License can be used, that proxy's public statement of acceptance of a version permanently authorizes you to choose that version for the Program. Later license versions may give you additional or different permissions. However, no additional obligations are imposed on any author or copyright holder as a result of your choosing to follow a later version.

  1. Disclaimer of Warranty.

THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

  1. Limitation of Liability.

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

  1. Interpretation of Sections 15 and 16.

If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to their terms, reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in connection with the Program, unless a warranty or assumption of liability accompanies a copy of the Program in return for a fee.

This Product includes rsync 3.0.0 software under GPL 3.0 license

GNU GENERAL PUBLIC LICENSE

Version 3, 29 June 2007

Copyright © 2007 Free Software Foundation, Inc. http://fsf.org/

Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.

Preamble

The GNU General Public License is a free, copyleft license for software and other kinds of works.

The licenses for most software and other practical works are designed to take away your freedom to share and change the works. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change all versions of a program--to make sure it remains free software for all its users. We, the Free Software Foundation, use the GNU General Public License for most of our software; it applies also to any other work released this way by its authors. You can apply it to your programs, too.

When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for them if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs, and that you know you can do these things.

To protect your rights, we need to prevent others from denying you these rights or asking you to surrender the rights. Therefore, you have certain responsibilities if you distribute copies of the software, or if you modify it: responsibilities to respect the freedom of others.

For example, if you distribute copies of such a program, whether gratis or for a fee, you must pass on to the recipients the same freedoms that you received. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights.

Developers that use the GNU GPL protect your rights with two steps: (1) assert copyright on the software, and (2) offer you this License giving you legal permission to copy, distribute and/or modify it.

For the developers' and authors' protection, the GPL clearly explains that there is no warranty for this free software. For both users' and authors' sake, the GPL requires that modified versions be marked as changed, so that their problems will not be attributed erroneously to authors of previous versions.

Some devices are designed to deny users access to install or run modified versions of the software inside them, although the manufacturer can do so. This is fundamentally incompatible with the aim of protecting users' freedom to change the software. The systematic pattern of such abuse occurs in the area of products for individuals to use, which is precisely where it is most unacceptable. Therefore, we have designed this version of the GPL to prohibit the practice for those products. If such problems arise substantially in other domains, we stand ready to extend this provision to those domains in future versions of the GPL, as needed to protect the freedom of users.

Finally, every program is threatened constantly by software patents. States should not allow patents to restrict development and use of software on general-purpose computers, but in those that do, we wish to avoid the special danger that patents applied to a free program could make it effectively proprietary. To prevent this, the GPL assures that patents cannot be used to render the program non-free.

The precise terms and conditions for copying, distribution and modification follow.

TERMS AND CONDITIONS

0. Definitions.

"This License" refers to version 3 of the GNU General Public License.

"Copyright" also means copyright-like laws that apply to other kinds of works, such as semiconductor masks.

"The Program" refers to any copyrightable work licensed under this License. Each licensee is addressed as "you". "Licensees" and "recipients" may be individuals or organizations.

To “modify” a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission, other than the making of an exact copy. The resulting work is called a “modified version” of the earlier work or a work “based on” the earlier work.

A “covered work” means either the unmodified Program or a work based on the Program.

To “propagate” a work means to do anything with it that, without permission, would make you directly or secondarily liable for infringement under applicable copyright law, except executing it on a computer or modifying a private copy. Propagation includes copying, distribution (with or without modification), making available to the public, and in some countries other activities as well.

To “convey” a work means any kind of propagation that enables other parties to make or receive copies. Mere interaction with a user through a computer network, with no transfer of a copy, is not conveying.

An interactive user interface displays “Appropriate Legal Notices” to the extent that it includes a convenient and prominently visible feature that (1) displays an appropriate copyright notice, and (2) tells the user that there is no warranty for the work (except to the extent that warranties are provided), that licensees may convey the work under this License, and how to view a copy of this License. If the interface presents a list of user commands or options, such as a menu, a prominent item in the list meets this criterion.

1. Source Code.

The “source code” for a work means the preferred form of the work for making modifications to it. “Object code” means any non-source form of a work.

A “Standard Interface” means an interface that either is an official standard defined by a recognized standards body, or, in the case of interfaces specified for a particular programming language, one that is widely used among developers working in that language.

The “System Libraries” of an executable work include anything, other than the work as a whole, that (a) is included in the normal form of packaging a Major Component, but which is not part of that Major Component, and (b) serves only to enable use of the work with that Major Component, or to implement a Standard Interface for which an implementation is available to the public in source code form. A “Major Component”, in this context, means a major essential component (kernel, window system, and so on) of the specific operating system (if any) on which the executable work runs, or a compiler used to produce the work, or an object code interpreter used to run it.

The “Corresponding Source” for a work in object code form means all the source code needed to generate, install, and (for an executable work) run the object code and to modify the work, including scripts to control those activities. However, it does not include the work's System Libraries, or general-purpose tools or generally available free programs which are used unmodified in performing those activities but which are not part of the work. For example, Corresponding Source includes interface definition files associated with source files for the work, and the source code for shared libraries and dynamically linked subprograms that the work is specifically designed to require, such as by intimate data communication or control flow between those subprograms and other parts of the work.

The Corresponding Source need not include anything that users can regenerate automatically from other parts of the Corresponding Source.

The Corresponding Source for a work in source code form is that same work.

2. Basic Permissions.

All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program. The output from running a covered work is covered by this License only if the output, given its content, constitutes a covered work. This License acknowledges your rights of fair use or other equivalent, as provided by copyright law.

You may make, run and propagate covered works that you do not convey, without conditions so long as your license otherwise remains in force. You may convey covered works to others for the sole purpose of having them make modifications exclusively for you, or provide you with facilities for running those works, provided that you comply with the terms of this License in conveying all material for which you do not control copyright. Those thus making or running the covered works for you must do so exclusively on your behalf, under your direction and control, on terms that prohibit them from making any copies of your copyrighted material outside their relationship with you.

Conveying under any other circumstances is permitted solely under the conditions stated below. Sublicensing is not allowed; section 10 makes it unnecessary.

No covered work shall be deemed part of an effective technological measure under any applicable law fulfilling obligations under article 11 of the WIPO copyright treaty adopted on 20 December 1996, or similar laws prohibiting or restricting circumvention of such measures.

When you convey a covered work, you waive any legal power to forbid circumvention of technological measures to the extent such circumvention is effected by exercising rights under this License with respect to the covered work, and you disclaim any intention to limit operation or modification of the work as a means of enforcing, against the work's users, your or third parties' legal rights to forbid circumvention of technological measures.

4. Conveying Verbatim Copies.

You may convey verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that this License and any non-permissive terms added in accord with section 7 apply to the code; keep intact all notices of the absence of any warranty; and give all recipients a copy of this License along with the Program.

You may charge any price or no price for each copy that you convey, and you may offer support or warranty protection for a fee.

5. Conveying Modified Source Versions.

You may convey a work based on the Program, or the modifications to produce it from the Program, in the form of source code under the terms of section 4, provided that you also meet all of these conditions:

  • a) The work must carry prominent notices stating that you modified it, and giving a relevant date.
  • b) The work must carry prominent notices stating that it is released under this License and any conditions added under section 7. This requirement modifies the requirement in section 4 to “keep intact all notices”.
    •c) You must license the entire work, as a whole, under this License to anyone who comes into possession of a copy. This License will therefore apply, along with any applicable section 7 additional terms, to the whole of the work, and all its parts, regardless of how they are packaged. This License gives no permission to license the work in any other way, but it does not invalidate such permission if you have separately received it.
  • d) If the work has interactive user interfaces, each must display Appropriate Legal Notices; however, if the Program has interactive interfaces that do not display Appropriate Legal Notices, your work need not make them do so.

A compilation of a covered work with other separate and independent works, which are not by their nature extensions of the covered work, and which are not combined with it such as to form a larger program, in or on a volume of a storage or distribution medium, is called an “aggregate” if the compilation and its resulting copyright are not used to limit the access or legal rights of the compilation's users beyond what the individual works permit. Inclusion of a covered work in an aggregate does not cause this License to apply to the other parts of the aggregate.

6. Conveying Non-Source Forms.

You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways:

  • a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software interchange.
  • b) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by a written offer, valid for at least three years and valid for as long as you offer spare parts or customer support for that product model, to give anyone who possesses the object code either (1) a copy of the Corresponding Source for all the software in the product that is covered by this License, on a durable physical medium customarily used for software interchange, for a price no more than your reasonable cost of physically performing this conveying of source, or (2) access to copy the Corresponding Source from a network server at no charge.

•c) Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source. This alternative is allowed only occasionally and noncommercially, and only if you received the object code with such an offer, in accord with subsection 6b.
- d) Convey the object code by offering access from a designated place (gratis or for a charge), and offer equivalent access to the Corresponding Source in the same way through the same place at no further charge. You need not require recipients to copy the Corresponding Source along with the object code. If the place to copy the object code is a network server, the Corresponding Source may be on a different server (operated by you or a third party) that supports equivalent copying facilities, provided you maintain clear directions next to the object code saying where to find the Corresponding Source. Regardless of what server hosts the Corresponding Source, you remain obligated to ensure that it is available for as long as needed to satisfy these requirements.
- e) Convey the object code using peer-to-peer transmission, provided you inform other peers where the object code and Corresponding Source of the work are being offered to the general public at no charge under subsection 6d.

A separable portion of the object code, whose source code is excluded from the Corresponding Source as a System Library, need not be included in conveying the object code work.

A “User Product” is either (1) a “consumer product”, which means any tangible personal property which is normally used for personal, family, or household purposes, or (2) anything designed or sold for incorporation into a dwelling. In determining whether a product is a consumer product, doubtful cases shall be resolved in favor of coverage. For a particular product received by a particular user, “normally used” refers to a typical or common use of that class of product, regardless of the status of the particular user or of the way in which the particular user actually uses, or expects or is expected to use, the product. A product is a consumer product regardless of whether the product has substantial commercial, industrial or non-consumer uses, unless such uses represent the only significant mode of use of the product.

"Installation Information" for a User Product means any methods, procedures, authorization keys, or other information required to install and execute modified versions of a covered work in that User Product from a modified version of its Corresponding Source. The information must suffice to ensure that the continued functioning of the modified object code is in no case prevented or interfered with solely because modification has been made.

If you convey an object code work under this section in, or with, or specifically for use in, a User Product, and the conveying occurs as part of a transaction in which the right of possession and use of the User Product is transferred to the recipient in perpetuity or for a fixed term (regardless of how the transaction is characterized), the Corresponding Source conveyed under this section must be accompanied by the Installation Information. But this requirement does not apply

if neither you nor any third party retains the ability to install modified object code on the User Product (for example, the work has been installed in ROM).

The requirement to provide Installation Information does not include a requirement to continue to provide support service, warranty, or updates for a work that has been modified or installed by the recipient, or for the User Product in which it has been modified or installed. Access to a network may be denied when the modification itself materially and adversely affects the operation of the network or violates the rules and protocols for communication across the network.

Corresponding Source conveyed, and Installation Information provided, in accord with this section must be in a format that is publicly documented (and with an implementation available to the public in source code form), and must require no special password or key for unpacking, reading or copying.

7. Additional Terms.

"Additional permissions" are terms that supplement the terms of this License by making exceptions from one or more of its conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law. If additional permissions apply only to part of the Program, that part may be used separately under those permissions, but the entire Program remains governed by this License without regard to the additional permissions.

When you convey a copy of a covered work, you may at your option remove any additional permissions from that copy, or from any part of it. (Additional permissions may be written to require their own removal in certain cases when you modify the work.) You may place additional permissions on material, added by you to a covered work, for which you have or can give appropriate copyright permission.

Notwithstanding any other provision of this License, for material you add to a covered work, you may (if authorized by the copyright holders of that material) supplement the terms of this License with terms:

  • a) Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License; or
  • b) Requiring preservation of specified reasonable legal notices or author attributions in that material or in the Appropriate Legal Notices displayed by works containing it; or
    •c) Prohibiting misrepresentation of the origin of that material, or requiring that modified versions of such material be marked in reasonable ways as different from the original version; or
  • d) Limiting the use for publicity purposes of names of licensors or authors of the material; or

  • e) Declining to grant rights under trademark law for use of some trade names, trademarks, or service marks; or

  • f) Requiring indemnification of licensors and authors of that material by anyone who conveys the material (or modified versions of it) with contractual assumptions of liability to the recipient, for any liability that these contractual assumptions directly impose on those licensors and authors.

All other non-permissive additional terms are considered “further restrictions” within the meaning of section 10. If the Program as you received it, or any part of it, contains a notice stating that it is governed by this License along with a term that is a further restriction, you may remove that term. If a license document contains a further restriction but permits relicensing or conveying under this License, you may add to a covered work material governed by the terms of that license document, provided that the further restriction does not survive such relicensing or conveying.

If you add terms to a covered work in accord with this section, you must place, in the relevant source files, a statement of the additional terms that apply to those files, or a notice indicating where to find the applicable terms.

Additional terms, permissive or non-permissive, may be stated in the form of a separately written license, or stated as exceptions; the above requirements apply either way.

8. Termination.

You may not propagate or modify a covered work except as expressly provided under this License. Any attempt otherwise to propagate or modify it is void, and will automatically terminate your rights under this License (including any patent licenses granted under the third paragraph of section 11).

However, if you cease all violation of this License, then your license from a particular copyright holder is reinstated (a) provisionally, unless and until the copyright holder explicitly and finally terminates your license, and (b) permanently, if the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation.

Moreover, your license from a particular copyright holder is reinstated permanently if the copyright holder notifies you of the violation by some reasonable means, this is the first time you have received notice of violation of this License (for any work) from that copyright holder, and you cure the violation prior to 30 days after your receipt of the notice.

Termination of your rights under this section does not terminate the licenses of parties who have received copies or rights from you under this License. If your rights have been terminated and not permanently reinstated, you do not qualify to receive new licenses for the same material under section 10.

9. Acceptance Not Required for Having Copies.

You are not required to accept this License in order to receive or run a copy of the Program. Ancillary propagation of a covered work occurring solely as a consequence of using peer-to-peer transmission to receive a copy likewise does not require acceptance. However, nothing other than this License grants you permission to propagate or modify any covered work. These actions infringe copyright if you do not accept this License. Therefore, by modifying or propagating a covered work, you indicate your acceptance of this License to do so.

10. Automatic Licensing of Downstream Recipients.

Each time you convey a covered work, the recipient automatically receives a license from the original licensors, to run, modify and propagate that work, subject to this License. You are not responsible for enforcing compliance by third parties with this License.

An “entity transaction” is a transaction transferring control of an organization, or substantially all assets of one, or subdividing an organization, or merging organizations. If propagation of a covered work results from an entity transaction, each party to that transaction who receives a copy of the work also receives whatever licenses to the work the party's predecessor in interest had or could give under the previous paragraph, plus a right to possession of the Corresponding Source of the work from the predecessor in interest, if the predecessor has it or can get it with reasonable efforts.

