ZyXEL Communications NSA-220 Plus User Manual

ZyXEL Communications NSA-220 Plus User Manual

Network storage appliance
Hide thumbs Also See for NSA-220 Plus:
Table of Contents
NSA-220 Plus
Network Storage Appliance
Default Login Details
Web Address
User Name
Password
Firmware Version 3.24
Edition 1, 6/2011
Color: Black / White
www.zyxel.com
www.zyxel.com
nsa220plus
admin
1234
Copyright © 2011
ZyXEL Communications Corporation
Table of Contents
loading

Summary of Contents for ZyXEL Communications NSA-220 Plus

  • Page 1 NSA-220 Plus Network Storage Appliance Default Login Details Web Address nsa220plus User Name admin Password 1234 Firmware Version 3.24 Edition 1, 6/2011 Color: Black / White www.zyxel.com www.zyxel.com Copyright © 2011 ZyXEL Communications Corporation...
  • Page 3: About This User's Guide

    If you cannot contact your vendor, then contact a ZyXEL office for the region in which you bought the device. See http://www.zyxel.com/ web/contact_us.php for contact information. Please have the following information ready when you contact an office. NSA-220 Plus User’s Guide...
  • Page 4 Graphics in this book may differ slightly from the product due to differences in operating systems, operating system versions, or if you installed updated firmware/software for your device. Every effort has been made to ensure that the information in this manual is accurate. NSA-220 Plus User’s Guide...
  • Page 5: Document Conventions

    For example, “k” for kilo may denote “1000” or “1024”, “M” for mega may denote “1000000” or “1048576” and so on. • “e.g.,” is a shorthand for “for instance”, and “i.e.,” means “that is” or “in other words”. NSA-220 Plus User’s Guide...
  • Page 6 Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The NSA icon is not an exact representation of your device. Computer Notebook computer Server Television Firewall Router Switch Internet NSA-220 Plus User’s Guide...
  • Page 7: Safety Warnings

    Your product is marked with this symbol, which is known as the WEEE mark. WEEE stands for Waste Electronics and Electrical Equipment. It means that used electrical and electronic products should not be mixed with general waste. Used electrical and electronic equipment should be treated separately. NSA-220 Plus User’s Guide...
  • Page 8 Safety Warnings NSA-220 Plus User’s Guide...
  • Page 9: Table Of Contents

    Applications ..........................131 Package Management ......................183 Users ............................237 Groups ............................. 243 Shares ............................. 247 Maintenance Screens ......................257 Protecting Your Data ........................ 277 Troubleshooting and Specifications .................. 279 Troubleshooting ........................281 Product Specifications ......................295 NSA-220 Plus User’s Guide...
  • Page 10 Contents Overview NSA-220 Plus User’s Guide...
  • Page 11: Table Of Contents

    2.5.4 My NSA Edit Share Screen ..................37 2.5.5 Share and Folder Names ................... 38 2.5.6 Share Paths ....................... 39 2.5.7 Password Screen ...................... 40 2.6 Administration Screens ....................... 41 2.6.1 Global Administration Icons ..................41 2.6.2 Navigation Panel ......................42 NSA-220 Plus User’s Guide...
  • Page 12 3.10.1 Finder ........................100 3.10.2 Go Menu ........................ 101 Part II: Technical Reference ..............103 Chapter 4 System Setting ........................105 4.1 Overview ..........................105 4.1.1 What You Can Do in the System Setting Screens ........... 105 NSA-220 Plus User’s Guide...
  • Page 13 7.3.1 Sharing Media Files on Your Network ..............135 7.3.2 Configuring the Media Server Screen ..............136 7.4 The Download Service Screen ..................138 7.4.1 Download Service ....................138 7.4.2 Configuring the Download Service Screen .............. 139 NSA-220 Plus User’s Guide...
  • Page 14 8.5.1 eMule Server Screen ....................188 8.5.2 Add Server ......................189 8.5.3 Edit Server ......................190 8.5.4 My Info ........................191 8.5.5 eMule Task Screen ....................192 8.5.6 Add Task ......................... 194 8.5.7 Preferences ......................196 NSA-220 Plus User’s Guide...
  • Page 15 9.1.1 What You Can Do in the Users Screen ..............237 9.2 The Users Screen ......................238 9.2.1 User Icons ........................ 239 9.3 Adding or Editing an Account .................... 240 9.3.1 Usernames ....................... 241 9.4 Displaying User Info ......................242 Chapter 10 Groups ........................... 243 NSA-220 Plus User’s Guide...
  • Page 16 12.7 The Firmware Upgrade Screen ..................274 12.8 The Shutdown Screen ....................275 Chapter 13 Protecting Your Data......................277 13.1 Overview .......................... 277 13.2 Protection Methods ......................277 13.2.1 Configuration File Backup and Restoration ............278 13.2.2 Memeo Autobackup ....................278 NSA-220 Plus User’s Guide...
  • Page 17 Appendix A Setting up Your Computer’s IP Address............303 Appendix B Pop-up Windows, JavaScripts and Java Permissions ........319 Appendix C Common Services .................... 329 Appendix D Importing Certificates..................333 Appendix E Open Source Licences..................365 Appendix F Legal Information ....................511 Index............................515 NSA-220 Plus User’s Guide...
  • Page 18 Table of Contents NSA-220 Plus User’s Guide...
  • Page 19: User's Guide

    User’s Guide...
  • Page 21: Getting To Know Your Nsa

    • Use the NSA’s website to share files with remote users. • Use iTunes on your computer to play video and music files stored on the NSA. • Share printers. • Automatically upload photo and video files to your FTP server, Flickr and YouTube accounts. NSA-220 Plus User’s Guide...
  • Page 22 Refer to the Quick Start Guide for hardware connections and how to install and remove hard drives from the disk trays. Note: Turn off and disconnect the NSA before you install or remove internal hard drives. NSA-220 Plus User’s Guide...
  • Page 23: Leds

    Chapter 1 Getting to Know Your NSA 1.1.1 LEDs The NSA LEDs (lights) tell you important information. Figure 2 NSA Front Panel Figure 3 NSA Rear Panel NSA-220 Plus User’s Guide...
  • Page 24 LED also comes on. Since the green LED still stays on, the color appears to be orange. If the NSA is no longer able to detect a hard disk in the disk bay, the green LED turns off and the LED appears as red. NSA-220 Plus User’s Guide...
  • Page 25: Copy/Sync Button

    You could then restore your configuration in the event that you or someone else reset the NSA to the factory defaults. Note: You should keep the NSA in a secure location in order to prevent unauthorized reset of the device. NSA-220 Plus User’s Guide...
  • Page 26 Chapter 1 Getting to Know Your NSA NSA-220 Plus User’s Guide...
  • Page 27: Web Configurator Basics

    • JavaScript (enabled by default). 2.2 Accessing the NSA Web Configurator Make sure your NSA is properly connected and that your computer is in the same subnet as the NSA (refer to the Quick Start Guide or the appendices). NSA-220 Plus User’s Guide...
  • Page 28: Access The Nsa Via Ndu

    From the NDU main page click an icon under Admin to see the web configurator’s login screen. 2.2.2 Web Browser Access Open your browser and type in the server name of the NSA (“nsa220plus” by default). Figure 6 NSA URL NSA-220 Plus User’s Guide...
  • Page 29: Login

    You should see a screen asking you to change your password (highly recommended) as shown next. Type a new password (and retype it to confirm) and click Apply or click Ignore. Figure 8 Change Password Screen NSA-220 Plus User’s Guide...
  • Page 30: User-Level Screens Overview

    Click this to go to screens where you can manage your shares and access the files on public shares. The administrator must go into the administration screens to manage other user’s shares. Password Click this to go to a screen where you can change your password. NSA-220 Plus User’s Guide...
  • Page 31: My Nsa Screens

    You can map a share to a network drive for easy and familiar file transfer for Windows users. The main My NSA screen displays the shares to which you have access. Figure 10 My NSA NSA-220 Plus User’s Guide...
  • Page 32: My Nsa Share Browsing Screen