You may not impose any further restrictions on the exercise of the rights granted or affirmed under this License. For example, you may not impose a license fee, royalty, or other charge for exercise of rights granted under this License, and you may not initiate litigation (including a cross-claim or counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or any portion of it.

11. Patents.

A “contributor” is a copyright holder who authorizes use under this License of the Program or a work on which the Program is based. The work thus licensed is called the contributor's “contributor version”.

A contributor's “essential patent claims” are all patent claims owned or controlled by the contributor, whether already acquired or hereafter acquired, that would be infringed by some manner, permitted by this License, of making, using, or selling its contributor version, but do not include claims that would be infringed only as a consequence of further modification of the contributor version. For purposes of this definition, “control” includes the right to grant patent sublicenses in a manner consistent with the requirements of this License.

Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributor's essential patent claims, to make, use, sell, offer for sale, import and otherwise run, modify and propagate the contents of its contributor version.

In the following three paragraphs, a “patent license” is any express agreement or commitment, however denominated, not to enforce a patent (such as an express permission to practice a patent or covenant not to sue for patent infringement). To “grant” such a patent license to a party means to make such an agreement or commitment not to enforce a patent against the party.

If you convey a covered work, knowingly relying on a patent license, and the Corresponding Source of the work is not available for anyone to copy, free of charge and under the terms of this License, through a publicly available network server or other readily accessible means, then you must either (1) cause the Corresponding Source to be so available, or (2) arrange to deprive yourself of the benefit of the patent license for this particular work, or (3) arrange, in a manner consistent with the requirements of this License, to extend the patent license to downstream recipients. “Knowingly relying” means you have actual knowledge that, but for the patent license, your conveying the covered work in a country, or your recipient's use of the covered work in a country, would infringe one or more identifiable patents in that country that you have reason to believe are valid.

If, pursuant to or in connection with a single transaction or arrangement, you convey, or propagate by procuring conveyance of, a covered work, and grant a patent license to some of the parties receiving the covered work authorizing them to use, propagate, modify or convey a specific copy of the covered work, then the patent license you grant is automatically extended to all recipients of the covered work and works based on it.

A patent license is “discriminatory” if it does not include within the scope of its coverage, prohibits the exercise of, or is conditioned on the non-exercise of one or more of the rights that are specifically granted under this License. You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software, under which you make payment to the third party based on the extent of your activity of conveying the work, and under which the third party grants, to any of the parties who would receive the covered work from you, a discriminatory patent license (a) in connection with copies of the covered work conveyed by you (or copies made from those copies), or (b) primarily for and in connection with specific products or compilations that contain the covered work, unless you entered into that arrangement, or that patent license was granted, prior to 28 March 2007.

Nothing in this License shall be construed as excluding or limiting any implied license or other defenses to infringement that may otherwise be available to you under applicable patent law.

12. No Surrender of Others' Freedom.

If conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot convey a covered work so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not convey it at all. For example, if you agree to terms that obligate you to collect a royalty for further conveying from those to whom you convey the Program, the only way you could satisfy both those terms and this License would be to refrain entirely from conveying the Program.

13. Use with the GNU Affero General Public License.

Notwithstanding any other provision of this License, you have permission to link or combine any covered work with a work licensed under version 3 of the GNU Affero General Public License into a single combined work, and to convey the resulting work. The terms of this License will continue to apply to the part which is the covered work, but the special requirements of the GNU Affero General Public License, section 13, concerning interaction through a network will apply to the combination as such.

14. Revised Versions of this License.

The Free Software Foundation may publish revised and/or new versions of the GNU General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.

Each version is given a distinguishing version number. If the Program specifies that a certain numbered version of the GNU General Public License “or any later version” applies to it, you have the option of following the terms and conditions either of that numbered version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of the GNU General Public License, you may choose any version ever published by the Free Software Foundation.

If the Program specifies that a proxy can decide which future versions of the GNU General Public License can be used, that proxy's public statement of acceptance of a version permanently authorizes you to choose that version for the Program.

Later license versions may give you additional or different permissions. However, no additional obligations are imposed on any author or copyright holder as a result of your choosing to follow a later version.

15. Disclaimer of Warranty.

THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE

COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

16. Limitation of Liability.

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

17. Interpretation of Sections 15 and 16.

If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to their terms, reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in connection with the Program, unless a warranty or assumption of liability accompanies a copy of the Program in return for a fee.

END OF TERMS AND CONDITIONS

How to Apply These Terms to Your New Programs

If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms.

To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively state the exclusion of warranty; and each file should have at least the “copyright” line and a pointer to where the full notice is found.

Copyright (C)

This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program. If not, see http://www.gnu.org/licenses/.

Also add information on how to contact you by electronic and paper mail.

If the program does terminal interaction, make it output a short notice like this when it starts in an interactive mode:

Copyright (C)

This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.

This is free software, and you are welcome to redistribute it

under certain conditions; type `show c' for details.

The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of course, your program's commands might be different; for a GUI interface, you would use an "about box".

You should also get your employer (if you work as a programmer) or school, if any, to sign a "copyright disclaimer" for the program, if necessary. For more information on this, and how to apply and follow the GNU GPL, see http://www.gnu.org/licenses/.

The GNU General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it

more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Lesser General Public License instead of this License. But first, please read http://www.gnu.org/philosophy/why-not-lgpl.html.

This Product includes dojo 0.4.3 ,openssl 0.9.7m, libupnp 1.6.6, sg3_utils 1.25, cherrypy 3.1.2 and YAML-Syck 1.05 software under BSD license

BSD

Copyright (c) [dates as appropriate to package]

The Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

Neither the name of the University nor of the Laboratory may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE E ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

This Product includes flac 1.2.1 software under FDL license

GNU Free Documentation License

Version 1.2, November 2002

Copyright (C) 2000,2001,2002 Free Software Foundation, Inc.

51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA

Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.

0. PREAMBLE

The purpose of this License is to make a manual, textbook, or other functional and useful document "free" in the sense of freedom: to assure everyone the effective freedom to copy and redistribute it, with or without modifying it, either commercially or noncommercially. Secondarily, this License preserves for the author and publisher a way

to get credit for their work, while not being considered responsible for modifications made by others. This License is a kind of "copyleft", which means that derivative works of the document must themselves be free in the same sense. It complements the GNU General Public License, which is a copyleft license designed for free software.

We have designed this License in order to use it for manuals for free software, because free software needs free documentation: a free program should come with manuals providing the same freedoms that the software does. But this License is not limited to software manuals; it can be used for any textual work, regardless of subject matter or whether it is published as a printed book. We recommend this License principally for works whose purpose is instruction or reference.

1. APPLICABILITY AND DEFINITIONS

This License applies to any manual or other work, in any medium, that contains a notice placed by the copyright holder saying it can be distributed under the terms of this License. Such a notice grants a world-wide, royalty-free license, unlimited in duration, to use that work under the conditions stated herein. The "Document", below, refers to any such manual or work. Any member of the public is a licensee, and is addressed as "you". You accept the license if you copy, modify or distribute the work in a way requiring permission under copyright law.

A "Modified Version" of the Document means any work containing the Document or a portion of it, either copied verbatim, or with

modifications and/or translated into another language. A "Secondary Section" is a named appendix or a front-matter section of

the Document that deals exclusively with the relationship of the publishers or authors of the Document to the Document's overall subject (or to related matters) and contains nothing that could fall directly within that overall subject. (Thus, if the Document is in part a textbook of mathematics, a Secondary Section may not explain any mathematics.) The relationship could be a matter of historical connection with the subject or with related matters, or of legal, commercial, philosophical, ethical or political position regarding them.

The "Invariant Sections" are certain Secondary Sections whose titles are designated, as being those of Invariant Sections, in the notice that says that the Document is released under this License. If a section does not fit the above definition of Secondary then it is not allowed to be designated as Invariant. The Document may contain zero Invariant Sections. If the Document does not identify any Invariant Sections then there are none. The "Cover Texts" are certain short passages of text that are listed, as Front-Cover Texts or Back-Cover Texts, in the notice that says that the Document is released under this License. A Front-Cover Text may

be at most 5 words, and a Back-Cover Text may be at most 25 words.

A "Transparent" copy of the Document means a machine-readable copy, represented in a format whose specification is available to the general public, that is suitable for revising the document straightforwardly with generic text editors or (for images composed of

pixels) generic paint programs or (for drawings) some widely available drawing editor, and that is suitable for input to text or matters or for automatic translation to a variety of formats suitable for input to text formatters. A copy made in an otherwise Transparent file format whose markup, or absence of markup, has been

arranged to thwart or discourage subsequent modification by readers is not Transparent. An image format is not Transparent if used for any substantial amount of text. A copy that is not "Transparent" is called "Opaque".

Examples of suitable formats for Transparent copies include plain ASCII without markup, Texinfo input format, LaTeX input format, SGML or XML using a publicly available DTD, and standard-conforming simple HTML, PostScript or PDF designed for human modification. Examples of transparent image formats include PNG, XCF and JPG. Opaque formats include proprietary ormats that can be read and edited only by proprietary word processors, SGML or XML for which the DTD and/or processing tools are not generally available, and the machine-generated HTML, PostScript or PDF produced by some word processors for output purposes only.

The "Title Page" means, for a printed book, the title page itself, plus such following pages as are needed to hold, legibly, the material this License requires to appear in the title page. For works in formats which do not have any title page as such, "Title Page" means the text near the most prominent appearance of the work's title, preceding the beginning of the body of the text. A section "Entitled XYZ" means a named subunit of the Document whose title either is precisely XYZ or contains XYZ in parentheses following text that translates XYZ in another language. (Here XYZ stands for a specific section name mentioned below, such as "Acknowledgements", "Dedications", "Endorsements", or "History".) To "Preserve the Title" of such a section when you modify the Document means that it remains a section "Entitled XYZ" according to this definition.

The Document may include Warranty Disclaimers next to the notice which states that this License applies to the Document. These Warranty Disclaimers are considered to be included by reference in this License, but only as regards disclaiming warranties: any other implication that these Warranty Disclaimers may have is void and has no effect on the meaning of this License.

2. VERBATIM COPYING

You may copy and distribute the Document in any medium, either commercially or noncommercially, provided that this License, the copyright notices, and the license notice saying this License applies to the Document are reproduced in all copies, and that you add no other conditions whatsoever to those of this License. You may not use technical measures to obstruct or control the reading or further copying of the copies you make or distribute. However, you may accept

compensation in exchange for copies. If you distribute a large enough number of copies you must also follow the conditions in section 3.

You may also lend copies, under the same conditions stated above, and you may publicly display copies.

3. COPYING IN QUANTITY

If you publish printed copies (or copies in media that commonly have printed covers) of the Document, numbering more than 100, and the Document's license notice requires Cover Texts, you must enclose the copies in covers that carry, clearly and legibly, all these Cover Texts: Front-Cover Texts on the front cover, and Back-Cover Texts on the back cover. Both covers must also clearly and legibly identify you as the publisher of these copies. The front cover must present the full title with all words of the title equally prominent and visible. You may add other material on the covers in addition. Copying with changes limited to the covers, as long as they preserve the title of the Document and satisfy these conditions, can be treated as verbatim copying in other respects.

If the required texts for either cover are too voluminous to fit legibly, you should put the first ones listed (as many as fit reasonably) on the actual cover, and continue the rest onto adjacent pages.

If you publish or distribute Opaque copies of the Document numbering more than 100, you must either include a machine-readable Transparent copy along with each Opaque copy, or state in or with each Opaque copy a computer-network location from which the general network-using public has access to download using public-standard network protocols a complete Transparent copy of the Document, free of added material. If you use the latter option, you must take reasonably prudent steps, when you begin distribution of Opaque copies in quantity, to ensure that this Transparent copy will remain thus accessible at the stated location until at least one year after the last time you distribute an Opaque copy (directly or through your agents or retailers) of that edition to the public.

It is requested, but not required, that you contact the authors of the Document well before redistributing any large number of copies, to give them a chance to provide you with an updated version of the Document.

4. MODIFICATIONS

You may copy and distribute a Modified Version of the Document under the conditions of sections 2 and 3 above, provided that you release the Modified Version under precisely this License, with the Modified Version filling the role of the Document, thus licensing distribution and modification of the Modified Version to whoever possesses a copy of it. In addition, you must do these things in the Modified Version:

A. Use in the Title Page (and on the covers, if any) a title distinct from that of the Document, and from those of previous versions

(which should, if there were any, be listed in the History section of the Document). You may use the same title as a previous version if the original publisher of that version gives permission.

B. List on the Title Page, as authors, one or more persons or entities

responsible for authorship of the modifications in the Modified Version, together with at least five of the principal authors of the

Document (all of its principal authors, if it has fewer than five), unless they release you from this requirement.

C. State on the Title page the name of the publisher of the Modified Version, as the publisher.

D. Preserve all the copyright notices of the Document.

E. Add an appropriate copyright notice for your modifications adjacent to the other copyright notices.

F. Include, immediately after the copyright notices, a license notice giving the public permission to use the Modified Version under the terms of this License, in the form shown in the Addendum below.

G. Preserve in that license notice the full lists of Invariant Sections and required Cover Texts given in the Document's license notice.

H. Include an unaltered copy of this License.

I. Preserve the section Entitled "History", Preserve its Title, and add to it an item stating at least the title, year, new authors, and

publisher of the Modified Version as given on the Title Page. If there is no section Entitled "History" in the Document, create one stating the title, year, authors, and publisher of the Document as given on its Title Page, then add an item describing the Modified Version as stated in the previous sentence.

J. Preserve the network location, if any, given in the Document for public access to a Transparent copy of the Document, and likewise the network locations given in the Document for previous versions it was based on. These may be placed in the "History" section. You may omit a network location for a work that was published at least four years before the Document itself, or if the original publisher of the version it refers to gives permission.

K. For any section Entitled "Acknowledgements" or "Dedications", Preserve the Title of the section, and preserve in the section all

the substance and tone of each of the contributor acknowledgements and/or dedications given therein.

L. Preserve all the Invariant Sections of the Document, unaltered in their text and in their titles. Section numbers

or the equivalent are not considered part of the section titles.

M. Delete any section Entitled "Endorsements". Such a section may not be included in the Modified Version.

N. Do not retitle any existing section to be Entitled "Endorsements" or to conflict in title with any Invariant Section.

O. Preserve any Warranty Disclaimers.

If the Modified Version includes new front-matter sections or appendices that qualify as Secondary Sections and contain no material

copied from the Document, you may at your option designate some or all of these sections as invariant. To do this, add their titles to the list of Invariant Sections in the Modified Version's license notice. These titles must be distinct from any other section titles.

You may add a section Entitled "Endorsements", provided it contains nothing but endorsements of your Modified Version by various parties--for example, statements of peer review or that the text has been approved by an organization as the authoritative definition of a standard.

You may add a passage of up to five words as a Front-Cover Text, and a passage of up to 25 words as a Back-Cover Text, to the end of the list of Cover Texts in the Modified Version. Only one passage of Front-Cover Text and one of Back-Cover Text may be added by (or through arrangements made by) any one entity. If the Document already includes a cover text for the same cover, previously added by you or by arrangement made by the same entity you are acting on behalf of, you may not add another; but you may replace the old one, on explicit permission from the previous publisher that added the old one.

The author(s) and publisher(s) of the Document do not by this License give permission to use their names for publicity for or to assert or imply endorsement of any Modified Version.

5. COMBINING DOCUMENTS

You may combine the Document with other documents released under this License, under the terms defined in section 4 above for modified versions, provided that you include in the combination all of the Invariant Sections of all of the original documents, unmodified, and list them all as Invariant Sections of your combined work in its license notice, and that you preserve all their Warranty Disclaimers.

The combined work need only contain one copy of this License, and multiple identical Invariant Sections may be replaced with a single copy. If there are multiple Invariant Sections with the same name but different contents, make the title of each such section unique by adding at the end of it, in parentheses, the name of the original author or publisher of that section if known, or else a unique number. Make the same adjustment to the section titles in the list of Invariant Sections in the license notice of the combined work.

In the combination, you must combine any sections Entitled "History" in the various original documents, forming one section Entitled "History"; likewise combine any sections Entitled "Acknowledgements", and any sections Entitled "Dedications". You must delete all sections Entitled "Endorsements".

6. COLLECTIONS OF DOCUMENTS

You may make a collection consisting of the Document and other documents released under this License, and replace the individual copies of this License in the various documents with a single copy that is included in the collection, provided that you follow the rules of this License for verbatim copying of each of the documents in all other respects.

You may extract a single document from such a collection, and distribute it individually under this License, provided you insert a copy of this License into the extracted document, and follow this License in all other respects regarding verbatim copying of that document.

7. AGGREGATION WITH INDEPENDENT WORKS

A compilation of the Document or its derivatives with other separate and independent documents or works, in or on a volume of a storage or distribution medium, is called an "aggregate" if the copyright resulting from the compilation is not used to limit the legal rights of the compilation's users beyond what the individual works permit. When the Document is included in an aggregate, this License does not apply to the other works in the aggregate which are not themselves derivative works of the Document.

If the Cover Text requirement of section 3 is applicable to these copies of the Document, then if the Document is less than one half of the entire aggregate, the Document's Cover Texts may be placed on covers that bracket the Document within the aggregate, or the

electronic equivalent of covers if the Document is in electronic form. Otherwise they must appear on printed covers that bracket the whole aggregate.

8. TRANSLATION

Translation is considered a kind of modification, so you may distribute translations of the Document under the terms of section 4.

Replacing Invariant Sections with translations requires special permission from their copyright holders, but you may include

translations of some or all Invariant Sections in addition to the original versions of these Invariant Sections. You may include a

translation of this License, and all the license notices in the Document, and any Warranty Disclaimers, provided that you also include the original English version of this License and the original versions of those notices and disclaimers. In case of a disagreement between the translation and the original version of this License or a notice or disclaimer, the original version will prevail.

If a section in the Document is Entitled "Acknowledgements", "Dedications", or "History", the requirement (section 4) to Preserve

its Title (section 1) will typically require changing the actual title.

9. TERMINATION

You may not copy, modify, sublicense, or distribute the Document except as expressly provided for under this License. Any other attempt to copy, modify, sublicense or distribute the Document is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.

10. FUTURE REVISIONS OF THIS LICENSE

The Free Software Foundation may publish new, revised versions of the GNU Free Documentation License from time to time. Such new versions will be similar in

spirit to the present version, but may differ in detail to address new problems or concerns. See http://www.gnu.org/copyleft/.

Each version of the License is given a distinguishing version number. If the Document specifies that a particular numbered version of this License "or any later version" applies to it, you have the option of following the terms and conditions either of that specified version or of any later version that has been published (not as a draft) by the Free Software Foundation. If the Document does not specify a version number of this License, you may choose any version ever published (not as a draft) by the Free Software Foundation.

ADDENDUM: How to use this License for your documents

To use this License in a document you have written, include a copy of the License in the document and put the following copyright and license notices just after the title page:

Copyright (c) YEAR YOUR NAME.

Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled "GNU

Free Documentation License".

If you have Invariant Sections, Front-Cover Texts and Back-Cover Texts, replace the "with...Texts." line with this:

with the Invariant Sections being LIST THEIR TITLES, with the Front-Cover Texts being LIST, and with the Back-Cover Texts being LIST.

If you have Invariant Sections without Cover Texts, or some other combination of the three, merge those two alternatives to suit the

situation. If your document contains nontrivial examples of program code, we recommend releasing these examples in parallel under your choice of free software license, such as the GNU General Public License, to permit their use in free software.

This Product includes Encode-Detect 1.00 software under MPL 1.1 license

MOZILLA PUBLIC LICENSE

Version 1.1

  1. Definitions.

1.0.1. "Commercial Use" means distribution or otherwise making the Covered Code available to a third party.

1.1. "Contributor" means each entity that creates or contributes to the creation of Modifications.

1.2. "Contributor Version" means the combination of the Original Code, prior Modifications used by a Contributor, and the Modifications made by that particular Contributor.

1.3. "Covered Code" means the Original Code or Modifications or the combination of the Original Code and Modifications, in each case

including portions thereof.

1.4. "Electronic Distribution Mechanism" means a mechanism generally accepted in the software development community for the electronic transfer of data.
1.5. "Executable" means Covered Code in any form other than Source Code.
1.6. "Initial Developer" means the individual or entity identified as the Initial Developer in the Source Code notice required by Exhibit A.
1.7. "Larger Work" means a work which combines Covered Code or portions thereof with code not governed by the terms of this License.
1.8. "License" means this document.
1.8.1. "Licensable" means having the right to grant, to the maximum extent possible, whether at the time of the initial grant or subsequently acquired, any and all of the rights conveyed herein.
1.9. "Modifications" means any addition to or deletion from the substance or structure of either the Original Code or any previous Modifications. When Covered Code is released as a series of files, a

Modification is:

A. Any addition to or deletion from the contents of a file containing Original Code or previous Modifications.

B. Any new file that contains any part of the Original Code or previous Modifications.

1.10. "Original Code" means Source Code of computer software code which is described in the Source Code notice required by Exhibit A as Original Code, and which, at the time of its release under this License is not already Covered Code governed by this License.

1.10.1. "Patent Claims" means any patent claim(s), now owned or hereafter acquired, including without limitation, method, process, and apparatus claims, in any patent Licensable by grantor.

1.11. "Source Code" means the preferred form of the Covered Code for making modifications to it, including all modules it contains, plus any associated interface definition files, scripts used to control compilation and installation of an Executable, or source code differential comparisons against either the Original Code or another well known, available Covered Code of the Contributor's choice. The Source Code can be in a compressed or archival form, provided the appropriate decompression or de-archiving software is widely available for no charge.

1.12. "You" (or "Your") means an individual or a legal entity exercising rights under, and complying with all of the terms of, this License or a future version of this License issued under Section 6.1. For legal entities, "You" includes any entity which controls, is controlled by, or is under common control with You. For purposes of this definition, "control" means (a) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (b) ownership of more than fifty percent (50%) of the outstanding shares or beneficial ownership of such entity.

2. Source Code License.

2.1. The Initial Developer Grant.

The Initial Developer hereby grants You a world-wide, royalty-free, non-exclusive license, subject to third party intellectual property claims:

(a) under intellectual property rights (other than patent or trademark) Licensable by Initial Developer to use, reproduce, modify, display, perform, sublicense and distribute the Original Code (or portions thereof) with or without Modifications, and/or as part of a Larger Work; and

(b) under Patents Claims infringed by the making, using or

selling of Original Code, to make, have made, use, practice, sell, and offer for sale, and/or otherwise dispose of the Original Code (or portions thereof).

(c) the licenses granted in this Section 2.1(a) and (b) are effective on the date Initial Developer first distributes Original Code under the terms of this License.

(d) Notwithstanding Section 2.1(b) above, no patent license is granted: 1) for code that You delete from the Original Code; 2) separate from the Original Code; or 3) for infringements caused by: i) the modification of the Original Code or ii) the combination of the Original Code with other software or devices.

2.2. Contributor Grant.

Subject to third party intellectual property claims, each Contributor hereby grants You a world-wide, royalty-free, non-exclusive license

(a) under intellectual property rights (other than patent or trademark) Licensable by Contributor, to use, reproduce, modify, display, perform, sublicense and distribute the Modifications created by such Contributor (or portions thereof) either on an unmodified basis, with other Modifications, as Covered Code and/or as part of a Larger Work; and

(b) under Patent Claims infringed by the making, using, or selling of Modifications made by that Contributor either alone and/or in combination with its Contributor Version (or portions of such combination), to make, use, sell, offer for sale, have made, and/or otherwise dispose of: 1) Modifications made by that Contributor (or portions thereof); and 2) the combination of Modifications made by that Contributor with its Contributor Version (or portions of such combination).

(c) the licenses granted in Sections 2.2(a) and 2.2(b) are effective on the date Contributor first makes Commercial Use of the Covered Code.

(d) Notwithstanding Section 2.2(b) above, no patent license is granted: 1) for any code that Contributor has deleted from the Contributor Version; 2) separate from the Contributor Version; 3) for infringements caused by: i) third party modifications of Contributor Version or ii) the combination of Modifications made by that Contributor with other software (except as part of the Contributor Version) or other devices; or 4) under Patent Claims infringed by Covered Code in the absence of Modifications made by that Contributor.

  1. Distribution Obligations.

3.1. Application of License.

The Modifications which You create or to which You contribute are governed by the terms of this License, including without limitation Section 2.2. The Source Code version of Covered Code may be distributed only under the terms of this License or a future version of this License released under Section 6.1, and You must include a copy of this License with every copy of the Source Code You distribute. You may not offer or impose any terms on any Source Code version that alters or restricts the applicable version of this License or the recipients' rights hereunder. However, You may include an additional document offering the additional rights described in Section 3.5.

3.2. Availability of Source Code.

Any Modification which You create or to which You contribute must be made available in Source Code form under the terms of this License either on the same media as an Executable version or via an accepted Electronic Distribution Mechanism to anyone to whom you made an Executable version available; and if made available via Electronic Distribution Mechanism, must remain available for at least twelve (12) months after the date it initially became available, or at least six (6) months after a subsequent version of that particular Modification has been made available to such recipients. You are responsible for ensuring that the Source Code version remains available even if the Electronic Distribution Mechanism is maintained by a third party.

3.3. Description of Modifications.

You must cause all Covered Code to which You contribute to contain a file documenting the changes You made to create that Covered Code and the date of any change. You must include a prominent statement that the Modification is derived, directly or indirectly, from Original Code provided by the Initial Developer and including the name of the Initial Developer in (a) the Source Code, and (b) in any notice in an Executable version or related documentation in which You describe the origin or ownership of the Covered Code.

3.4. Intellectual Property Matters

(a) Third Party Claims.

If Contributor has knowledge that a license under a third party's intellectual property rights is required to exercise the rights granted by such Contributor under Sections 2.1 or 2.2, Contributor must include a text file with the Source Code distribution titled "LEGAL" which describes the claim and the party making the claim in sufficient detail that a recipient will know whom to contact. If Contributor obtains such knowledge after the Modification is made available as described in Section 3.2, Contributor shall promptly modify the LEGAL file in all copies Contributor makes available thereafter and shall take other steps (such as notifying appropriate mailing lists or newsgroups) reasonably calculated to inform those who received the Covered

Code that new knowledge has been obtained.

(b) Contributor APIs.

If Contributor's Modifications include an application programming interface and Contributor has knowledge of patent licenses which are reasonably necessary to implement that API, Contributor must also include this information in the LEGAL file.

(c) Representations.

Contributor represents that, except as disclosed pursuant to Section 3.4(a) above, Contributor believes that Contributor's Modifications are Contributor's original creation(s) and/or Contributor has sufficient rights to grant the rights conveyed by this License.

3.5. Required Notices.

You must duplicate the notice in Exhibit A in each file of the Source Code. If it is not possible to put such notice in a particular Source Code file due to its structure, then You must include such notice in a location (such as a relevant directory) where a user would be likely to look for such a notice. If You created one or more Modification(s) You may add your name as a Contributor to the notice described in Exhibit A. You must also duplicate this License in any documentation for the Source Code where You describe recipients' rights or ownership rights relating to Covered Code. You may choose to offer, and to

charge a fee for, warranty, support, indemnity or liability obligations to one or more recipients of Covered Code. However, You may do so only on Your own behalf, and not on behalf of the Initial Developer or any Contributor. You must make it absolutely clear than any such warranty, support, indemnity or liability obligation is offered by You alone, and You hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of warranty, support, indemnity or liability terms You offer.

3.6. Distribution of Executable Versions.

You may distribute Covered Code in Executable form only if the requirements of Section 3.1-3.5 have been met for that Covered Code, and if You include a notice stating that the Source Code version of the Covered Code is available under the terms of this License, including a description of how and where You have fulfilled the obligations of Section 3.2. The notice must be conspicuously included in any notice in an Executable version, related documentation or collateral in which You describe recipients' rights relating to the Covered Code. You may distribute the Executable version of Covered Code or ownership rights under a license of Your choice, which may contain terms different from this License, provided that You are in compliance with the terms of this License and that the license for the Executable version does not attempt to limit or alter the recipient's rights in the Source Code version from the rights set forth in this

License. If You distribute the Executable version under a different license You must make it absolutely clear that any terms which differ from this License are offered by You alone, not by the Initial Developer or any Contributor. You hereby agree to indemnify the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of any such terms You offer.

3.7. Larger Works.

You may create a Larger Work by combining Covered Code with other code not governed by the terms of this License and distribute the Larger Work as a single product. In such a case, You must make sure the requirements of this License are fulfilled for the Covered Code.

4. Inability to Comply Due to Statute or Regulation.

If it is impossible for You to comply with any of the terms of this License with respect to some or all of the Covered Code due to statute, judicial order, or regulation then You must: (a) comply with the terms of this License to the maximum extent possible; and (b) describe the limitations and the code they affect. Such description must be included in the LEGAL file described in Section 3.4 and must be included with all distributions of the Source Code. Except to the extent prohibited by statute or regulation, such description must be sufficiently detailed for a recipient of ordinary skill to be able to

understand it.

  1. Application of this License.

This License applies to code to which the Initial Developer has attached the notice in Exhibit A and to related Covered Code.