    MP3 files. • Click to the right of a file or folder name to select it. • Use the [SHIFT] key to select a range of entries. Hold down the [CTRL] key to select multiple individual entries. NSA-220 Plus User’s Guide...
  • Page 33 Click Apply to create a folder. Upload Click this to add files to the share. Use the Browse button to locate a file and click Apply to upload the file. NSA-220 Plus User’s Guide...
  • Page 34 Click Up One Level to go to the next higher layer in the share’s folder tree. Click a file’s file name to open the file or save it to your computer. Click a folder’s name to display the folder’s contents. Size This column displays a file’s size in bytes. NSA-220 Plus User’s Guide...
  • Page 35: My Nsa Share Browsing Move Or Copy Screen

    If you click Apply without selecting a folder, a forward slash displays in the Path field. All contents within the specified share are selected. Click this to move or copy the file. Close Click this to return to the My NSA share browsing screen without saving. NSA-220 Plus User’s Guide...
  • Page 36: My Nsa Configuration Screen

    Click this to see and access the share’s contents. Edit Share Click this to configure the share’s management details. Delete Share Click this to permanently remove the contents associated with this share or to disable the share so that no users can access it. NSA-220 Plus User’s Guide...
  • Page 37: My Nsa Edit Share Screen

    Select this option to make the share’s files available to media clients. share to Media Server Publish this Select this option to let people use a web browser to access this share’s share to Web files without logging into the My NSA screens. NSA-220 Plus User’s Guide...
  • Page 38: Share And Folder Names

    • Folder names must be unique (they cannot be the same as other folder names). • The minimum character length of a name is one character, that is a name cannot be blank. • The maximum character length of share name is 255 characters. NSA-220 Plus User’s Guide...
  • Page 39: Share Paths

    • The share path cannot be blank • You cannot have an empty folder name, that is, two consecutive slashes (for example, '/My//Corner/') • Each individual folder in the path (that is, the content between the slashes) cannot exceed 255 characters NSA-220 Plus User’s Guide...
  • Page 40: Password Screen

    14 single-byte (no Chinese characters allowed for example) ASCII characters. Password (Confirm) You must type the exact same password that you just typed in the above field. Apply Click this to save your changes. Reset Click this to refresh the screen. NSA-220 Plus User’s Guide...
  • Page 41: Administration Screens

    Table 9 Global Labels and Icons LABEL/ DESCRIPTION ICON Language Select the web configurator language from the drop-down list box. Help Click this to open a web help page specific to the screen you are currently configuring. NSA-220 Plus User’s Guide...
  • Page 42: Navigation Panel

    There are no sub-links for the Status screen. Certain screens also contain hyper links that allow you to jump to another screen. The following screen shows the features listed in the navigation panel. Figure 17 Navigation Panel Links NSA-220 Plus User’s Guide...
  • Page 43 View, create and edit groups. Groups allow you to organize users into specific groups. You can create shares accessible only by the group members. Shares View, create and edit shares. Shares are shared folders to which you can allow specific users read/write access rights. NSA-220 Plus User’s Guide...
  • Page 44: Main Window

    Click this to delete an entry from the list. Edit Click this to jump to related item’s configuration screen. Refresh Click this to refresh the data for the field or value with which it is associated. NSA-220 Plus User’s Guide...
  • Page 45 Click this to cause the LED on the external storage device to blink. Repair If you replace a faulty disk with a disk that contains a volume, you need to delete the volume and then click this to fix the degraded RAID volume. NSA-220 Plus User’s Guide...
  • Page 46: The Status Screen

    This shows whether the Web server function is enabled or Status disabled. It must be enabled to use HTTP to access shares on the NSA. Click the Edit icon to go to the screen where you can configure this. NSA-220 Plus User’s Guide...
  • Page 47 This field (also known as Type) shows what type of data storage system (a RAID type or JBOD) an internal volume is using. File System This field shows what file system an external (USB) volume is using. NSA-220 Plus User’s Guide...
  • Page 48: Session Example (Windows)

    IP address. Initially you can only read and write to the Public, Video, Music, and Photo folders until you create other shares on the NSA. This session is then displayed as shown in the following figure. Session Example (Windows) NSA-220 Plus User’s Guide...
  • Page 49: Tutorials

    (so you have a working volume). See the rest of this User’s Guide for details on configuring the NSA’s various screens. 3.2.1 Creating a User Account Bob wants to create accounts for his sons Jimmy and Kevin. This is how he would do it. NSA-220 Plus User’s Guide...
  • Page 50 Log into the NSA web configurator (see Section 2.3 on page 29) and click Administration to go to the configuration screens. My NSA Click Sharing > Users to open the Users screen. Then click Add User. Users NSA-220 Plus User’s Guide...
  • Page 51 Now that Bob has created Jimmy’s account, he can go through the steps again to create another account for Kevin. After both accounts are created, he can go to Section 3.2.2 on page 52 to create shares for Jimmy and Kevin. NSA-220 Plus User’s Guide...
  • Page 52: Creating A Share

    Click Add Share to create a new share. Shares Specify a name for the share and select which volume it should be on. Configure the screen as follows. Then click Edit. Shares > Add Share Example NSA-220 Plus User’s Guide...
  • Page 53: Creating A Group

    This is how he would create the group. In the NSA’s administration web configurator screen, click Groups > Add Group. Groups NSA-220 Plus User’s Guide...
  • Page 54: Accessing A Share From Windows Explorer

    Here he maps Jimmy’s share to Jimmy’s computer. Start Windows Explorer and go to the NSA’s server name (“nsa220plus” is the default) or IP address. Click Tools > Map Network Drive. NSA Top Level NSA-220 Plus User’s Guide...
  • Page 55 Map Network Drive Enter the username and password for Jimmy’s account and click OK. You do not need to do this if the username and password are the same as Jimmy’s Windows login. Enter Network Password NSA-220 Plus User’s Guide...
  • Page 56: Accessing A Share Using Ftp

    This is how he would do it. Open the FTP client (Windows Explorer is used here) and type “ftp:// username@server” where “username” is the account’s username and “server” is the NSA’s IP address or server name. FTP Example: Typing the FTP Target NSA-220 Plus User’s Guide...
  • Page 57 Chapter 3 Tutorials Enter your password and click Login. FTP Example: Enter the Password Now you can access files and copy files from/to your local computer’s drives to or from this network folder. FTP Example: Logged In NSA-220 Plus User’s Guide...
  • Page 58: Accessing A Share Through The Web Configurator

    Click a folder’s file name to browse the folder. You can open files or copy them to your computer. You can also create new folders and upload additional files to the share. Click the logout icon when your are done. NSA-220 Plus User’s Guide...
  • Page 59: Download Service Tutorial

    Note: It is also OK for the link to open a .torrent file. If you are redirected to a screen that says the download should start in a few seconds, there may be a link to click if the download does not start automatically. See if that link opens the file or the pop-up window. NSA-220 Plus User’s Guide...
  • Page 60 Copy Link Location in Firefox). Copy Shortcut Log into the NSA web configurator (see Section 2.3 on page 29) using the administrator account and click Download Service. Download Service Tutorial: My NSA Click Add. Download Service Tutorial: Download Service NSA-220 Plus User’s Guide...
  • Page 61 The download appears in the Completed tab when it is done. By default the NSA stores all downloads in the admin share’s download folder. See Section 3.2.4 on page Section 3.2.5 on page 56, or Section 3.2.6 on page 58 for how to access a share. NSA-220 Plus User’s Guide...
  • Page 62: Installing The Link Capture Browser Plugin

    Internet Explorer Open the folder containing the link capture browser plugin. Double-click on the plugin to display the following screen. Click I Agree to begin installation. Link Capture Browser Plugin: IE NSA-220 Plus User’s Guide...
  • Page 63 Open Internet Explorer and locate a download link. In this example, www.zyxel.com has a Download Now link for downloading a user’s guide for ZyXEL’s NBG410W3G (a 3G wireless router). Right-click on the download link and select NSA Setting. Link Capture Browser Plugin: IE Setting NSA-220 Plus User’s Guide...
  • Page 64 Link Capture Browser Plugin: Setting NSA’s Web Address in IE Firefox Open Firefox. Open the folder containing the link capture browser plugin. To install the plugin, drag and drop the plugin to Firefox. Link Capture Browser Plugin: Firefox NSA-220 Plus User’s Guide...
  • Page 65 Chapter 3 Tutorials The following screen displays. Click Install Now. Link Capture Browser Plugin: Firefox Installation You need to restart Firefox after the installation. Link Capture Browser Plugin: Restart Firefox NSA-220 Plus User’s Guide...
  • Page 66 Add-ons. Click Options to configure the NSA’s web address. Link Capture Browser Plugin: Firefox Options Enter the NSA’s web address (nsa220plus by default) and click OK. Link Capture Browser Plugin: Firefox Settings NSA-220 Plus User’s Guide...
  • Page 67: Using The Link Capture Browser Plugin