  1. Versions of the License.

6.1. New Versions.

Netscape Communications Corporation ("Netscape") may publish revised and/or new versions of the License from time to time. Each version will be given a distinguishing version number.

6.2. Effect of New Versions.

Once Covered Code has been published under a particular version of the License, You may always continue to use it under the terms of that version. You may also choose to use such Covered Code under the terms of any subsequent version of the License published by Netscape. No one other than Netscape has the right to modify the terms applicable to Covered Code created under this License.

6.3. Derivative Works.

If You create or use a modified version of this License (which you may only do in order to apply it to code which is not already Covered Code

governed by this License), You must (a) rename Your license so that the phrases "Mozilla", "MOZILLAPL", "MOZPL", "Netscape",

"MPL", "NPL" or any confusingly similar phrase do not appear in your license (except to note that your license differs from this License)

and (b) otherwise make it clear that Your version of the license contains terms which differ from the Mozilla Public License and

Netscape Public License. (Filling in the name of the Initial

Developer, Original Code or Contributor in the notice described in

Exhibit A shall not of themselves be deemed to be modifications of this License.)

7. DISCLAIMER OF WARRANTY.

COVERED CODE IS PROVIDED UNDER THIS LICENSE ON AN "AS IS" BASIS,

WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING,

WITHOUT LIMITATION, WARRANTIES THAT THE COVERED CODE IS FREE OF

DEFECTS, MERCHANTABLE, FIT FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT.

THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE COVERED CODE

IS WITH YOU. SHOULD ANY COVERED CODE PROVE DEFECTIVE IN ANY RESPECT,

YOU (NOT THE INITIAL DEVELOPER OR ANY OTHER CONTRIBUTOR) ASSUME THE

COST OF ANY NECESSARY SERVICING, REPAIR OR CORRECTION. THIS DISCLAIMER

OF WARRANTY CONSTITUTES AN ESSENTIAL PART OF THIS LICENSE. NO USE OF

ANY COVERED CODE IS AUTHORIZED HEREUNDER EXCEPT UNDER THIS DISCLAIMER.

8. TERMINATION.

8.1. This License and the rights granted hereunder will terminate automatically if You fail to comply with terms herein and fail to cure such breach within 30 days of becoming aware of the breach. All sublicenses to the Covered Code which are properly granted shall survive any termination of this License. Provisions which, by their nature, must remain in effect beyond the termination of this License shall survive.

8.2. If You initiate litigation by asserting a patent infringement claim (excluding declaratory judgment actions) against Initial Developer or a Contributor (the Initial Developer or Contributor against whom You file such action is referred to as "Participant") alleging that:

(a) such Participant's Contributor Version directly or indirectly infringes any patent, then any and all rights granted by such Participant to You under Sections 2.1 and/or 2.2 of this License shall, upon 60 days notice from Participant terminate prospectively, unless if within 60 days after receipt of notice You either: (i) agree in writing to pay Participant a mutually agreeable reasonable

royalty for Your past and future use of Modifications made by such Participant, or (ii) withdraw Your litigation claim with respect to the Contributor Version against such Participant. If within 60 days of notice, a reasonable royalty and payment arrangement are not mutually agreed upon in writing by the parties or the litigation claim is not withdrawn, the rights granted by Participant to You under Sections 2.1 and/or 2.2 automatically terminate at the expiration of the 60 day notice period specified above.

(b) any software, hardware, or device, other than such Participant's Contributor Version, directly or indirectly infringes any patent, then any rights granted to You by such Participant under Sections 2.1(b) and 2.2(b) are revoked effective as of the date You first made, used, sold, distributed, or had made, Modifications made by that Participant.

8.3. If You assert a patent infringement claim against Participant alleging that such Participant's Contributor Version directly or indirectly infringes any patent where such claim is resolved (such as by license or settlement) prior to the initiation of patent infringement litigation, then the reasonable value of the licenses granted by such Participant under Sections 2.1 or 2.2 shall be taken into account in determining the amount or value of any payment or license.

8.4. In the event of termination under Sections 8.1 or 8.2 above, all end user license agreements (excluding distributors and resellers) which have been validly granted by You or any distributor hereunder prior to termination shall survive termination.

9. LIMITATION OF LIABILITY.

UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER TORT (INCLUDING NEGLIGENCE), CONTRACT, OR OTHERWISE, SHALL YOU, THE INITIAL

DEVELOPER, ANY OTHER CONTRIBUTOR, OR ANY DISTRIBUTOR OF COVERED CODE,

OR ANY SUPPLIER OF ANY OF SUCH PARTIES, BE LIABLE TO ANY PERSON FOR

ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY

CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL,

WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR ANY AND ALL OTHER

COMMERCIAL DAMAGES OR LOSSES, EVEN IF SUCH PARTY SHALL HAVE BEEN

INFORMED OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION OF

LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY

RESULTING FROM SUCH PARTY'S NEGLIGENCE TO THE EXTENT APPLICABLE LAW

PROHIBITS SUCH LIMITATION. SOME JURISDICTIONS DO NOT ALLOW THE

EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO

THIS EXCLUSION AND LIMITATION MAY NOT APPLY TO YOU.

  1. U.S. GOVERNMENT END USERS.

The Covered Code is a "commercial item," as that term is defined in 48 C.F.R. 2.101 (Oct. 1995), consisting of "commercial computer software" and "commercial computer software documentation," as such terms are used in 48 C.F.R. 12.212 (Sept. 1995). Consistent with 48 C.F.R. 12.212 and 48 C.F.R. 227.7202-1 through 227.7202-4 (June 1995), all U.S. Government End Users acquire Covered Code with only those rights set forth herein.

  1. MISCELLANEOUS.

This License represents the complete agreement concerning subject matter hereof. If any provision of this License is held to be unenforceable, such provision shall be reformed only to the extent necessary to make it enforceable. This License shall be governed by California law provisions (except to the extent applicable law, if any, provides otherwise), excluding its conflict-of-law provisions. With respect to disputes in which at least one party is a citizen of, or an entity chartered or registered to do business in the United States of America, any litigation relating to this License shall be subject to the jurisdiction of the Federal Courts of the Northern District of California, with venue lying in Santa Clara County, California, with the losing party responsible for costs, including without limitation, court costs and reasonable attorneys' fees and

expenses. The application of the United Nations Convention on Contracts for the International Sale of Goods is expressly excluded. Any law or regulation which provides that the language of a contract shall be construed against the drafter shall not apply to this License.

12. RESPONSIBILITY FOR CLAIMS.

As between Initial Developer and the Contributors, each party is responsible for claims and damages arising, directly or indirectly, out of its utilization of rights under this License and You agree to work with Initial Developer and Contributors to distribute such responsibility on an equitable basis. Nothing herein is intended or shall be deemed to constitute any admission of liability.

13. MULTIPLE-LICENSED CODE.

Initial Developer may designate portions of the Covered Code as "Multiple-Licensed". "Multiple-Licensed" means that the Initial Developer permits you to utilize portions of the Covered Code under Your choice of the NPL or the alternative licenses, if any, specified by the Initial Developer in the file described in Exhibit A.

EXHIBIT A -Mozilla Public License.

The contents of this file are subject to the Mozilla Public License

Version 1.1 (the "License"); you may not use this file except in

compliance with the License. You may obtain a copy of the License at

http://www.mozilla.org/MPL/

Software distributed under the License is distributed on an "AS IS"

basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See the

License for the specific language governing rights and limitations

under the License.

The Original Code is ____.

The Initial Developer of the Original Code is ____.

Portions created by ____ are Copyright (C) ____

____. All Rights Reserved.

Contributor(s): ____.

Alternatively, the contents of this file may be used under the terms

of the ____ license (the "[____] License"), in which case the

provisions of [____] License are applicable instead of those

above. If you wish to allow use of your version of this file only

under the terms of the [____] License and not to allow others to use

your version of this file under the MPL, indicate your decision by

deleting the provisions above and replace them with the notice and

other provisions required by the [____] License. If you do not delete the provisions above, a recipient may use your version of this file under either the MPL or the [____] License."

[NOTE: The text of this Exhibit A may differ slightly from the text of the notices in the Source Code files of the Original Code. You should use the text of this Exhibit A rather than the text found in the Original Code Source Code for Your Modifications.]

This Product includes DBD-mysql 4.011 software under below license

Copyright (c) 2003 Rudolf Lippan

Copyright (c) 1997-2003 Jochen Wiedmann

You may distribute under the terms of either the GNU General Public

License or the Artistic License, as specified in the Perl README file.

This Product includes sg3_utils 1.25 software under below license

Upstream Authors: Douglas Gilbert ,

Bruce Allen ,

Peter Allworth ,

James Bottomley ,

Lars Marowsky-Bree ,

Kurt Garloff ,

Grant Grundler ,

Christophe Varoqui ,

Michael Weller ,

Eric Youngdale

Copyright:

This software is copyright(c) 1994-2007 by the authors

You are free to distribute this software under the terms of the GNU General Public License.

On Debian systems, the complete text of the GNU General Public License can be found in /usr/share/common-licenses/GPL file.

many parts of this package are covered by the BSD license.

These include central error processing code (sg_lib.[hc]),

common command code (sg_cmds_basic.[hc] and sg_cmds_extra.[hc])

and later utilities. They are Copyright: Douglas Gilbert.

The author's intention is that the BSD licensed code can be used

freely by others. On Debian systems, the complete text of the

BSD License can be found in ` /usr/share/common-licenses/BSD'.

This Product includes DBI 1.608 software under below license

The DBI module is Copyright (c) 1994-2008 Tim Bunce. Ireland.

All rights reserved.

You may distribute under the terms of either the GNU General Public

License or the Artistic License, as specified in the Perl README file.

This Product includes flac 1.2.1 software under below license

This is the Win32 binary release for the FLAC project.

All programs and plugins are released under the GPL (see COPYING.GPL)

except the Winamp 2 plugin which is LGPL (see COPYING.LGPL).

The documentation is released under the FDL (see COPYING.FDL).

This Product includes boost 1.38.0 software under below license

Boost Software License

oLicense text

oIntroduction

oHistory

oRationale

oFAQ

oTransition

oAcknowledgements

INTRODUCTION

The Boost Software License specifies the terms and conditions of use for those Boost libraries that it covers.

Currently, some Boost libraries have their own licenses. The hope is that eventually all Boost libraries will be covered by the Boost Software License. In the meantime, all libraries comply with the Boost License requirements.

HISTORY

As Boost grew, it became unmanageable for each Boost file to have its own license. Users complained that each license needed to be reviewed, and that reviews were difficult or impossible if Boost libraries contained many different licenses. Boost moderators and maintainers spent excessive time dealing with license issues. Boost developers often copied existing licenses without actually knowing if the license wording met legal needs.

To clarify these licensing issues, the Boost moderators asked for help from the Berkman Center for Internet & Society at Harvard Law School, Cambridge, Massachusetts, USA. It was requested that a single Boost license be developed that met the traditional requirements that Boost licenses, particularly:

oMust be simple to read and understand.

oMust grant permission without fee to copy, use and modify the software for any use (commercial and non-commercial).

oMust require that the license appear with all copies [including redistributions] of the software source code.

oMust not require that the license appear with executables or other binary uses of the library.

oMust not require that the source code be available for execution or other binary uses of the library.

Additionally, other common open source licenses were studied to see what additional issues were being treated, and additions representing good legal practice were also requested. The result is the Boost Software License:

Boost Software License - Version 1.0 - August 17th, 2003

Permission is hereby granted, free of charge, to any person or organization obtaining a copy of the software and accompanying documentation covered by this license (the "Software") to use, reproduce, display, distribute, execute, and transmit the Software, and to prepare derivative works of the Software, and to permit third-parties to whom the Software is furnished to do so, all subject to the following:

The copyright notices in the Software and this entire statement, including the above license grant, this restriction and the following disclaimer, must be included in all copies of the Software, in whole or in part, and all derivative works of the Software, unless such copies or derivative works are solely in the form of machine-executable object code generated by a source language processor.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR

IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,

FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO EVENT

SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING THE SOFTWARE BE LIABLE

FOR ANY DAMAGES OR OTHER LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE,

ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER

DEALINGS IN THE SOFTWARE.

RATIONALE

The following rationale was provided by Devin Smith, the lawyer who wrote the Boost Software License. It has been edited slightly for brevity. Editorial additions are shown in square brackets.

Benefit of Common Software License

If one of Boost's goals is to ease use and adoption of the various libraries made available by Boost, it does make sense to try to standardize the licenses under

which the libraries are made available to users. (I make some recommendations about a possible short-form license below.)

[Standardizing the license will not] necessarily address the issue of satisfying corporate licensees. Each corporation will have its own concerns, based on their own experiences with software licensing and distribution and, if they're careful, will want to carefully review each license, even if they've been told that they're all standard. I would expect that, unless we're remarkably brilliant (or lucky) in drafting the standard Boost license, the standard license won't satisfy the legal departments of all corporations. I imagine that some will, for instance, absolutely insist that licensors provide a warranty of title and provide indemnification for third-party intellectual property infringement claims. Others may want functional warranties. (If I were advising the corporations, I would point out that they're not paying anything for the code and getting such warranties from individual programmers, who probably do not have deep pockets, is not that valuable anyway, but other lawyers may disagree.)

But this can be addressed, not by trying to craft the perfect standard license, but by informing the corporations that they can, if they don't like the standard license, approach the authors to negotiate a different, perhaps even paid, license.

One other benefit of adopting a standard license is to help ensure that the license accomplishes, from a legal perspective, what the authors intend. For instance, many of the [original] licenses for the libraries available on boost.org do not disclaim the warranty of title, meaning that the authors could, arguably, be sued by a user if the code infringes the rights of a third party and the user is sued by that third party. I think the authors probably want to disclaim this kind of liability.

Short-Form License

Without in anyway detracting from the draft license that's been circulated [to Boost moderators], I'd like to propose an alternative "short-form" license that Boost could have the library authors adopt. David [Abrahams] has expressed a desire to keep things as simple as possible, and to try to move away from past practice as little as possible, and this is my attempt at a draft.

This license, which is very similar to the BSD license and the MIT license, should satisfy the Open Source Initiative's Open Source Definition: (i) the license permits free redistribution, (ii) the distributed code includes source code, (iii) the license permits the creation of derivative works, (iv) the license does not discriminate against persons or groups, (v) the license does not discriminate against fields of endeavor, (vi) the rights apply to all to whom the program is redistributed, (vii) the license is not specific to a product, and (viii) the license is technologically neutral (i.e., it does not [require] an explicit gesture of assent in order to establish a contract between licensor and licensee).

This license grants all rights under the owner's copyrights (as well as an implied patent license), disclaims all liability for use of the code (including intellectual property infringement liability), and requires that all subsequent copies of the code [except machine-executable object code], including partial copies and derivative works, include the license.

FAQ

How should Boost programmers apply the license to source and header files? Add a comment based on the following template, substituting appropriate text for the italicized portion:

// Copyright Joe Coder 2004 - 2006.