    Find a download link for the file you want. In this example, www.zyxel.com has a Download Now link for downloading a user’s guide for ZyXEL’s P-660W-T1 (an ADSL router). Link Capture Browser Plugin Example Right-click on the download link and select Send to NSA. Send to NSA NSA-220 Plus User’s Guide...
  • Page 68 Completed tab if the NSA already finished downloading the file. By default the NSA stores all downloads in the admin share’s download folder. Section 3.2.4 on page Section 3.2.5 on page 56, or Section 3.2.6 on page for how to access a share. NSA-220 Plus User’s Guide...
  • Page 69: Configuring The Download Service Preferences

    If a file is corrupted, the NSA will download the file again. If the file is intact but not completely downloaded, the NSA will resume the download task after it restarts. NSA-220 Plus User’s Guide...
  • Page 70 Select the check box and enter 100 in the Upload/Download Ratio field. • Use an online IP filter table from http://www.bluetack.co.uk/config/level1.gz for example to protect BitTorrent downloads. Enter the URL in the Update IP Filter from the Internet Every Week field. NSA-220 Plus User’s Guide...
  • Page 71: Using Download Service Notification

    Google Reader cannot support this feature if the NSA has a private IP address. Note: It is recommended to subscribe to the download service notifications using the built-in reader in Internet Explorer 7 or Firefox. NSA-220 Plus User’s Guide...
  • Page 72 Download Service Notification: Activation Internet Explorer 7 Example After you activate download service notification, click the RSS feed icon. Download Service Notification: RSS Feed Icon The following screen displays. Select Subscribe to this feed. Subscribe to Download Service Notifications NSA-220 Plus User’s Guide...
  • Page 73 Click the Favorite icon on your browser and select the Feeds tab to check the updates of your NSA’s download list. Download Service Notification Firefox Example After you activate download service notification, click the RSS feed icon. Download Service Notification: RSS Feed Icon NSA-220 Plus User’s Guide...
  • Page 74 Subscribe to Download Service Notifications The following screen displays. Select Bookmarks Menu and click Add. Add the RSS Feed From the Firefox’s Bookmarks Menu, select Download Notify to check the updates of your NSA’s download list. Download Service Notification NSA-220 Plus User’s Guide...
  • Page 75: Broadcatching Tutorial

    One way to test this is by clicking the link. Clicking an actual RSS feed link opens a screen of XML code (in browsers without an RSS feed aggregator) or a window where you can add the RSS feed (in browsers with an RSS feed aggregator). NSA-220 Plus User’s Guide...
  • Page 76 (or Copy Shortcut in Internet Explorer). Copy Link Location Log into the NSA web configurator (see Section 2.3 on page 29) using the administrator account and click Administration > Applications > Broadcatching. Click Add Channel. Broadcatching Tutorial: Broadcatching NSA-220 Plus User’s Guide...
  • Page 77 The NSA’s media server feature makes it easy for users on your network to play the broadcatching files you download. See Section 7.3.1 on page 135 for more on the media server. NSA-220 Plus User’s Guide...
  • Page 78: Printer Server Tutorial

    Use a USB cable to connect the printer’s USB port to one of the NSA’s USB ports. Make sure the printer is also connected to an appropriate power source. Printer Sharing Turn on the printer. The NSA detects the printer after a few moments. NSA-220 Plus User’s Guide...
  • Page 79 Use the wizard screens to install the printer driver on the computer. You may need to get the file from the printer’s CD or the printer manufacturer’s website (the driver is not installed on the NSA). NSA-220 Plus User’s Guide...
  • Page 80: Copy And Flickr Auto Upload Tutorial

    Flickr account for auto upload. In this example Amy select the NSA’s photo share for auto upload. This is how Amy would transfer the files from her USB disk to the NSA. NSA-220 Plus User’s Guide...
  • Page 81 Copy Tutorial: Copy Settings Press and release the COPY/SYNC button on the NSA’s front panel to start copying files. The copied files can be found in a new folder in the photo share. Copy Tutorial: Copied Files NSA-220 Plus User’s Guide...
  • Page 82: Ftp Uploadr Tutorial

    FTP Uploadr. FTP Uploadr Tutorial Susan’s NSA Amy’s NSA To set the NSA as an FTP server, click Applications > FTP to open the FTP screen. Select Enable FTP and click Apply. FTP Uploadr Tutorial: Enable FTP NSA-220 Plus User’s Guide...
  • Page 83 Select Enable FTP Uploadr and click Apply to turn on FTP Uploadr. FTP Uploadr Tutorial: Enable FTP Uploadr Click Add Server. FTP Uploadr Tutorial Enter the information as describe in Table 13 on page 83. Click Apply to add the server. FTP Uploadr Tutorial: Add Server NSA-220 Plus User’s Guide...
  • Page 84 Amy wants to share video files with Susan. In the Preferences screen, select video from the Shares drop-down list box, enter a forward slash in the Path field and click Add to add the share to the Folder Watch List. FTP Uploadr Tutorial: Folder Watch List NSA-220 Plus User’s Guide...
  • Page 85 Similarly, Susan can go through the steps described above to configure FTP Uploadr on her NSA. Once Susan completes the setup, Amy can also receive files from Susan’s NSA. FTP Uploadr Tutorial: Exchange Files Susan’s NSA Amy’s NSA NSA-220 Plus User’s Guide...
  • Page 86: Web Configurator's Security Sessions

    You will customize the NSA’s self-signed SSL certificate and distribute it to your users. 3.8.1 Customizing the NSA’s Certificate Click Maintenance > SSL and then select Edit a self-signed CA certificate and click Edit. Maintenance > SSL NSA-220 Plus User’s Guide...
  • Page 87 “nsa220plus”, the Organization to “Test” and the Key Length to 2048. Maintenance > SSL > Edit a Self-Signed Certificate The NSA restarts its network services and returns you to the login screen. Maintenance > SSL > Edit a Self-Signed Certificate NSA-220 Plus User’s Guide...
  • Page 88: Downloading And Installing Customized Certificate

    Chapter 3 Tutorials 3.8.2 Downloading and Installing Customized Certificate Log in and return to Maintenance > SSL. Under Modify the Existing Certificate, click Download. Maintenance > SSL Save the file to your computer. Downloading the NSA’s Certificate NSA-220 Plus User’s Guide...
  • Page 89 Install the certificate. The rest of the steps in this section are an example of installing a certificate in Windows. See Appendix D on page 333 for other examples. In the Certificate dialog box, click Install Certificate. Certificate NSA-220 Plus User’s Guide...
  • Page 90 Chapter 3 Tutorials In the Certificate Import Wizard, click Next. Certificate Import Wizard: Welcome Leave Automatically select certificate store based on the type of certificate selected and click Next. Certificate Import Wizard: Certificate Store NSA-220 Plus User’s Guide...
  • Page 91 In the Completing the Certificate Import Wizard screen, click Finish. Certificate Import Wizard: Finish If you are presented with another Security Warning, click Yes. Security Warning Finally, click OK when presented with the successful certificate installation message. Certificate Import Wizard: Successful NSA-220 Plus User’s Guide...
  • Page 92: Turn On The Nsa's Web Security

    Close your web browser and open it again to reset its session with the NSA. Log in and click Maintenance > SSL. Select Force HTTPS and click Apply. Maintenance > SSL NSA-220 Plus User’s Guide...
  • Page 93 The NSA logs you out and automatically redirects your formerly non-secure (HTTP) connection to a secure (HTTPS) connection. Your browser may give you a warning about the device’s public key certificate. Add an exception to allow your browser to bypass the warning. Firefox: Secure Connection Failed NSA-220 Plus User’s Guide...
  • Page 94 Chapter 3 Tutorials Click Add Exception. Firefox: Secure Connection Failed Click Get Certificate. Firefox: Add Security Exception NSA-220 Plus User’s Guide...
  • Page 95 Chapter 3 Tutorials Before you add an exception, verify that the device to which you are trying to connect is providing the correct certificate. Click View. Firefox: Add Security Exception NSA-220 Plus User’s Guide...
  • Page 96 The SHA1 fingerprint must match the NSA’s certificate you downloaded from the NSA to your computer. (Double-click the NSA’s certificate file and then click Details and look at the Thumbprint). Click Close. Firefox: Add Security Exception NSA-220 Plus User’s Guide...
  • Page 97 Chapter 3 Tutorials If the certificate fingerprints match, click Confirm Security Exception, otherwise click Cancel. Firefox: Add Security Exception The login screen displays. HTTPS Login NSA-220 Plus User’s Guide...
  • Page 98: Using Ftps To Connect To The Nsa