// Distributed under the Boost Software License, Version 1.0.

// (See accompanying file LICENSE_1_0.txt or copy at

// http://www.boost.org/LICENSE_1_0.txt)

Please leave an empty line before and after the above comment block. It is fine if the copyright and license messages are not on different lines; in no case there should be other intervening text. Do not include "All rights reserved" anywhere.

Other ways of licensing source files have been considered, but some of them turned out to unintentionally nullify legal elements of the license. Having fixed language for referring to the license helps corporate legal departments evaluate the boost distribution. Creativity in license reference language is strongly discouraged, but judicious changes in the use of whitespace are fine.

How should the license be applied to documentation files, instead? Very similarly to the way it is applied to source files: the user should see the very same text indicated in the template above, with the only difference that both the local and the web copy of LICENSE_1_0.txt should be linked to. Refer to the HTML source code of this page in case of doubt.

Note that the location of the local LICENSE_1_0.txt needs to be indicated relatively to the position of your documentation file (../LICENSE_1_0.txt, .././LICENSE_1_0.txt etc.)

How is the Boost license different from the GNU General Public License (GPL)? The Boost license permits the creation of derivative works for commercial or non-commercial use with no legal requirement to release your source code. Other differences include Boost not requiring reproduction of copyright messages for object code redistribution, and the fact that the Boost license is not "viral": if you distribute your own code along with some Boost code, the Boost license applies only to the Boost code (and modified versions thereof); you are free to license your own code under any terms you like. The GPL is also much longer, and thus may be harder to understand.

Why the phrase "machine-executable object code generated by a source language processor"? To distinguish cases where we do not require reproduction of the copyrights and license, such as object libraries, shared libraries, and final program executables, from cases where reproduction is still required, such as distribution of self-extracting archives of source code or precompiled header files. More detailed wording was rejected as not being legally necessary, and reducing readability.

Why is the "disclaimer" paragraph of the license entirely in uppercase? Capitalization of these particular provisions is a US legal mandate for consumer protection. (Diane Cabell)

Does the copyright and license cover interfaces too? The conceptual interface to a library isn't covered. The particular represen-

tation expressed in the header is covered, as is the documentation, examples, test programs, and all the other material that goes with the library. A different implementation is free to use the same logical interface, however. Interface issues have been fought out in court several times; ask a lawyer for details.

Why doesn't the license prohibit the copyright holder from patenting the covered software? No one who distributes their code under the terms of this license could turn around and sue a user for patent infringement. (Devin Smith)

Boost's lawyers were well aware of patent provisions in licenses like the GPL and CPL, and would have included such provisions in the Boost license if they were believed to be legally useful.

Why doesn't the copyright message say "All rights reserved"? Devin Smith says "I don't think it belongs in the copyright notice for anything (software, electronic documentation, etc.) that is being licensed. It belongs in books that are sold where, in fact, all rights (e.g., to reproduce the book, etc.) are being reserved in the publisher or author. I think it shouldn't be in the BSD license."

Do I have to copyright/license trivial files? Even a test file that just contains an empty main() should have a copyright. Files without copyrights make corporate lawyers nervous, and that's a barrier to adoption. The more of Boost is uniformly copyrighted and licensed the low problem people will have with printing a Boost universe CD on a corporate series

ZYXEL NSA221 - FAQ - 1

TRANSITION

To ease the transition of the code base towards the new common license, several people decided to give a blanket permission for all their contributions to use the new license. This hopefully helps maintainers to switch to the new license once the list contains enough names without asking over and over again for each change. Please consider adding your name to the list.

ACKNOWLEDGEMENTS

Dave Abrahams led the Boost effort to develop better licensing. The legal team was led by Diane Cabell, Director, Clinical Programs, Berkman Center for Internet & Society, Harvard Law School. Devin Smith, attorney, Nixon Peabody LLP, wrote the Boost License. Eva Chan, Harvard Law School, contributed analysis of Boost issues and drafts of various legal documents. Boost members reviewed drafts of the license. Beman Dawes wrote this web page.

Revised \Date: 2009-06-07 07:14:52 -0400 (Sun, 07 Jun 2009) \

Copyright Beman Dawes, Daniel Frey, David Abrahams, 2003-2004.

Copyright Rene Rivera 2004-2005.

Distributed under the Boost Software License, Version 1.0.

This Product includes curl 7.18.2 software under below license

COPYRIGHT AND PERMISSION NOTICE

Copyright (c) 1996 - 2009, Daniel Stenberg, daniel@haxx.se.

All rights reserved.

Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR

IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,

FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN

NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,

DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR

OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE

OR OTHER DEALINGS IN THE SOFTWARE.

Except as contained in this notice, the name of a copyright holder shall not

be used in advertising or otherwise to promote the sale, use or other dealings in this Software without prior written authorization of the copyright holder.

License Issues

Curl and libcurl are released under a MIT/X derivate license. The license is very liberal and should not impose a problem for your project. This section is just a brief summary for the cases we get the most questions. (Parts of this section was much enhanced by Bjorn Reese.)

We are not lawyers and this is not legal advice. You should probably consult one if you want true and accurate legal insights without our prejudice.

6.1 I have a GPL program, can I use the libcurl library?

Yes!

Since libcurl may be distributed under the MIT/X derivate license, it can be used together with GPL in any software.

6.2 I have a closed-source program, can I use the libcurl library?

Yes!

libcurl does not put any restrictions on the program that uses the library.

6.3 I have a BSD licensed program, can I use the libcurl library?

Yes!

libcurl does not put any restrictions on the program that uses the library.

6.4 I have a program that uses LGPL libraries, can I use libcurl?

Yes!

The LGPL license doesn't clash with other licenses.

6.5 Can I modify curl/libcurl for my program and keep the changes secret?

Yes!

The MIT/X derivate license practically allows you to do almost anything with the sources, on the condition that the copyright texts in the sources are left intact.

6.6 Can you please change the curl/libcurl license to XXXX?

No.

We have carefully picked this license after years of development and

discussions and a large amount of people have contributed with source code knowing that this is the license we use. This license puts the restrictions we want on curl/libcurl and it does not spread to other programs or libraries that use it. It should be possible for everyone to use libcurl or curl in their projects, no matter what license they already have in use.

6.7 What are my obligations when using libcurl in my commercial apps?

Next to none. All you need to adhere to is the MIT-style license (stated in the COPYING file) which basically says you have to include the copyright notice in "all copies" and that you may not use the copyright holder's name when promoting your software.

You do not have to release any of your source code.

You do not have to reveal or make public any changes to the libcurl source code.

You do not have to reveal or make public that you are using libcurl within your app.

As can be seen here: http://curl.haxx.se/docs/companies.html and elsewhere, more and more companies are discovering the power of libcurl and take advantage of it even in commercial environments.

This Product includes httpd 2.2.9 software under below license

Apache HTTP Server

Copyright 2008 The Apache Software Foundation.

This product includes software developed at

The Apache Software Foundation (http://www.apache.org/).

Portions of this software were developed at the National Center

for Supercomputing Applications (NCSA) at the University of

Illinois at Urbana-Champaign.

This software contains code derived from the RSA Data Security

Inc. MD5 Message-Digest Algorithm, including various

modifications by Spyglass Inc., Carnegie Mellon University, and

Bell Communications Research, Inc (Bellcore).

Regular expression support is provided by the PCRE library package,

which is open source software, written by Philip Hazel, and copyright

by the University of Cambridge, England. The original software is

available from

ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/

Apache License

Version 2.0, January 2004

http://www.apache.org/licenses/

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

  1. Definitions.

"License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document.

"Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License.

"Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this definition, "control" means (i) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity.

"You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License.

"Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files.

"Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types.

"Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below).

"Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof.

"Contribution" shall mean any work of authorship, including the original version of the Work and any modifications or additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner. For the purposes of this definition, "submitted" means any form of electronic, verbal, or written communication sent to the Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code control systems, and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution."

"Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and

subsequently incorporated within the Work.

  1. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form.

  2. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed.

  3. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions:

(a) You must give any other recipients of the Work or Derivative Works a copy of this License; and
(b) You must cause any modified files to carry prominent notices stating that You changed the files; and
(c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark, and attribution notices from the Source form of the Work, excluding those notices that do not pertain to any part of the Derivative Works; and
(d) If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the following places: within a NOTICE text file distributed as part of the Derivative Works; within the Source form or documentation, if provided along with the Derivative Works; or,

within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License. You may add Your own attribution notices within Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the License.

You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions stated in this License.

  1. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without any additional terms or conditions.

Notwithstanding the above, nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such Contributions.

  1. Trademarks. This License does not grant permission to use the trade

names, trademarks, service marks, or product names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file.

  1. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License.

  2. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if such Contributor has been advised of the possibility of such damages.

  3. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or rights consistent with this License. However, in accepting such obligations, You may act only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability.

END OF TERMS AND CONDITIONS

APPENDIX: How to apply the Apache License to your work.

To apply the Apache License to your work, attach the following boilerplate notice, with the fields enclosed by brackets "[]" replaced with your own identifying information. (Don't include the brackets!) The text should be enclosed in the appropriate comment syntax for the file format. We also recommend that a file or class name and description of purpose be included on the same "printed page" as the copyright notice for easier identification within third-party archives.

Copyright [yyyy] [name of copyright owner]

Licensed under the Apache License, Version 2.0 (the "License");

you may not use this file except in compliance with the License.

You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software

distributed under the License is distributed on an "AS IS" BASIS,

WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.

See the License for the specific language governing permissions and

limitations under the License.

APACHE HTTP SERVER SUBCOMPONENTS:

The Apache HTTP Server includes a number of subcomponents with separate copyright notices and license terms. Your use of the source code for the these subcomponents is subject to the terms and conditions of the following licenses.

For the mod_mime_magic component:

/*
* mod_mime_magic: MIME type lookup via file magic numbers
* Copyright (c) 1996-1997 Cisco Systems, Inc.
*
* This software was submitted by Cisco Systems to the Apache Group in July
* 1997. Future revisions and derivatives of this source code must
* acknowledge Cisco Systems as the original contributor of this module.
* All other licensing and usage conditions are those of the Apache Group.
*
* Some of this code is derived from the free version of the file command
* originally posted to comp.sources.unix. Copyright info for that program
* is included below as required.
* ____
* - Copyright (c) Ian F. Darwin, 1987. Written by Ian F. Darwin.
*
* This software is not subject to any license of the American Telephone and
* Telegraph Company or of the Regents of the University of California.
*
* Permission is granted to anyone to use this software for any purpose on any
* computer system, and to alter it and redistribute it freely, subject to
* the following restrictions:
*
* 1. The author is not responsible for the consequences of use of this
* software, no matter how awful, even if they arise from flaws in it.
*

* 2. The origin of this software must not be misrepresented, either by
* explicit claim or by omission. Since few users ever read sources, credits
* must appear in the documentation.
* 3. Altered versions must be plainly marked as such, and must not be
* misrepresented as being the original software. Since few users ever read
* sources, credits must appear in the documentation.
* 4. This notice may not be removed or altered.

For the modules\mappers\mod_imagemap.c component:

"macmartinized" polygon code copyright 1992 by Eric Haines, erich@eye.com

For the server\util_md5.c component:

/ ****************************************************************************************** ****************************************************************************************** ****************************************************************************************** ****************************************************************************************** ****************************************************************************************** ****************************************************************************************** ******************************************************************************************

* NCSA HTTPd Server
* Software Development Group
* National Center for Supercomputing Applications

*
*
* University of Illinois at Urbana-Champaign
* 605 E. Springfield, Champaign, IL 61820
* httpd@ncsa.uiuc.edu
* Copyright (C) 1995, Board of Trustees of the University of Illinois

\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\

*

* md5.c: NCSA HTTPd code which uses the md5c.c RSA Code

*

* Original Code Copyright (C) 1994, Jeff Hostetler, Spyglass, Inc.

* Portions of Content-MD5 code Copyright (C) 1993, 1994 by Carnegie Mellon

* University (see Copyright below).

* Portions of Content-MD5 code Copyright (C) 1991 Bell Communications

* Research, Inc. (Bellcore) (see Copyright below).

* Portions extracted from mpack, John G. Myers - jgm+@cmu.edu

* Content-MD5 Code contributed by Martin Hamilton (martin@net.lut.ac.uk)

*

*/

/* these portions extracted from mpack, John G. Myers - jgm+@cmu.edu */

/* (C) Copyright 1993,1994 by Carnegie Mellon University

* All Rights Reserved.

*

* Permission to use, copy, modify, distribute, and sell this software
* and its documentation for any purpose is hereby granted without
* fee, provided that the above copyright notice appear in all copies
* and that both that copyright notice and this permission notice
* appear in supporting documentation, and that the name of Carnegie
* Mellon University not be used in advertising or publicity
* pertaining to distribution of the software without specific,
* written prior permission. Carnegie Mellon University makes no
* representations about the suitability of this software for any
* purpose. It is provided "as is" without express or implied
* warranty.

*

* CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO
* THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
* AND FITNESS, IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE
* FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
* AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
* OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS
* SOFTWARE.
*/

/*
* Copyright (c) 1991 Bell Communications Research, Inc. (Bellcore)
*
* Permission to use, copy, modify, and distribute this material
* for any purpose and without fee is hereby granted, provided
* that the above copyright notice and this permission notice
* appear in all copies, and that the name of Bellcore not be
* used in advertising or publicity pertaining to this
* material without the specific, prior written permission
* of an authorized representative of Bellcore. BELLCORE
* MAKES NO REPRESENTATIONS ABOUT THE ACCURACY OR SUITABILITY
* OF THIS MATERIAL FOR ANY PURPOSE. IT IS PROVIDED "AS IS",
* WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES.
*/

For the srclib\apr\include\apr_md5.h component:

/*

* This is work is derived from material Copyright RSA Data Security, Inc.

*

* The RSA copyright statement and Licence for that original material is

* included below. This is followed by the Apache copyright statement and

* licence for the modifications made to that material.

*/

/* Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.

License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing this software or this function.

License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing the derived work.

RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided "as is" without express or implied warranty of any kind.

These notices must be retained in any copies of any part of this documentation and/or software.

*/

For the srclib\apr\passwd\apr_md5.c component:

/*

* This is work is derived from material Copyright RSA Data Security, Inc. *

* The RSA copyright statement and Licence for that original material is * included below. This is followed by the Apache copyright statement and * licence for the modifications made to that material. */

/* MD5C.C - RSA Data Security, Inc., MD5 message-digest algorithm */

/* Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.

License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing this software or this function.

License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing the derived work.

RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this

software for any particular purpose. It is provided "as is"

without express or implied warranty of any kind.

These notices must be retained in any copies of any part of this documentation and/or software.