    Open FileZilla and click File > Site Manager > New Site. • Configure the Host field with the NSA’s address. • Set the Servertype to FTPES - FTP over explicit TLS/SSL. • Configure the account name and password. • Click Connect. FileZilla Site Manager NSA-220 Plus User’s Guide...
  • Page 99: Using A Mac To Access The Nsa

    This tutorial shows you how to find the NSA on MAC OS X 10.5 (Leopard). You can access the NSA in two ways: • Use the Finder to browse for the NSA, or • Use the Finder > Go option to connect to the NSA. NSA-220 Plus User’s Guide...
  • Page 100: Finder

    Chapter 3 Tutorials 3.10.1 Finder Open a new Finder window. Select All under the SHARED sidebar. Look for the NSA from the Network list. NSA-220 Plus User’s Guide...
  • Page 101: Go Menu

    Chapter 3 Tutorials Expand the NSA to display the shares you may access. 3.10.2 Go Menu In the Finder, click Go > Connect to Server. NSA-220 Plus User’s Guide...
  • Page 102 Server Address field. You may also click Browse to have the MAC search for the NSA. Click Connect. Once you establish the connection, you can access the NSA from the Finder or directly from the desktop. NSA-220 Plus User’s Guide...
  • Page 103: Technical Reference

    Technical Reference...
  • Page 105: System Setting

    NSA is shut down and this may cause possible variance) • power surges occur. The NSA gives no warning if time lag occurs. You should resynchronize the time after a power surge or after you have shut down the NSA several times. NSA-220 Plus User’s Guide...
  • Page 106: The Server Name Screen

    (such as Chinese and Russian). When you perform a search in the workgroup, this option allows you to locate computers named with non-English characters. Apply Click this to save your changes. Reset Click this to restore previously saved settings. NSA-220 Plus User’s Guide...
  • Page 107: The Date/Time Screen

    Select this radio button to enter the time and date manually. When you enter the time settings manually, the NSA uses the new setting once you click Apply. Note: If you enter time settings manually, they revert to their defaults when power is lost. NSA-220 Plus User’s Guide...
  • Page 108 GMT or UTC). So in the European Union you would select March, Last, Sunday. The time you specify depends on your time zone. In Germany for instance, you would type 2 because Germany's time zone is one hour ahead of GMT or UTC (GMT+1). NSA-220 Plus User’s Guide...
  • Page 109 Click this to save your changes. If you configured a new time and date, Time Zone and Daylight Saving at the same time, all of the settings take affect. Cancel Click this to restore your previously saved settings. NSA-220 Plus User’s Guide...
  • Page 110 Chapter 4 System Setting NSA-220 Plus User’s Guide...
  • Page 111: Storage

    See Figure 5.6.2 on page 121 for details on choosing a storage method. Finding Out More Section 5.6 on page 120 for more technical background information on storage. NSA-220 Plus User’s Guide...
  • Page 112: The Storage Screen

    Note: Do not restart the NSA while the NSA is resynchronizing or recovering a volume as this will cause the synchronization to begin again after the NSA fully reboots. Note: You can access data on a RAID volume while it is resychronizing or recovering, but it is not recommended. NSA-220 Plus User’s Guide...
  • Page 113: Displaying The Storage Screen

    The NSA creates the volume name automatically. You can edit Disk Configuration This field shows which disks and data storage system the volume is using. File System This field displays the file system that an external (USB) volume is using. NSA-220 Plus User’s Guide...
  • Page 114 You can also locate or eject an external volume. Note: If you delete a volume, all data in the volume disk(s) is erased. You see a warning screen before you delete a volume. Figure 22 Delete a Volume Warning Screen NSA-220 Plus User’s Guide...
  • Page 115: Creating An Internal Volume

    Use this screen to create a new NSA internal disk drive volume. Note: Creating a volume formats the hard drive. All data on the disk will be lost. Figure 23 Storage > Create an Internal Volume NSA-220 Plus User’s Guide...
  • Page 116: Volume Status

    The NSA has the following classifications for the status of a volume: • Healthy if all disks in the volume are OK and the file system is functioning properly. • OK means the USB connected device is functioning properly. • Resync when you create a RAID volume. NSA-220 Plus User’s Guide...
  • Page 117: Editing A Volume

    Click an internal volume’s Edit icon in the Storage screen as shown in Figure 21 on page 113 to open the following screen. Use this screen to change the volume’s name. Figure 24 Storage > Edit NSA-220 Plus User’s Guide...
  • Page 118: Creating An External Volume

    Use this screen to create a new NSA external disk drive volume. Note: Creating a volume formats the drive. All data on the disk will be lost. Figure 25 Storage > Create an External Volume NSA-220 Plus User’s Guide...
  • Page 119: External Disks

    Click this to exit this screen without saving changes. 5.5.1 External Disks You may connect USB storage devices that support the following file systems to the NSA. • Windows File Systems: NTFS, FAT32 and FAT16. • Linux File Systems: ReiserFS, EXT2, and EXT3. NSA-220 Plus User’s Guide...
  • Page 120: Storage Technical Reference

    Storage efficiency assumes all drives are of identical size. Performance rankings are approximations. Table 20 RAID Quick Comparison RAID Level Number of Disks Capacity S*N/2 Storage 100% Efficiency Fault Tolerance None YYYY Availability YYYY Read YYYY Performance Write YYYY Performance NSA-220 Plus User’s Guide...
  • Page 121: Choosing A Storage Method For A Volume

    JBOD (Just a Bunch Of Disks) is not a RAID storage method but it is included in this discussion. These are some terms that you need to know in order to understand storage systems. NSA-220 Plus User’s Guide...
  • Page 122 (with one disk in each), a failure of one disk (volume) should not affect the other volume (disk). JBOD read performance is not as good as RAID as only one disk can be read at a time and they must be read sequentially. The following figure NSA-220 Plus User’s Guide...
  • Page 123 RAID 1 RAID 1 creates an exact copy (or mirror) of a set of data on another disk. This is useful when data backup is more important than data capacity. The following NSA-220 Plus User’s Guide...
  • Page 124 ZyXEL’s ZyWALL UTM products for example). • Use anti-virus software on your computer to scan files from others before saving the files on the NSA. • Keep another copy of important files (preferably in another location). NSA-220 Plus User’s Guide...
  • Page 125: Network

    The bigger the frame, the better the network performance. Your network equipment such as computers, switches and routers must be capable of supporting jumbo frames. You also need to enable jumbo frames in all related network devices. NSA-220 Plus User’s Guide...
  • Page 126: The Tcp/Ip Screen

    In the following example, the NSA has jumbo frames enabled and set to 8KB frames. This means the computer, notebook computer, and switch must also have jumbo frames enabled and be capable of supporting 8KB frames. Figure 26 Jumbo Frames 1 Gbps Ethernet NSA-220 Plus User’s Guide...
  • Page 127: Configuring The Tcp/Ip Screen

    Static Select this option for the NSA to use fixed TCP/IP information. You must fill in the following fields. IP Address Type an IP address in this field. NSA-220 Plus User’s Guide...
  • Page 128 Click this to save your TCP/IP configurations. After you click Apply, the NSA restarts. Wait until you see the Login screen or until the NSA fully boots and then use the NDU to rediscover it. Reset Click this to restore your previously saved settings. NSA-220 Plus User’s Guide...
  • Page 129: The Pppoe Screen

    Password Enter the password associated with the username above. Password Retype the password for confirmation. (Confirm) Apply Click this to save your changes. Reset Click this to restore previously saved settings. NSA-220 Plus User’s Guide...
  • Page 130 Chapter 6 Network NSA-220 Plus User’s Guide...
  • Page 131: Applications

    File Transfer Protocol (FTP) is a file transfer service that operates on the Internet. A system running the FTP server accepts commands from a system running an FTP client. FTP is not a secure protocol. Your file transfers could be subject to snooping. NSA-220 Plus User’s Guide...
  • Page 132 You start sharing the file as soon as you have downloaded a single chunk. Web Publishing Web publishing lets you “publish” shares (containing folders and files) on the NSA so people can access the files using a web browser without having to log into the NSA-220 Plus User’s Guide...
  • Page 133: The Ftp Screen

    Note: Your FTP client must be set to use FTP over TLS in order to use FTPS with the NSA. If your FTP client offers multiple types of FTP over TLS, use explicit encryption. Figure 29 Applications > FTP NSA-220 Plus User’s Guide...
  • Page 134 This setting applies to all FTP client connections to the NSA. It does not affect your Windows/CIFS connections (it will not correct the character display in Windows Explorer). Apply Click this to save your changes. Reset Click this to restore your previously saved settings. NSA-220 Plus User’s Guide...
  • Page 135: The Media Server Screen

    DRM (Digital Rights Management). At the time of writing, you can use your Apple account ID and password to authorize up to a total of five computers to play the files. To authorize a computer, open iTunes and click Store > Authorize Computer. NSA-220 Plus User’s Guide...
  • Page 136: Configuring The Media Server Screen

    Click Applications > Media Server to open the following screen. Use this screen to turn the media server and/or iTunes server on or off and select shares to publish (share with media clients like iTunes). Figure 31 Applications > Media Server NSA-220 Plus User’s Guide...
  • Page 137 Select this option to let anyone on your network use iTunes to play music and video files in the published shares. Apply Click this to save your changes. Reset Click this to restore your previously saved settings. NSA-220 Plus User’s Guide...
  • Page 138: The Download Service Screen

    The NSA automatically uses the torrent file. After your BitTorrent download and sharing are finished, you can go to the incoming folder within the destination share or folder and delete the .torrent file if you need to free up hard disk space. NSA-220 Plus User’s Guide...
  • Page 139: Configuring The Download Service Screen

    BitTorrent download task, also deletes the related .torrent file. Use your keyboard’s [SHIFT] key to select a range of download tasks. Use the [CTRL] key and click individual download tasks to select multiple individual download tasks. NSA-220 Plus User’s Guide...
  • Page 140 Queued: The download is waiting in line for the NSA to download it. Pause: The download has been manually stopped. Select it and click Resume to continue it. Error: The NSA was not able to complete the download. Select it and click Resume to reattempt the download. NSA-220 Plus User’s Guide...
  • Page 141 Internet connection, the speed of the download source’s Internet connection, how many others are trying to download at the same time, the peers and seeds available and general network conditions. NSA-220 Plus User’s Guide...
  • Page 142: Adding A Download Task

    This is the location of the share where the NSA will save the downloaded files. Click Edit to go to a screen where you can set the default location for saving downloads and configure your BitTorrent settings. NSA-220 Plus User’s Guide...
  • Page 143: Link Capture Browser Plugin

    Section 3.3.2 on page 62 Section 3.3.3 on page 67 for tutorials about installing and using the link capture browser plugin. Note: At the time of writing, the plugin supports Internet Explorer 6.0/7.0 and Mozilla Firefox 2.0/3.0. NSA-220 Plus User’s Guide...
  • Page 144: Download Service Notification

    Apply. An RSS feed icon appears. Click the icon to subscribes the NSA’s download list to an RSS reader. Note: The download service notification only keeps track of files downloaded via BitTorrent. Figure 35 Download Service Notification NSA-220 Plus User’s Guide...
  • Page 145: Configuring Download Service General Settings

    Browse and navigate to the file’s location. Download Period This feature sets the NSA to download files only within a specified Control time period. Enable Download Use the check box to turn the download period control on or off. Period Control NSA-220 Plus User’s Guide...
  • Page 146: Configuring The Bittorrent Settings

    7.4.7 Configuring the BitTorrent Settings Click Applications > Download Service > Preferences > BitTorrent to open the following screen. Use this screen to configure BitTorrent settings. Figure 37 Applications > Download Service > Preferences > BitTorrent NSA-220 Plus User’s Guide...
  • Page 147 150% in the Upload/Download Ratio field and 120 minutes in the Seeding Time field. The NSA keeps sharing a file until it has shared 1.5 times the size of the file and has passed 120 minutes. NSA-220 Plus User’s Guide...
  • Page 148 Click this to save a copy of the IP filter table on your computer. Filter Table Apply Click this to save your changes. Reset Click this to restore your previously saved settings. Cancel Click this to return to the previous screen without saving. NSA-220 Plus User’s Guide...
  • Page 149: Displaying The Download Task Information

    If the health value is less than 1 (0.65 for example), there is no full copy of the file, and the NSA may not be able to complete downloading the file. Time Left This is the time remaining to complete the download task. NSA-220 Plus User’s Guide...
  • Page 150: Bittorrent Security

    Ideally your firewall should have all of the following. Figure 39 Firewall Hacking Malicious Packets Viruses • Stateful packet inspection to control access between the Internet and your network and protect your NSA (and computers) from hacking attacks. NSA-220 Plus User’s Guide...
  • Page 151 To speed up BitTorrent file transfers, configure your firewall’s port forwarding to send incoming TCP port 6881 and UDP port 6880 connections to the NSA. You probably need to use your firewall’s HTML (web-based) configuration interface to NSA-220 Plus User’s Guide...
  • Page 152: The Web Publishing Screen

    7.5 The Web Publishing Screen Click Applications > Web Publishing to open the following screen. Use this screen to turn web publishing on or off and select shares to publish. Figure 42 Applications > Web Publishing NSA-220 Plus User’s Guide...
  • Page 153: Web Publishing Example

    This example covers how to configure the Web Publishing screen to let people use a web browser to access a share named FamilyPhotos without logging into the My NSA screens and shows how to access the share through the Internet. NSA-220 Plus User’s Guide...
  • Page 154 Chapter 7 Applications Click Applications > Web Publishing and configure the screen as shown (enable the web publishing and move FamilyPhotos over to Published Shares) and click Apply. Figure 43 Applications > Web Publishing (Example) NSA-220 Plus User’s Guide...
  • Page 155: Web Publishing

    For example, if you want to share photos in a FamilyPhotos share, you could “web publish” it and others could use a web browser to access the photos at http://my- NSA’s-IP-Address/MyWeb/FamilyPhotos. NSA-220 Plus User’s Guide...
  • Page 156 NAT or port forwarding settings on your Internet gateway specifically for allowing access to the web-published shares and another separate set of rules for accessing the NSA’s web configurator. NSA-220 Plus User’s Guide...
  • Page 157 In the following example, the Internet gateway’s firewall is configured to allow anyone to access the NSA’s web-published screens using port 8080. Web configurator access (port 80) however, is only allowed from IP address a.b.c.d. Figure 45 Web Publishing Port Number Example 8080 e.f.g.h 8080 a.b.c.d NSA-220 Plus User’s Guide...
  • Page 158: The Broadcatching Screen

    Select a channel and click Refresh Channel to check for new files. Channel Edit Channel Select a channel and click Edit Channel to open a screen where you can set the channel’s download and delete policies. NSA-220 Plus User’s Guide...
  • Page 159 Actions Start Downloading: Click this to add the file to the NSA’s download queue or check the file’s status in the NSA’s download service. Click the Delete icon to remove the file from the channel’s list. NSA-220 Plus User’s Guide...
  • Page 160: Adding Or Editing A Broadcatching Channel

    Click Applications > Broadcatching, then select a channel and click Edit Channel to open a similar Edit screen. Use the Edit Channel screen to change the download or delete policies. Figure 48 Applications > Broadcatching > Add Channel NSA-220 Plus User’s Guide...
  • Page 161: Channel Guides

    Here are some popular broadcatching channel guide web sites. Note: ZyXEL does not endorse these web sites and is not responsible for any of their contents. Use these or any other web sites at your own risk and discretion. http://www.zencast.com/ http://www.miroguide.com/ http://www.vuze.com/ http://www.mefeedia.com/ http://www.vodstock.com/ NSA-220 Plus User’s Guide...
  • Page 162: The Print Server Screen

    See www.zyxel.com for a list of compatible printers. Figure 49 Printer Sharing 7.7.2 Configuring the Print Server Screen Click Applications > Print Server to open the following screen. Figure 50 Applications > Print Server NSA-220 Plus User’s Guide...
  • Page 163: Print Server Rename