*/

/*

* The apr_md5_encode() routine uses much code obtained from the FreeBSD 3.0

* MD5 crypt() function, which is licenced as follows:

* ____

* "THE BEER-WARE LICENSE" (Revision 42):

* phk@login.dknet.dk wrote this file. As long as you retain this notice you

* can do whatever you want with this stuff. If we meet some day, and you think

* this stuff is worth it, you can buy me a beer in return. Poul-Henning Kamp

* ____

*/

For the srclib\apr-util\crypto\apr_md4.c component:

* This is derived from material copyright RSA Data Security, Inc.

* Their notice is reproduced below in its entirety.

*

* Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All

* rights reserved.

*

* License to copy and use this software is granted provided that it
* is identified as the "RSA Data Security, Inc. MD4 Message-Digest
* Algorithm" in all material mentioning or referencing this software
* or this function.

* License is also granted to make and use derivative works provided
* that such works are identified as "derived from the RSA Data
* Security, Inc. MD4 Message-Digest Algorithm" in all material
* mentioning or referencing the derived work.

* RSA Data Security, Inc. makes no representations concerning either
* the merchantability of this software or the suitability of this
* software for any particular purpose. It is provided "as is"
* without express or implied warranty of any kind.

* These notices must be retained in any copies of any part of this
* documentation and/or software.
*/

For the srclib\apr-util\include\apr_md4.h component:

* This is derived from material copyright RSA Data Security, Inc.
* Their notice is reproduced below in its entirety.

* Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All

* rights reserved.

*

* License to copy and use this software is granted provided that it

* is identified as the "RSA Data Security, Inc. MD4 Message-Digest

* Algorithm" in all material mentioning or referencing this software

* or this function.

*

* License is also granted to make and use derivative works provided

* that such works are identified as "derived from the RSA Data

* Security, Inc. MD4 Message-Digest Algorithm" in all material

* mentioning or referencing the derived work.

*

* RSA Data Security, Inc. makes no representations concerning either

* the merchantability of this software or the suitability of this

* software for any particular purpose. It is provided "as is"

* without express or implied warranty of any kind.

*

* These notices must be retained in any copies of any part of this

* documentation and/or software.

*/

For the srclib\apr-util\test\testmd4.c component:

*
* This is derived from material copyright RSA Data Security, Inc.
* Their notice is reproduced below in its entirety.
*
* Copyright (C) 1990-2, RSA Data Security, Inc. Created 1990. All
* rights reserved.
*
* RSA Data Security, Inc. makes no representations concerning either
* the merchantability of this software or the suitability of this
* software for any particular purpose. It is provided "as is"
* without express or implied warranty of any kind.
*
* These notices must be retained in any copies of any part of this
* documentation and/or software.
*/

For the srclib\apr-util\xml\expat\conftools\install-sh component:

#

# install - install a program, script, or datafile

# This comes from X11R5 (mit/util/scripts/install.sh).

#

# Copyright 1991 by the Massachusetts Institute of Technology

#

# Permission to use, copy, modify, distribute, and sell this software and its

documentation for any purpose is hereby granted without fee, provided that

documentation, and that the name of M.I.T. not be used in advertising or

publicity pertaining to distribution of the software without specific,

written prior permission. M.I.T. makes no representations about the

suitability of this software for any purpose. It is provided "as is"

without express or implied warranty.

For the srclib\pcre\install-sh component:

#

# Copyright 1991 by the Massachusetts Institute of Technology

#

# Permission to use, copy, modify, distribute, and sell this software and its

# documentation for any purpose is hereby granted without fee, provided that

# the above copyright notice appear in all copies and that both that

# copyright notice and this permission notice appear in supporting

# documentation, and that the name of M.I.T. not be used in advertising or

# publicity pertaining to distribution of the software without specific,

# written prior permission. M.I.T. makes no representations about the

# suitability of this software for any purpose. It is provided "as is"

# without express or implied warranty.

For the pcre component:

PCRE LICENCE

PCRE is a library of functions to support regular expressions whose syntax and semantics are as close as possible to those of the Perl 5 language.

Release 5 of PCRE is distributed under the terms of the "BSD" licence, as specified below. The documentation for PCRE, supplied in the "doc" directory, is distributed under the same terms as the software itself.

Written by: Philip Hazel ph10@cam.ac.uk

University of Cambridge Computing Service, Cambridge, England. Phone: +44 1223 334714.

Copyright (c) 1997-2004 University of Cambridge All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

* Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

* Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

* Neither the name of the University of Cambridge nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"

AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE

IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE

LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR

CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF

SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS

INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN

CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)

ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE

POSSIBILITY OF SUCH DAMAGE.

End PCRE LICENCE

For the test\zb.c component:

/*

ZeusBench V1.01

This program is Copyright (C) Zeus Technology Limited 1996.

This program may be used and copied freely providing this copyright notice is not removed.

This software is provided "as is" and any express or implied warranties, including but not limited to, the implied warranties of merchantability and fitness for a particular purpose are disclaimed. In no event shall Zeus Technology Ltd. be liable for any direct, indirect, incidental, special, exemplary, or consequential damaged (including, but not limited to, procurement of substitute good or services; loss of use, data, or profits; or business interruption) however caused and on theory of liability. Whether in contract, strict liability or tort (including negligence or otherwise) arising in any way out of the use of this software, even if advised of the possibility of such damage.

Written by Adam Twiss (adam@zeus.co.uk). March 1996

Thanks to the following people for their input:

Mike Belshe (mbelshe@netscape.com)

Michael Campanella (campanella@stevms.enet.dec.com)

*/

For the expat xml parser component:

Copyright (c) 1998, 1999, 2000 Thai Open Source Software Center Ltd and Clark Cooper

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,

EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.

IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

This Product includes libtecla 1.6.1 software under below license

Copyright (c) 2000, 2001, 2002, 2003, 2004 by Martin C. Shepherd.

All rights reserved.

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, provided that the above copyright notice(s) and this permission notice appear in all copies of the Software and that both the above copyright notice(s) and this permission notice appear in supporting documentation.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS

OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF

MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT

OF THIRD PARTY RIGHTS. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR

HOLDERS INCLUDED IN THIS NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL

INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING

FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT,

NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION

WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

Except as contained in this notice, the name of a copyright holder shall not be used in advertising or otherwise to promote the sale, use or other dealings in this Software without prior written authorization of the copyright holder.

This Product includes libtorrent-rasterbar 0.14.3 software under below license

Copyright (c) 2003 - 2007, Arvid Norberg

All rights reserved.

Redistribution and use in source and binary forms, with or without

modification, are permitted provided that the following conditions are met:

* Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
* Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
* Neither the name of Rasterbar Software nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"

AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE

IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE

ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE

LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR

CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF

SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS

INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN

CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)

ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE

POSSIBILITY OF SUCH DAMAGE.

This Product includes libupnp 1.3.1 software under below license

Copyright (c) 2000-2003 Intel Corporation

All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

* Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

* Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

* Neither name of Intel Corporation nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS

AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR

A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL INTEL OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

This Product includes libxml2 2.6.8 software under below license

Except where otherwise noted in the source code (e.g. the files hash.c, list.c and the trio files, which are covered by a similar licence but with different Copyright notices) all the files are:

Copyright (C) 1998-2003 Daniel Veillard. All Rights Reserved.

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in

all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR

IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FIT-

NESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE

DANIEL VEILLARD BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER

IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CON-

NECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

Except as contained in this notice, the name of Daniel Veillard shall not

be used in advertising or otherwise to promote the sale, use or other deal-

ings in this Software without prior written authorization from him.

This Product includes ntp 4.1.2 software under below license

Copyright (c) University of Delaware 1992-2010

Permission to use, copy, modify, and distribute this software and its documentation for any purpose with or without fee is hereby granted, provided that the above copyright notice appears in all copies and that both the copyright notice and this permission notice appear in supporting documentation, and that the name University of Delaware not be used in advertising or publicity pertaining to distribution of the software without specific, written prior permission. The University of Delaware makes no representations about the suitability this software for any purpose. It is provided "as is" without express or implied warranty.

The following individuals contributed in part to the Network Time Protocol Distribution Version 4 and are acknowledged as authors of this work.

  1. Mark Andrews mark95andrews@isc.org Leitch atomic clock controller
  2. Bernd Altmeier altmeier@atlsoft.de hopf Elektronik serial line and PCI-bus devices
  3. Viraj Bais vbais@mailman1.intel.com and Clayton Kirkwood kirkwood@striderfm.intel.com port to WindowsNT 3.5
  4. Michael Barone michael,barone@lmco.com GPSVME fixes
  5. Jean-Francois Boudreault Jean-Francois.Boudreault@viagenie.qc.ca IPv6 support
  6. Karl Berry karl@owl.HQ.ileaf.com syslog to file option
  7. Greg Brackley greg.brackley@bigfoot.com Major rework of WINNT port. Clean up recvbuf and iosignal code into separate modules.
  8. Marc Brett Marc.Brett@westgeo.com Magnavox GPS clock driver
  9. Piete Brooks Piete.Brooks@cl.cam.ac.uk MSF clock driver, Trimble PARSE support
  10. Reg Clemens reg@dwf.com Oncore driver (Current maintainer)
  11. Steve Clift clift@ml.csiro.au OMEGA clock driver
  12. Casey Crellin casey@csc.co.za vxWorks (Tornado) port and help with target configuration
  13. Sven Dietrich sven95dietrich@trimble.com Palisade reference clock driver, NT adj. residuals, integrated Greg's Winnt port.
  14. John A. Dundas III dundas@salt.jpl.nasa.gov Apple A/UX port
  15. Torsten Duwe duwe@immd4.informatik.uni-erlangen.de Linux port
  16. Dennis Ferguson dennis@mrbill.canet.ca foundation code for NTP Version 2 as specified in RFC-1119
  17. John Hay jhay@icomtek.csir.co.za IPv6 support and testing
  18. Dave Hart davehart@davehart.com General maintenance, Windows port interpolation rewrite.
    19.Claas Hilbrecht neoclock4x@linum.com NeoClock4X clock driver

  19. Glenn Hollinger glenn@herald.usask.ca GOES clock driver

  20. Mike Iglesias iglesias@uci.edu DEC Alpha port
  21. Jim Jagielski jim@jagubox.gsfc.nasa.gov A/UX port
    23.Jeff Johnson jbj@chatham.usdesign.com massive prototyping overhaul
  22. Hans Lambermont Hans.Lambermont@nl.origin-it.com or H.Lambermont@chello.nl ntpsweep
  23. Poul-Henning Kamp phk@FreeBSD.ORG Oncore driver (Original author)
  24. Frank Kardel PARSE driver (>14 reference clocks), STREAMS modules for PARSE, support scripts, syslog cleanup, dynamic interface handling
  25. William L. Jones jones@hermes.chpc.utexas.edu RS/6000 AIX modifications, HPUX modifications
  26. Dave Katz dkatz@cisco.com RS/6000 AIX port
  27. Craig Leres leres@ee.lbl.gov 4.4BSD port, ppsclock, Magnavox GPS clock driver
    30.George Lindholm lindholm@ucs.ubc.ca SunOS 5.1 port
  28. Louis A. Mamakos louie@ni.umd.edu MD5-based authentication
  29. Lars H. Mathiesen thorinn@diku.dk adaptation of foundation code for Version 3 as specified in RFC-1305
  30. Danny Mayer mayer@ntp.org Network I/O, Windows Port, Code Maintenance
  31. David L. Mills mills@udel.edu Version 4 foundation: clock discipline, authentication, precision kernel; clock drivers: Spectracom, Austron, Arbiter, Heath, ATOM, ACTS, KSI/Odetics; audio clock drivers: CHU, WWV/H, IRIG
  32. Wolfgang Moeller moeller@gwdgv1.dnet.gwdg.de VMS port
    36.Jeffrey Mogul mogul@pa.dec.com ntptrace utility
  33. Tom Moore tmoore@fievel.daytonoh.ncr.com i386 svr4 port
  34. Kamal A Mostafa kamal@whence.com SCO OpenServer port
  35. Derek Mulcahy derek@toybox.demon.co.uk and Damon Hart-Davis d@hd.org ARCRON MSF clock driver

40.Rob Neal neal@ntp.org Bancomm refclock and config/parse code maintenance
41. Rainer Pruy Rainer.Pruy@informatik.uni-erlangen.de monitoring/trap scripts, statistics file handling
42. Dirce Richards dirce@zk3.dec.com Digital UNIX V4.0 port
43. Wilfredo Sánchez wsanchez@apple.com added support for NetInfo
44. Nick Sayer mrapple@quack.kfu.com SunOS streams modules
45. Jack Sasportas jack@innovativeinternet.com Saved a Lot of space on the stuff in the html/pic/ subdirectory
46. Ray Schnitzler schnitz@unipress.com Unixware1 port
47. Michael Shields shields@tembel.org USNO clock driver
48.Jeff Steinman jss@pebbles.jpl.nasa.gov Datum PTS clock driver
49. Harlan Stenn harlan@pfcs.com GNU automake/autoconfigure makeover, various other bits (see the ChangeLog)
50.Kenneth Stone ken@sdd.hp.com HP-UX port
51. Ajit Thyagarajan ajit@ee.udel.edu IP multicast/anycast support
52. Tomoaki TSURUOKA tsuruoka@nc.fukuoka-u.ac.jp TRAK clock driver
53. Paul A Vixie vixie@vix.com TrueTime GPS driver, generic TrueTime clock driver
54. Ulrich Windl Ulrich.Windl@rz.uni-regensburg.de corrected and validated HTML documents according to the HTML DTD

This Product includes pam 0.76 software under below license

Unless otherwise *explicitly* stated the following text describes the licensed conditions under which the contents of this Linux-PAM release may be distributed:

Redistribution and use in source and binary forms of Linux-PAM, with or without modification, are permitted provided that the following conditions are met:

  1. Redistributions of source code must retain any existing copyright notice, and this entire permission notice in its entirety, including the disclaimer of warranties.
  2. Redistributions in binary form must reproduce all prior and current copyright notices, this list of conditions, and the following disclaimer in the documentation and/or other materials provided with the distribution.
  3. The name of any author may not be used to endorse or promote products derived from this software without their specific prior written permission.

ALTERNATIVELY, this product may be distributed under the terms of the GNU General Public License, in which case the provisions of the GNU GPL are required INSTEAD OF the above restrictions. (This clause is necessary due to a potential conflict between the GNU GPL and the restrictions contained in a BSD-style copyright.)

THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.IN NO EVENT SHALL THE AUTHOR(S) BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS

OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

This Product includes pure-ftpd 1.0.21 software under below license

Pure-FTPd is covered by the following license :

/*
* Copyright (c) 2001, 2002, 2003, 2004, 2005, 2006
* Frank Denis j@pureftpd.org with the help of all Pure-FTPd contributors.
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.

* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES

* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF

* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR

* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES

* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN

* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF

* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

*/

This Product includes setsystz software under below license

/* setsystz: set the Linux kernel's idea of the time zone */

/* Copyright (c) 2007 David A. Madore, Public Domain */

This Product includes sqlite 3.5.6 software under below license

All of the deliverable code in SQLite has been dedicated to the public domain by the authors. All code authors, and representatives of the companies they work for, have signed affidavits dedicating their contributions to the public domain and originals of those signed affidavits are stored in a firesafe at the main offices of Hwaci. Anyone is free to copy, modify, publish, use, compile, sell, or distribute the original SQLite code, either in source code form or as a compiled binary, for any purpose, commercial or non-commercial, and by any means.

The previous paragraph applies to the deliverable code in SQLite - those parts of the SQLite library that you actually bundle and ship with a larger application. Portions of the documentation and some code used as part of the build process might fall under other licenses. The details here are unclear. We do not worry about the licensing of the documentation and build code so much because none of these things are part of the core deliverable SQLite library.

All of the deliverable code in SQLite has been written from scratch. No code has been taken from other projects or from the open internet. Every line of code can be traced back to its original author, and all of those authors have public domain dedications on file. So the SQLite code base is clean and is uncontaminated with licensed code from other projects.

Obtaining An Explicit License To Use SQLite

Even though SQLite is in the public domain and does not require a license, some users want to obtain a license anyway. Some reasons for obtaining a license include:

  • You are using SQLite in a jurisdiction that does not recognize the public domain.
  • You are using SQLite in a jurisdiction that does not recognize the right of an author to dedicate their work to the public domain.
  • You want to hold a tangible legal document as evidence that you have the legal right to use and distribute SQLite.
  • Your legal department tells you that you have to purchase a license.

If you feel like you really have to purchase a license for SQLite, Hwaci, the company that employs the architect and principal developers of SQLite, will sell you one.

Contributed Code

In order to keep SQLite completely free and unencumbered by copyright, all new contributors to the SQLite code base are asked to dedicate their contributions to the public domain. If you want to send a patch or enhancement for possible inclusion in the SQLite source tree, please accompany the patch with the following statement:

The author or authors of this code dedicate any and all copyright interest in this code to the public domain. We make this dedication for the benefit of the public at large and to the detriment of our heirs and successors. We intend this dedication to be an overt act of relinquishment in perpetuity of all present and future rights to this code under copyright law.

We are not able to accept patches or changes to SQLite that are not accompanied by a statement such as the above. In addition, if you make changes or enhancements as an employee, then a simple statement such as the above is insufficient. You must also send by surface mail a copyright release signed by a company officer. A signed original of the copyright release should be mailed to:

Hwaci

6200 Maple Cove Lane

Charlotte, NC 28269

USA

A template copyright release is available in PDF or HTML. You can use this release to make future changes

Contributions To SQLite

SQLite is software that implements an embeddable SQL database engine. SQLite is available for free download from http://www.sqlite.org/. The principal author and maintainer of SQLite has disclaimed all copyright interest in his contributions to SQLite and thus released his contributions into the public domain. In order to keep the SQLite software unencumbered by copyright claims, the principal author asks others who may from time to time contribute changes and enhancements to likewise disclaim their own individual copyright interest.

Because the SQLite software found at http://www.sqlite.org/ is in the public domain, anyone is free to download the SQLite software from that website, make changes to the software, use, distribute, or sell the modified software, under either the original name or under some new name, without any need to obtain permission, pay royalties, acknowledge the original source of the software, or in any other way compensate, identify, or notify the original authors. Nobody is in any way compelled to contribute their SQLite changes and enhancements back to the SQLite website. This document concerns only changes and enhancements to SQLite that are intentionally and deliberately contributed back to the SQLite website.

For the purposes of this document, "SQLite software" shall mean any computer source code, documentation, makefiles, test scripts, or other information that is published on the SQLite website, http://www.sqlite.org/. Precompiled binaries are excluded from the definition of "SQLite software" in this document because the process of compiling the software may introduce information from outside sources which is not properly a part of SQLite.

The header comments on the SQLite source files exhort the reader to share freely and to never take more than one gives. In the spirit of that exhortation I make the following declarations:

  1. I dedicate to the public domain any and all copyright interest in the SQLite software that was publicly available on the SQLite website (http://www.sqlite.org/) prior to the date of the signature below and any changes or enhancements to the SQLite software that I may cause to be published on that website in the future. I make this dedication for the benefit of the public at large and to the detriment of my heirs and successors. I intend this dedication to be an overt act of relinquishment in perpetuity of all present and future rights to the SQLite software under copyright law.
  2. To the best of my knowledge and belief, the changes and enhancements that I have contributed to SQLite are either originally written by me or are derived from prior works which I have verified are also in the public domain and are not subject to claims of copyright by other parties.
  3. To the best of my knowledge and belief, no individual, business, organization, government, or other entity has any copyright interest in the SQLite software as it existed on the SQLite website as of the date on the signature line below.
  4. I agree never to publish any additional information to the SQLite website (by CVS, email, scp, FTP, or any other means) unless that information is an original work of authorship by me or is derived from prior published versions of SQLite. I agree never to copy and paste code into the SQLite code base from other sources. I agree never to publish on the SQLite website any information that would violate a law or breach a contract.

Signature:

Date:

Name (printed):

This Product includes tz32 software under below license

== = asctime.c=========

** This file is in the public domain, so clarified as of

** 1996-06-05 by Arthur David Olson.

== = asctime.c========

== = date.c == == == ==

/*

* Copyright (c) 1985, 1987, 1988 The Regents of the University of California.

* All rights reserved.

*

* Redistribution and use in source and binary forms are permitted

* provided that the above copyright notice and this paragraph are

* duplicated in all such forms and that any documentation,

* advertising materials, and other materials related to such

* distribution and use acknowledge that the software was developed

* by the University of California, Berkeley. The name of the

* University may not be used to endorse or promote products derived

* from this software without specific prior written permission.

* THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR

* IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED

* WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.

*/

== difftime.c ==========

/ ** This file is in the public domain, so clarified as of ** 1996-06-05 by Arthur David Olson. /

== ((()=( (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= (((= ((([ ] 1996-06-05 by Arthur David Olson. * /

== ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=[ ( [ ] 1996-06-05 by Arthur David Olson. * /

== ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=[ ( [ ] 1996-06-05 by Arthur David Olson. * /

== ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=[ ( [ ] 1996-06-05 by Arthur David Olson. * /

== ((((((=( ((((((=( ((((((=( ((((((=( ((((((=( ((((((=[ ( [ ] 1996-06-05 by Arthur David Olson. * /

== ((((((=( ((((((=( ((((((=( ((((((=[ ( [ ] 1996-06-05 by Arthur David Olson. * /

== ((((((=( ((((((=( ((((((=( ((((((=[ ( [ ] 1996-06-05 by Arthur David Olson. * /

== ((((((=( ((((((=( ((((((=[ ( [ ] 1996-06-05 by Arthur David Olson. * /

== ((((((=( ((((((=( ((((((=[ ( [ ] 1996-06-05 by Arthur David Olson. * /

== ((((((=( ((((((=( ((((((=[ ( [ ] 1996-06-05 by Arthur David Olson. * /

== ((((((=( ( [ ] 1996-06-05 by Arthur David Olson. * /

== ((((((= private.h = (((= private.h = (((= private.h = (((= private.h = (((= private.h = (((= private.h = (((= private.h = (((= private.h = (((= private.h = (((= _private.h

=======tzfile.h ====

** This file is in the public domain, so clarified as of

** 1996-06-05 by Arthur David Olson.

This Product includes crypto++ 5.5.2 software under below license

License

The License of Crypto++ is somewhat unusual amongst open source projects. A distinction is made between the library as a compilation (i.e., collection), which is copyrighted by Wei Dai, and the individual files in it, which are public domain (with the exception of mars.cpp which is subject to its own license, included in that file).

The library is copyrighted as a compilation in order to place certain disclaimers (regarding warranty, export, and patents) in the license and to keep the attributions and public domain declarations intact when Crypto++ is distributed in source code form. The fact that individual files are public domain means that legally you can place code segments, entire files, or small sets of files (up to the limit set by fair use) into your own project and do anything you want with them without worrying about the copyright.

Because one purpose of the project is to act as a repository of public domain (not copyrighted) cryptographic source code, the code in Crypto++ was either written specifically for this project by its contributors and placed in the public domain, or derived from other sources that are public domain (again with the exception of mars.cpp).

Compilation Copyright (c) 1995-2009 by Wei Dai. All rights reserved.

This copyright applies only to this software distribution package

as a compilation, and does not imply a copyright on any particular

file in the package.

The following files are copyrighted by their respective original authors,

and their use is subject to additional licenses included in these files.

mars.cpp - Copyright 1998 Brian Gladman.

All other files in this compilation are placed in the public domain by Wei Dai and other contributors.

I would like to thank the following authors for placing their works into the public domain:

Joan Daemen - 3way.cpp

Leonard Janke - cast.cpp, seal.cpp

Steve Reid - cast.cpp

Phil Karn - des.cpp

Andrew M. Kuchling - md2.cpp, md4.cpp

Colin Plumb - md5.cpp

Seal Woods - rc6.cpp

Chris Morgan - rijndael.cpp

Paulo Baretto - rijndael.cpp, skipjack.cpp, square.cpp

Richard De Moliner - safer.cpp

Matthew Skala - twofish.cpp

Kevin Springle - camellia.cpp, shacal2.cpp, ttmac.cpp, whrlpool.cpp, ripemd.cpp

Permission to use, copy, modify, and distribute this compilation for any purpose, including commercial applications, is hereby granted without fee, subject to the following restrictions:

  1. Any copy or modification of this compilation in any form, except in object code form as part of an application software, must include

the above copyright notice and this license.

  1. Users of this software agree that any modification or extension they provide to Wei Dai will be considered public domain and not copyrighted unless it includes an explicit copyright notice.

  2. Wei Dai makes no warranty or representation that the operation of the software in this compilation will be error-free, and Wei Dai is under no obligation to provide any services, by way of maintenance, update, or otherwise. THE SOFTWARE AND ANY DOCUMENTATION ARE PROVIDED "AS IS" WITHOUT EXPRESS OR IMPLIED WARRANTY INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR

PURPOSE. IN NO EVENT WILL WEI DAI OR ANY OTHER CONTRIBUTOR BE LIABLE FOR

DIRECT, INCIDENTAL OR CONSEQUENTIAL DAMAGES, EVEN IF

ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

  1. Users will not use Wei Dai or any other contributor's name in any publicity or advertising, without prior written consent in each case.

  2. Export of this software from the United States may require a specific license from the United States Government. It is the responsibility of any person or organization contemplating export to obtain such a license before exporting.

  3. Certain parts of this software may be protected by patents. It

is the users' responsibility to obtain the appropriate

licenses before using those parts.

If this compilation is used in object code form in an application

software, acknowledgement of the author is not required but would be

appreciated. The contribution of any useful modifications or extensions

to Wei Dai is not required but would also be appreciated.

This Product includes wxWidgets 2.8.9 and wxWidgets 2.9.0 software under below license

Licence

Background

wxWidgets is currently licensed under the "wxWindows Licence" pending approval of the "wxWidgets Licence" which will be identical apart from the name.

The wxWindows Licence is essentially the L-GPL (Library General Public Licence), with an exception stating that derived works in binary form may be distributed on the user's own terms. This is a solution that satisfies those who wish to produce GPL'ed soft-

dgets, and also those producing proprietary software.

ZYXEL NSA221 - Background - 1

Participants in the discussion that led to this decision include the folk from Abisource, Robert Roebling, Julian Smart, Markus Fleck, Karsten Ballueder, and some advice from Richard Stallman. Richard has confirmed that the new licence is compatible with GPL'ed applications. However, there are no significant restrictions on proprietary applications.

The wxWindows Licence has been approved by the Open Source Initiative, and you can find the licence on their site here.

In August 2005, an ambiguity in Clause 2 was removed (replaced "the user's" with "your") and the version bumped to 3.1.

The wxWindows Library Licence

Copyright (c) 1998 Julian Smart, Robert Roebling [, ...]

Everyone is permitted to copy and distribute verbatim copies

of this licence document, but changing it is not allowed.

WXWINDOWS LIBRARY LICENCE

TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION

This library is free software; you can redistribute it and/or modify it under the terms of the GNU Library General Public Licence as published by the Free Software Foundation; either version 2 of the Licence, or (at your option) any later version.

This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Library General Public Licence for more details.

You should have received a copy of the GNU Library General Public Licence along with this software, usually in a file named COPYING.LIB. If not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA.

EXCEPTION NOTICE

  1. As a special exception, the copyright holders of this library give permission for additional uses of the text contained in this release of the library as licenced under the wxWindows Library Licence, applying either version 3 of the Licence, or (at your option) any later version of the Licence as published by the copyright holders of version 3 of the Licence document.

  2. The exception is that you may use, copy, link, modify and distribute under the user's own terms, binary object code versions of works based on the Library.

  3. If you copy code from files distributed under the terms of the GNU General Public Licence or the GNU Library General Public Licence into a copy of this library, as this licence permits, the exception does not apply to the code that you add in this way. To avoid misleading anyone as to the status of such modified files, you must delete this exception notice from such code and/or adjust the licensing conditions notice accordingly.

  4. If you write modifications of your own for this library, it is your choice whether to permit this exception to apply to your modifications.

If you do not wish that, you must delete the exception notice from such code and/or adjust the licensing conditions notice accordingly.

This Product includes php 5.2.8 software under below license

■PHP 4 and PHP 5 are distributed under the PHP License v3.01, copyright (c) the PHP Group.
■This is an Open Source license, certified by the Open Source Initiative.
■The PHP license is a BSD-style license which does not have the "copyleft" restrictions associated with GPL.
■Some files have been contributed under other (compatible) licenses and carry additional requirements and copyright information.

This is indicated in the license + copyright comment block at the top of the source file.

■Practical Guidelines:
■Distributing PHP
■ Contributing to PHP

The PHP License, version 3.01

Copyright (c) 1999 - 2009 The PHP Group. All rights reserved.

Redistribution and use in source and binary forms, with or without modification, is permitted provided that the following conditions are met:

  1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
  2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

  3. The name "PHP" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact group@php.net.

  4. Products derived from this software may not be called "PHP", nor may "PHP" appear in their name, without prior written permission from group@php.net. You may indicate that your software works in conjunction with PHP by saying "Foo for PHP" instead of calling it "PHP Foo" or "phpfoo"

  5. The PHP Group may publish revised and/or new versions of the license from time to time. Each version will be given a distinguishing version number. Once covered code has been published under a particular version of the license, you may always continue to use it under the terms of that version. You may also choose to use such covered code under the terms of any subsequent version of the license published by the PHP Group. No one other than the PHP Group has the right to modify the terms applicable to covered code created under this License.

  6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes PHP software, freely available from

http://www.php.net/software/".