    Type a new name to identify the printer. The name must be unique from all the other names of printers connected to the NSA. Apply Click this to save your changes. Cancel Click this to return to the previous screen without saving. NSA-220 Plus User’s Guide...
  • Page 164: The Copy/Sync Button Screen

    Both storage devices contain file A. • A copy of files A and B from the USB device is transferred to the NSA. • File A from the USB device replaces file A on the NSA. NSA-220 Plus User’s Guide...
  • Page 165: Synchronizing Files

    • A copy of files A and B from the USB device is transferred to the NSA. • File A from the USB device replaces file A on the NSA. • File C on the NSA is deleted. NSA-220 Plus User’s Guide...
  • Page 166 • File B from the NSA replaces file B on the USB device. • A copy of file C from the USB device is transferred to the NSA. • A copy of file D from the NSA is transferred to the USB device. NSA-220 Plus User’s Guide...
  • Page 167: Configuring The Copy/Sync Button Screen

    Backup Files to be This option is only available if you do not select Create a New Replaced Folder for Copied Files. Select this option to save the files that will be replaced by the source files. NSA-220 Plus User’s Guide...
  • Page 168 It is recommended to create a specific share (such as “backup”) for backup purposes. Apply Click this to save your changes. The configuration file is saved on the USB device. Reset Click this to restore your previously saved settings. NSA-220 Plus User’s Guide...
  • Page 169: The Flickr/Youtube Screen

    Service This field displays the name of a sharing website to which the NSA can Name automatically upload files. Account This field displays the username of the account to use with the auto Information upload feature. NSA-220 Plus User’s Guide...
  • Page 170: Configuring The Flickr Settings

    Click OK to continue the authorization process. Figure 57 Linking NSA to Flickr The web browser opens the Yahoo! Flickr login page. Enter your Yahoo account’s information and click Sign In. Figure 58 Yahoo! Flickr Login Page NSA-220 Plus User’s Guide...
  • Page 171 IT to establish a link between the NSA and your Flickr account. Figure 59 Flickr Authorization A confirmation page displays indicating successful authorization. Return to the NSA web configurator. Click Get Ready in the following screen to complete the authorization process. Figure 60 Confirming Flickr Authorization NSA-220 Plus User’s Guide...
  • Page 172 Chapter 7 Applications Once the NSA is associated with your Flickr account, you can configure auto upload settings in the following screen. Figure 61 Applications > Auto Upload > Flickr/YouTube > Config (Flickr) NSA-220 Plus User’s Guide...
  • Page 173 If you click Apply without selecting a folder, a forward slash (/) displays in the Path field. All contents within the specified share are selected for auto upload. Click this to add the specified share or folder to the Folder Watch List. Grace Period Setting NSA-220 Plus User’s Guide...
  • Page 174 Select a content type for your files. You can choose Photo, Type Screenshot, or Other. Other types may include illustration, art, animation and etc. Apply Click this to save your changes. Reset Click this to begin restore your previously saved settings. NSA-220 Plus User’s Guide...
  • Page 175: Configuring The Youtube Settings

    If you have not authorized a YouTube account on the NSA, the following screen displays. Enter your Google e-mail address and password in the fields and click OK to authorize the service. Figure 62 YouTube Account Settings NSA-220 Plus User’s Guide...
  • Page 176 Chapter 7 Applications Once the NSA is associated with your YouTube account, you can configure auto upload settings in the following screen. Figure 63 Applications > Auto Upload > Flickr/YouTube > Config (YouTube) NSA-220 Plus User’s Guide...
  • Page 177 If you click Apply without selecting a folder, a forward slash (/) displays in the Path field. All contents within the specified share are selected for auto upload. Click this to add the specified share or folder to the Folder Watch List. Grace Period Setting NSA-220 Plus User’s Guide...
  • Page 178: The Ftp Uploadr Screen

    FTP server. Use this screen to configure the FTP Uploadr. Click Applications > Auto Upload > FTP Uploadr to open the screen shown next. Figure 64 Applications > Auto Upload > FTP Uploadr NSA-220 Plus User’s Guide...
  • Page 179 This is the port number used by the FTP server. Remote Path The NSA automatically uploads files to this location. Account Name This is the login account for the FTP server. Description This is the information related to the FTP server. NSA-220 Plus User’s Guide...
  • Page 180: Adding Or Editing An Ftp Server Entry

    Enter the path to where the NSA automatically uploads files. Description Enter additional information about this FTP server. Test Connection Click this to test your setttings. Apply Click this to save your changes. Cancel Click this return to the previous screen without saving. NSA-220 Plus User’s Guide...
  • Page 181: The Ftp Uploadr Preferences Screen

    FTP server. Action Use the Remove icon to remove a share from the Folder Watch List. Shares Select a share for auto upload from the drop-down list. NSA-220 Plus User’s Guide...
  • Page 182 Internet connection has restricted upload speed. Apply Click this to save your changes in this section. Reset Click this to restore previously saved settings. Close Click this to return to the previous screen without saving. NSA-220 Plus User’s Guide...
  • Page 183: Package Management

    Kad protocol. • DyDNS - This gives your NSA a domain name with a dynamic IP address. At the time of writing, this package supports accounts from the following service providers: DynDNS, NoIP, 3322, ZoneEdit, and DHS. NSA-220 Plus User’s Guide...
  • Page 184: Package Management Screen

    NSA to an internal drive, external storage device or to another NSA in the network. The following applications come with their own web configurator and documentation: • Gallery • PHP-MySQL-phpMyAdmin • SqueezeCenter • WordPress 8.4 Package Management Screen Use this screen to download and install applications from the web. NSA-220 Plus User’s Guide...
  • Page 185 This is only available if you have previously installed the package. Package Info Select an item on the list and click this to display information about the package. See Section 8.4.1 on page 187 for more details. NSA-220 Plus User’s Guide...
  • Page 186 Note: Once you install an application and enable it, additional links show up in the navigation panel. This applies to eMule, DyDNS, NFS, SMART and BackupPlanner. For Gallery, PHP-MySQL-phpMyAdmin, SqueezeCenter and WordPress, you can access the applications’ web configurators through the Package Management screen. NSA-220 Plus User’s Guide...
  • Page 187: Displaying The Package Information

    This shows the location of the screens, console or web configurator Page where you can manage the application (after the package has been installed on the system). Source This shows the location of the installed files of the application. NSA-220 Plus User’s Guide...
  • Page 188: Emule Screens

    Add Server Click this to add an eMule server. A server provides a list of available files for download, users sharing them and other information. Refer to Section 8.5.2 on page 189 for the Add Server screen. NSA-220 Plus User’s Guide...
  • Page 189: Add Server

    This shows the number of files available for download in the server. You see a warning screen before you delete a server. Figure 70 Delete a Server 8.5.2 Add Server Use this screen to add a server for the eMule application. NSA-220 Plus User’s Guide...
  • Page 190: Edit Server

    8.5.3 Edit Server Use this screen to edit a server for the eMule application. Click Edit in the Applications > eMule > Server screen to edit a server. Figure 72 Applications > eMule > Server: Edit NSA-220 Plus User’s Guide...
  • Page 191: My Info

    NSA is ED2k IP This is the IP address of the eMule server to which the connected NSA is ED2k Port This is the port number of the eMule server to which the connected NSA-220 Plus User’s Guide...
  • Page 192: Emule Task Screen

    Figure 74 Applications > eMule > Task The following table describes the labels in this screen. Table 51 Applications > eMule > Task LABEL DESCRIPTION Task Enable eMule Check this and click Apply to enable the eMule application. NSA-220 Plus User’s Guide...
  • Page 193 Use this field to set the priority for the task. Choose from Auto, Low, Normal or High. Select Auto to have the NSA automatically determine the task’s priority. Select High to have the NSA complete this task before the others. NSA-220 Plus User’s Guide...
  • Page 194: Add Task

    Depending on its status, it can eventually show up in the other tabs (Newly Completed, Uploading or Shared Files tabs). You see a warning screen before you delete a task. Figure 75 Delete a Task 8.5.6 Add Task Use this to add a download task to the NSA. NSA-220 Plus User’s Guide...
  • Page 195 (Move completed downloads to). The Share column shows the name of the share where the file is downloaded. The Path column points to the location in the share where the NSA will save the downloaded files. NSA-220 Plus User’s Guide...
  • Page 196: Preferences