THIS SOFTWARE IS PROVIDED BY THE PHP DEVELOPMENT TEAM ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PHP DEVELOPMENT TEAM OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

This software consists of voluntary contributions made by many individuals on behalf of the PHP Group.

The PHP Group can be contacted via Email at group@php.net.

For more information on the PHP Group and the PHP project, please see http://www.php.net.

PHP includes the Zend Engine, freely available at

http://www.zend.com.

This Product includes AutoXS-Header 1.02, Class-C3-XS 0.11, Class-XSAccessor 1.03, Class-XSAccessor-Array 1.04, Compress-Raw-Zlib 2.017, Digest-SHA1 2.11, EV 3.8, ExtUtils-Cbuilder 0.24, GD 2.41, HTML-Parser 3.60, JSON-XS 2.232, Module-Build 0.31012, Sub-Name 0.04, Template-Toolkit 2.21 and XML-Parser 2.36 software under the same terms as Perl 's license

Perl5 is Copyright (C) 1993-2005, by Larry Wall and others.

It is free software; you can redistribute it and/or modify it under the terms of either:

a) the GNU General Public License as published by the Free Software Foundation; either version 1, or (at your option) any later version, or

b) the "Artistic License".

For those of you that choose to use the GNU General Public License, my interpretation of the GNU General Public License is that no Perl script falls under the terms of the GPL unless you explicitly put said script under the terms of the GPL yourself.

Furthermore, any object code linked with perl does not automatically fall under the terms of the GPL, provided such object code only adds definitions of subroutines and variables, and does not otherwise impair the resulting interpreter from executing any standard Perl script. I consider linking in C subroutines in this manner to be the moral equivalent of defining subroutines in the Perl language itself. You may sell such an object file as proprietary provided that you provide or offer to provide the Perl source, as specified by the GNU General Public License. (This is merely an alternate way of specifying input to the program.) You may also sell a binary produced by the dumping of a running Perl script that belongs to you, provided that you provide or offer to provide the Perl source as specified by the GPL. (The fact that a Perl interpreter and your code are in the same binary file is, in this case, a form of mere aggregation.)

This is my interpretation of the GPL. If you still have concerns or difficulties understanding my intent, feel free to contact me. Of course, the Artistic License spells all this out for your protection, so you may prefer to use that.

-- Larry Wall

This Product includes gd 2.0.35 software under below license

Portions copyright 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002 by Cold Spring Harbor Laboratory. Funded under Grant P41-RR02188 by the National Institutes of Health.

Portions copyright 1996, 1997, 1998, 1999, 2000, 2001, 2002 by Boutell.Com, Inc.

Portions relating to GD2 format copyright 1999, 2000, 2001, 2002 Philip Warner.

Portions relating to PNG copyright 1999, 2000, 2001, 2002 Greg Roelofs.

Portions relating to gdttf.c copyright 1999, 2000, 2001, 2002 John Ellson (ellson@lucent.com).

Portions relating to gdft.c copyright 2001, 2002 John Ellison (ellson@lucent.com).

Portions copyright 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007 Pierre-Alain Joye (pierre@libgd.org).

Portions relating to JPEG and to color quantization copyright 2000,

2001, 2002, Doug Becker and copyright (C) 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, Thomas G. Lane. This software is based in part on the work of the Independent JPEG Group. See the file README-JPEG.TXT for more information.

Portions relating to WBMP copyright 2000, 2001, 2002 Maurice Szmurlo and Johan Van den Brande.

Permission has been granted to copy, distribute and modify gd in any context without fee, including a commercial application, provided that this notice is present in user-accessible supporting documentation.

This does not affect your ownership of the derived work itself, and the intent is to assure proper credit for the authors of gd, not to interfere with your productive use of gd. If you have questions, ask. "Derived works" includes all programs that utilize the library. Credit must be given in user-accessible documentation.

This software is provided "AS IS." The copyright holders disclaim all warranties, either express or implied, including but not limited to implied warranties of merchantability and fitness for a particular purpose, with respect to this code and accompanying documentation.

Although their code does not appear in gd, the authors wish to thank

David Koblas, David Rowley, and Hutchison Avenue Software Corporation

for their prior contributions.

Copyright © 2010 by ZyXEL Communications Corporation.

The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation.

Published by ZyXEL Communications Corporation. All rights reserved.

Disclaimers

ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice. This publication is subject to change without notice.

Do not use the NSA for illegal purposes. Illegal downloading or sharing of files can result in severe civil and criminal penalties. You are subject to the restrictions of copyright laws and any other applicable laws and will bear the consequences of any infringements thereof. ZyXEL bears NO responsibility or liability for your use of the download service feature.

Make sure all data and programs on the NSA are also stored elsewhere. ZyXEL is not responsible for any loss of or damage to any data, programs, or storage media resulting from the use, misuse, or disuse of this or any other ZyXEL product.

Certifications

Federal Communications Commission (FCC) Interference Statement

The device complies with Part 15 of FCC rules. Operation is subject to the following two conditions:

  • This device may not cause harmful interference.
  • This device must accept any interference received, including interference that may cause undesired operations.

This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This device generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation.

Notices

Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.

This Class B digital apparatus complies with Canadian ICES-003.

Viewing Certifications

1 Go to http://www.zyxel.com.
2 Select your product on the ZyXEL home page to go to that product's page.
3 Select the certification you wish to view from this page.

ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever extent it shall deem necessary to restore the product or components to proper operating condition. Any replacement will consist of a new or re-manufactured functionally equivalent product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.

Note

Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied,

including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser.

To obtain the services of this warranty, contact your vendor. You may also refer to the warranty policy for the region in which you bought the device at http://www.zyxel.com/web/support_warranty_info.php.

Registration

Register your product online to receive e-mail notices of firmware upgrades and information at www.zyxel.com for global products, or at www.us.zyxel.com for North American products.

Index

A

access rights 59

Flickr 279

shares 303, 304

YouTube 283

activation

download service 180

Flickr/YouTube 274

FTP 176

FTP Uploadr 285

recycle bins 58, 302

web publishing 193

ANONYMOUS FTP 348

anonymous FTP access 177

application zone 60

applications 173, 273

auto upload

Flickr/YouTube 273

FTP Uploadr 284

broadcastching 175, 194

adding channels 180, 195, 196

channel guides 214

RSS 176

COPY/SYNC button 204

configuration 204

example 216

synchronization 217

download service 175, 207, 362

activation 180

adding a task 183

BitTorrent 175, 183, 207

configuration 179

link capture browser plugin 207

notifications 208

preferences 185

protection 209, 210

status 181

URL 183, 231

FTP 174, 176, 273

activation 176

anonymous access 177

passive mode transfer 177

media server 174, 178

configuration 178

iTunes server 174, 205, 206

print server 215

configuration 202

name 203

web publishing 175, 192, 213

activation 193

example 211

port number 213

archive 124

authorization

Flickr 275, 276

YouTube 280

auto upload

Flickr/YouTube 273

activation 274

authorization 275, 280

configuration 278, 280

FTP Uploadr 284

activation 285

bandwidth limit 288

configuration 287

server entry 286

grace period 279, 283, 288

B

backup 123, 124

archive 124

synchronization tutorial 127

tutorial 127

backup files

restoring files by 132

backup job

restoring files by 130

backup settings 318

bandwidth limit 288

BitTorrent 175

IP filtering 189, 190

protection 209, 210

re-seeding 180

settings 188

torrent files 183, 207

health 191

info-hash 192

trackers 192

broadcasting 175, 194

adding channels 180, 195, 196

channel guides 214

RSS 176

browser plugin, capturing link 207

browsing shares 55

C

capturing download links 207

certificate 320

editing 321

tutorial 110

verifying 120

changing password 49

channel guides 214

CIFS 141

configuration

COPY/SYNC button 204

download service 179

Flickr 278

FTP Uploadr 287

print server 202

recycle bins 305

YouTube 280, 281

COPY/SYNC button 24, 204

configuration 204

example 216

synchronization 217

copying contents 308

CPU

temperature 139

usage 139

creating

groups 296, 297

shares 300, 302

users 290, 292

volumes 151, 154

D

data protection 160

date 143

diagnostic tools 165

discovery 27

disk

S.M.A.R.T. attributes 269

disk replacement 148

displaying user information 294

DLNA 174, 205

DNS 161, 165

Domain Name System, see DNS

domain user

troubleshooting 348

troubleshooting share access 349

download period control 187

download service 175, 207, 362

activation 180

adding a task 183

BitTorrent 175

IP filtering 189, 190

protection 209, 210

re-seeding 180

settings 188

torrent files 183, 207

configuration 179

download period control 187

link capture browser plugin 207

notifications 208

activation 180

preferences 185

status 181

URL, download service 183, 231

downloading files 57

duplexing 158

E

explicit TLS/SSL 122

external volumes 154

F

fan speed 139

file

troubleshooting access 349

file browser

configure share 58

share browser 55

File Transfer Protocol over Explicit TLS, see FTPES

File Transfer Protocol over TLS, see FTPS

files

downloading 57

uploading 57

FileZilla 122

fingerprint 120

firmware, upgrading 322

Flickr 273

access rights 279

activation 274

authorization 275, 276

grace period 279

safety level 280

folder

troubleshooting access 349

folder creation 57

FTP 122, 174, 176, 273

activation 176

anonymous access 177

over TLS 122

passive mode transfer 177

FTP Uploadr 284

activation 285

bandwidth limit 288

configuration 287

grace period 288

server entry 286

FTPES 174

FTPES - FTP over explicit TLS/SSL 122

FTPS 122, 274

grace period 279, 283, 288

groups 295

adding 296, 297

editing 297

membership 292, 297

names 298

searching 296

H

Home

icons 51

Home screens 50

HTTP port 165

HTTPS 116, 319

|

icons 51, 63, 66

global 51, 63

users 291

initialization wizard 30

IP address 161

IP filtering 189, 190

iTunes server 174, 205, 206

J

JBOD 152, 156, 157, 158

jumbo frames 162, 165

K

Ken Burns 62

G

global icons 51, 63

GMT 144

L

lag, time 141

LEDs 23

link capture browser plugin 207

login 48

logs 314

TCP/IP 163, 164

notifications

download service

activation 180

notifications, download service 208

M

maintenance 309

backup settings 318

logs 314

power management 310, 362

failure 310

resume 310

schedule 312

UPS 310

reset 318

restoring settings 318

shutdown 323

upgrading firmware 322

master browser 142

media server 174, 178

configuration 178

iTunes server 174, 206

membership 292

groups 292, 297

mirroring 158

moving contents 308

N

naming

server 142

shares 59

volumes 153

workgroup 142

NAS Starter Utility 27, 47

navigation panel 64

network 161

diagnostic tools 165

DNS 161, 165

HTTP port 165

IP address 161

jumbo frames 162, 165

PPPoE 162, 171

activation 171

P

parity 158

passive mode transfer 177

password 49, 61

port mapping 166

port, HTTP 165

power management 310, 362

failure 310

resume 310

schedule 312

UPS 310

PPPoE 162, 171

activation 171

preferences, download service 185

print server 215

configuration 202

name 203

protect 124

backup 123

backup tutorial 127

protection, download service 209, 210

public key certificate 320

editing 321

R

RAID 152, 156

degraded 153

RAID 0 157, 159

RAID 1 157, 159, 160

recovering 148

replacing disks 148

resynchronization 148

recycle bins 305

activation 58, 302

configuration 300, 305

related documentation 3

replacing disks 148

reset 24, 318

restoring

by backup files tutorial 132

by backup job tutorial 130

files 130

restoring settings 318

RSS 176

download service notifications 208

s

S.M.A.R.T.

attributes 269

safety level, Flickr 280

schedule, power management 312

scheduling, download service 187

secure connections 116

server entry, FTP Uploadr 286

server name 142

setup

BitTorrent 188

COPY/SYNC button 204

download service 179

Flickr 278

FTP Uploadr 287

media server 178

print server 202

YouTube 280, 281

share

configuration 58

troubleshooting local user access 347

shares 55, 299

access rights 59, 303, 304

adding 300, 302

browser 55

copying contents 308

downloading files 57

editing 302

folder creation 57

moving contents 308

names 59

recycle bins 300, 305

activation 302

configuration 305

share browser 300, 306

status 301

types 301

uploading files 57, 236, 306

shutdown 323

SSL 122, 319

certificate 320

editing 321

tutorial 110

status 63, 138

download service 181

shares 301

volume 149, 152

storage 147

creating volumes 151

disk replacement 148

JBOD 147, 152, 156, 157, 158

methods 157

duplexing 158

mirroring 158

parity 158

striping 158

naming volumes 153

RAID 147, 152, 156

degraded 153

RAID 0 157, 159

RAID 1 157, 159, 160

recovering 148

resynchronization 148

status 149, 152

USB devices 154, 155

volumes 147, 156

striping 158

synchronization 204, 217

configuration 204

directions 205

single direction 217

tutorial 127

two directions 218

system

date/time 143

login 48

master browser 142

password 49

reset 24

server name 142

settings 141

status 138

time lag 141

workgroup name 142

system settings 61

T

TCP/IP 163, 164

temperature

CPU 139

thumbprint 120

time 143

lag 141

server 144

zone 144

TLS 122, 174, 274

torrent files 183, 207

health 191

info-hash 192

trackers 192

Transport Layer Security, see TLS

troubleshooting

domain user 348

domain user share access 349

file access 349

files not in proper folders 53

folder access 349

forgot password 343

LED indicators 339

LAN 341

local user share access 347

login 346

media files 352

NAS Starter Utility 342

overview 339

user share access 347

web configurator access 343

U

Universal Plug and Play. See UPnP.

upgrading firmware 322

uploading files 57, 236, 306

UPnP 166

port mapping 166

UPS 310

URL 183, 231

USB devices 154, 155

User Name 241

usernames 293

users 289

adding an account 290, 292

displaying information 291, 294

editing an account 292

group membership 292, 297

icons 291

search 290

usernames 293

V

video category, YouTube 283

volumes 147, 156

creation 151, 154

JBOD 147, 152, 157, 158

names 153

RAID 147, 152, 156

degraded 153

RAID 0 157, 159

RAID 1 157, 159, 160

recovering 148

resynchronization 148

status 149, 152

storage methods 157

duplexing 158

mirroring 158

parity 158

striping 158

W

web configurator 47

icons 51

login 48

navigation panel 64

password 49, 61

status 63

web publishing 175, 192, 213

activation 193

example 211

port number 213

troubleshooting 355

web security 116

wizard 30

workgroup name 142

Y

YouTube 273

access rights 283

activation 274

authorization 280

configuration 280, 281

grace period 283

video category 283

Z

zPilot 41

Table of contents Click a title to access it
Manual assistant
Powered by Anthropic
Waiting for your message
Product information

Brand : ZYXEL

Model : NSA221

Category : NAS Server