    Click this to return to the previous screen without saving. 8.5.7 Preferences Use this screen to configure your eMule settings, such as port numbers to use, its download/upload rates and the maximum number of peers allowed to connect to the NSA. NSA-220 Plus User’s Guide...
  • Page 197 (Move completed downloads to). The Share column shows the name of the share where the file is downloaded. The Path column points to the location in the share where the NSA will save the downloaded files. NSA-220 Plus User’s Guide...
  • Page 198 Enter the maximum download rate for download tasks. rate Max. upload rate Enter the maximum upload rate for upload tasks. Connection Maximum Enter the maximum number of eMule peer-to-peer connections. Number of Active Connections IP Filter NSA-220 Plus User’s Guide...
  • Page 199: Edit Ip Filter

    Select Upload IP Filter Table if you want to use an IP filter table from your local computer. Apply Click this to save your changes. Reset Click this to return to the previous screen without saving. NSA-220 Plus User’s Guide...
  • Page 200: Share Browsing

    Upload Click this to add files to the share. Use Browse to locate a file and click Apply to upload the file. Note that the size of each file should be less than 2 GB. NSA-220 Plus User’s Guide...
  • Page 201: Task Info

    This field displays a file’s latest modification date. Close Click this to close the screen. 8.5.10 Task Info Use this screen to view eMule task details, such as status, file name, file size and its download progress. NSA-220 Plus User’s Guide...
  • Page 202 This shows the download speed for the task. Time Left This shows how much time is needed to complete the task. Priority This shows the priority of this task. You can set this in Section 8.5.5 on page 192. NSA-220 Plus User’s Guide...
  • Page 203: Emule Search Screen

    Enter the file extensions separated by commas of files you want included in the search results. Search Click this to have the NSA search the eMule network for files that match the criteria you have set. Clear Click this to clear the fields. NSA-220 Plus User’s Guide...
  • Page 204: Dydns Screen

    Your friends or relatives will always be able to call you even if they don't know your IP address. Click Network > DyDNS to open the following screen. Figure 82 Network > DyDNS NSA-220 Plus User’s Guide...
  • Page 205: Nfs Screen

    Use this screen to enable and configure Network File System (NFS) settings on your NSA. NFS is a client/server distributed file service that provides transparent file sharing for network environments. This allows shared folders in your NSA to be accessible like a local folder in a user’s computer. NSA-220 Plus User’s Guide...
  • Page 206 This shows which domain name(s) or IP address(es) have read/write access to the NFS shares. Refer to Section 8.7.1 on page 207 for the screen where you can configure this. Comment This shows a short description of the share. NSA-220 Plus User’s Guide...
  • Page 207: Add/Edit Nfs Share

    Enter the name you want to give to the NFS share. Full Path This shows the location of the NFS share in the NSA. The NFS server assigns this path to the share folder you input. Comment Enter a short description for the share. NSA-220 Plus User’s Guide...
  • Page 208: Nfs Session

    Connected At This shows to which domain/IP address the user accessing the NFS share belongs. IP Address This shows the IP address of the user accessing the NFS share. Click this to close the window. NSA-220 Plus User’s Guide...
  • Page 209: Smart Screen

    This shows the condition of the hard disk volume. Go to Section 5.3.1 on page 116 for more information. Name This shows the name assigned to the hard disk. Temperature This shows the temperature of the hard disk in degrees celsius. NSA-220 Plus User’s Guide...
  • Page 210: Smart Brief Summary

    Figure 88 Storage > S.M.A.R.T: Brief Summary The following table describes the labels in this screen. Table 63 Storage > S.M.A.R.T: Brief Summary LABEL DESCRIPTION Brief Summary Temperature This shows the current temperature of the hard disk in degrees celsius. NSA-220 Plus User’s Guide...
  • Page 211: Smart Full Summary

    Click this to close the window. 8.8.2 SMART Full Summary Use this screen to display more details information about the volume. Click Full Summary in the Storage > S.M.A.R.T screen to display the following. Figure 89 Storage > S.M.A.R.T: Full Summary NSA-220 Plus User’s Guide...
  • Page 212 This indicates when the hard drive updates the value for this attribute. • Always means the hard drive updates this attribute during normal operation and during offline activities. • Offline means the hard drive only updates this attribute when no one is accessing the hard drive. NSA-220 Plus User’s Guide...
  • Page 213: Protect Screens

    • Restore screens - These include steps to restore previous backups made with the NSA. 8.10 Backup Screens Use this screen to create and customize scheduled backup jobs for your files. You can have several backup jobs for specific folders and time periods. NSA-220 Plus User’s Guide...
  • Page 214 This shows the backup schedule, including the frequency, the time it was last run in (and whether or not it succeeded), and when it is scheduled to run again. The times use yyyy-mm-dd hh:mm:ss format. Refer to Section 8.10.4 on page 221. NSA-220 Plus User’s Guide...
  • Page 215: Backup: Step 1

    Table 66 Protect > Backup: Step 1 LABEL DESCRIPTION Job Information Job Name Enter a name to identify the backup job. Job Description Enter a short description (up to 100 keyboard characters) for the backup job. NSA-220 Plus User’s Guide...
  • Page 216 Publish- The NSA does a backup of individual files to the target folder without overwriting existing files in that folder. It makes the target folder identical to the source folder. Next Click this to go to the next step. NSA-220 Plus User’s Guide...
  • Page 217: Backup: Step 2

    Chapter 8 Package Management 8.10.2 Backup: Step 2 Use this screen to specify where the files you want to backup are located and set where you want the backup to be stored. Figure 92 Protect > Backup: Step 2 NSA-220 Plus User’s Guide...
  • Page 218 A list of your select folders and files displays below the selection fields. Selected Source This shows the path of the backup source folder you selected. Folders Backup Target Select the target folder where you want to place your backup. NSA-220 Plus User’s Guide...
  • Page 219 Select this if you have a USB hard disk connected to the NSA that you want to use for your backup. Select the folder where you want to place the backup. Previous Click this to go back to the previous screen. Next Click this to go to the next screen. NSA-220 Plus User’s Guide...
  • Page 220: Backup: Step 3

    Bandwidth Restrict the bandwidth of synchronization backups to help stop them from using all of your network connection’s available bandwidth. This is more important when backing up to a remote NSA or computer through the Internet. NSA-220 Plus User’s Guide...
  • Page 221: Backup: Step 4

    The following table describes the labels in this screen. Table 69 Protect > Backup: Step 4 LABEL DESCRIPTION Scheduler Backup Select from Hourly, Daily, Weekly and Monthly backup intervals. Frequency The screen changes depending on the item you select. NSA-220 Plus User’s Guide...
  • Page 222: Edit Job Screen

    Click this to close the screen. 8.10.5 Edit Job Screen Use this screen to edit an existing backup job. Some attributes of the backup job cannot be changed, such as the name, backup type, source folder and so on. NSA-220 Plus User’s Guide...
  • Page 223: Edit Job: Step 1

    If the target location is a remote NSA, this shows the remote IP address. Target Path This field is read-only and shows the target folder for the backup files. NSA-220 Plus User’s Guide...
  • Page 224 Keep Backups for n day(s)(1-3650). Enter a value (n) from 1 to 3650 to specify how many days the NSA stores all backup files. After this day has expired, all backup files will be deleted. Next Click this to go to the next screen. NSA-220 Plus User’s Guide...
  • Page 225: Edit Job: Step 2

    Enter the interval between days when the NSA performs the backup job. Every how many This is only available if you selected Weekly as your backup weeks? frequency. Enter the interval between weeks when NSA performs the backup job. NSA-220 Plus User’s Guide...
  • Page 226: Restore Archive Screen

    Table 72 Protect > Backup > Restore Archive: Step 1 LABEL DESCRIPTION Step 1. Select Select a previous archive backup that you want to restore to the NSA. Restore Source Job Information Job Name This is the name to identify the backup job. NSA-220 Plus User’s Guide...
  • Page 227: Restore Archive: Step 2

    Select the folder where the backup you want to restore is located. Selected Folder This shows the path of the folder you selected. Previous Click this to go back to the previous screen. Next Click this to go to the next screen. NSA-220 Plus User’s Guide...
  • Page 228: Restore Archive: Step 3

    Click Apply to save your settings and Cancel to close the screen. Previous Click this to go back to the previous screen. Done Click this to run the restore process and go back to the Backup screen. NSA-220 Plus User’s Guide...
  • Page 229: Restore Screen

    Enter the password of your NSA account. Share Name Enter the name of the share you want to use. Test Connection Click this to test your connection to the remote NSA that you have specified in the fields above. NSA-220 Plus User’s Guide...
  • Page 230: Restore: Step 2

    Click Apply to save your settings and Cancel to close the screen. Next Click this to go to the next screen. 8.11.2 Restore: Step 2 Select a previous archive backup that you want to restore to the NSA. Figure 101 Protect > Restore: Step 2 NSA-220 Plus User’s Guide...
  • Page 231: Restore: Step 3

    Next Click this to go to the next screen. 8.11.3 Restore: Step 3 Use this screen to select the folder where the archive you want to restore is located. Figure 102 Protect > Restore: Step 3 NSA-220 Plus User’s Guide...
  • Page 232: Restore: Step 4

    Click this to go to the next screen. 8.11.4 Restore: Step 4 Use this screen to select the location in the NSA where you want to restore your backup. Figure 103 Protect > Restore: Step 4 NSA-220 Plus User’s Guide...
  • Page 233: Technical Reference

    This section provides technical background information on the topics discussed in this chapter. 8.12.1 S.M.A.R.T Attributes The following table describes some common S.M.A.R.T. attributes. If a higher or lower raw attribute value is better, it is indicated in the BETTER column. Since NSA-220 Plus User’s Guide...
  • Page 234 Cycle Count through a full power on and power off. Soft Read Error This is the number of uncorrected read errors the hard Rate drive has reported. If this is not zero, back up your data. NSA-220 Plus User’s Guide...
  • Page 235 Run Out Cancel This is the number of ECC (Error Correction Code) errors. Soft ECC This is the number of errors corrected by software ECC Correction (Error Correction Code). NSA-220 Plus User’s Guide...
  • Page 236 Temperature This is the hard drive’s temperature. Head Flying This is the total time that the head has been positioning. Hours Read Error This is the number of errors in reading from the disk. Retry Rate NSA-220 Plus User’s Guide...
  • Page 237: Users

    240) to edit the properties of an existing account. • Use the User Info screen (Section 9.4 on page 242) to display the amount of volume space used by a selected account and the account’s membership in any groups. NSA-220 Plus User’s Guide...
  • Page 238: The Users Screen

    Search to look up the account you specified. Click Clear to close the search function. Edit User Select an account and click this to open a screen where you can edit the properties of the account. NSA-220 Plus User’s Guide...
  • Page 239: User Icons

    This field displays the usernames of each account. 9.2.1 User Icons The following table describes the user icons. Table 81 User Icons ICON DESCRIPTION The blue icon is for an administrator account. The green icon is for a user account. NSA-220 Plus User’s Guide...
  • Page 240: Adding Or Editing An Account

    This field lists the groups created on the NSA. Group Membership This field lists the groups that the selected account belongs to. Add Selected Select a group from the Available Groups list and click this to Group(s) add the account to that group. NSA-220 Plus User’s Guide...
  • Page 241: Usernames

    • The username cannot be the same as a system username such as ANONYMOUS_FTP nor be the same as an existing user. Other reserved usernames that are not allowed are: • bin • daemon • ftp • anonymous-ftp • nobody • root • pc-guest • admin NSA-220 Plus User’s Guide...
  • Page 242: Displaying User Info

    This field displays how much storage space the selected account is currently using. This only applies for files that the user saved onto the NSA while logged in with that username. Click this to close the current screen. NSA-220 Plus User’s Guide...
  • Page 243: Groups

    245) to edit the properties of an existing group. 10.2 The Groups Screen Use this screen to create and manage groups. Click Sharing > Groups to display the screen shown next. Figure 107 Sharing > Groups NSA-220 Plus User’s Guide...
  • Page 244 Click the drop-down menu to select a page number. Jump to a different page to display and access more groups. Status This field displays the group icon. Group Name This field displays the group names created on the NSA. NSA-220 Plus User’s Guide...
  • Page 245: Adding Or Editing A Group

    Select a user account from the Group Membership list and User(s) click this to remove the account from the group. Apply Click this to save your changes. Cancel Click this to return to the previous screen without saving. NSA-220 Plus User’s Guide...
  • Page 246: Group Names

    • The group name cannot be the same as a system group name such as EVERYONE nor be the same as an existing group. Other reserved groups names that are not allowed are: • nobody • root NSA-220 Plus User’s Guide...
  • Page 247: Shares

    • Use the Change Share Properties screen (Section 11.3 on page 250) to edit a share’s properties. • Use the Share Browser screen (Section 11.5 on page 254) to navigate, add and edit the contents in a share. NSA-220 Plus User’s Guide...
  • Page 248: The Shares Screen

    Select a share and click this to edit the share. Delete Share Select a share and click this to remove or restrict access to the share. Share Browser Select a share and click this to browse the share’s contents. NSA-220 Plus User’s Guide...
  • Page 249 This field displays the access permission of a share. Everyone on the network can access a Public share. Only the share owner can access a Private share. An Advanced share allows you to assign specific access rights (read-only for example) to individual users/groups. NSA-220 Plus User’s Guide...
  • Page 250: Adding Or Editing Share

    The media clients do not have to use a password to play the Server shares you publish. Publish this Select this option to let people use a web browser to access this share’s share to Web files without logging into the My NSA screens. NSA-220 Plus User’s Guide...
  • Page 251: Configuring Advanced Share Access

    Share Access drop-down list. Click Edit to open the following screen. Use this screen to configure share access rights for individual users and groups. Figure 111 Sharing > Shares > Add Share (or Edit Share) > Advanced NSA-220 Plus User’s Guide...
  • Page 252: Public And Anonymous Share Access Rights

    If you make a share public, users do not need to log in. With ANONYMOUS FTP, you must enter either 'anonymous' or 'ftp' as the username. Any other name is considered a username, so must be valid and have a corresponding correct password. NSA-220 Plus User’s Guide...
  • Page 253: The Recycle-Bin Configuration Screen

    NSA. Clean all recycle bins Click this to immediately remove contents from all recycle bins. Apply Click this to save your changes. Cancel Click this to return to the previous screen without saving. NSA-220 Plus User’s Guide...
  • Page 254: The Share Browser Screen

    See Section 2.5.5 on page 38 for more information on folder names. Upload Click this to add files to the share. Use Browse to locate a file and click Apply to upload the file. NSA-220 Plus User’s Guide...
  • Page 255 You can also click the folder’s name to navigate to a sub-folder within the folder. Size This field displays a file size. Modified Date This field displays a file’s latest modification date. Close Click this to close the screen. NSA-220 Plus User’s Guide...
  • Page 256: Moving Or Copying Files

    If you click Apply without selecting a folder, a forward slash displays in the Path field. All contents within the specified share are selected. Click this to move or copy the file to the designated share. Close Click this to return to the Share Browser screen. NSA-220 Plus User’s Guide...
  • Page 257: Maintenance Screens

    271) to configure HTTPS and the NSA’s SSL certificate. • Use the Firmware Upgrade screen (Section 12.7 on page 274) to upload new firmware. • Use the Shutdown screen (Section 12.8 on page 275) to restart or shut down your NSA. NSA-220 Plus User’s Guide...
  • Page 258: The Power Management Screen

    Enter the number of minutes the NSA will sit idle before spinning the disk(s) hard disks down to sleep. The default power-off time is 3 minutes. Apply Click this to save your changes in this section. Reset Click this to restore your previously saved settings. Minimum UPS Capacity NSA-220 Plus User’s Guide...
  • Page 259 Select this option to have the NSA turn itself off and on or reboot Control according to the schedules you configure. Schedule Click Edit to go to the screen where you can configure the power control schedules. Apply Click this to save your changes in this section. NSA-220 Plus User’s Guide...
  • Page 260: Editing The Power Control Schedule Screen

    (when the NSA is to turn on, turn off, or reboot). Actions Click the Delete icon to remove a power control schedule from the list. Add Power Use this part of the screen to configure power on, power off, and reboot Control times. Schedule NSA-220 Plus User’s Guide...
  • Page 261 Use this part of the screen to configure power on, power off, and reboot the day of the times. month Click this to add the power control schedule to the list. Apply Click this to save your changes. Cancel Click this to return to the previous screen without saving. NSA-220 Plus User’s Guide...
  • Page 262: The Log Screen

    This displays a description of the log. Click the top of the column to sort by alphabetical or reverse alphabetical order. First/Prev Use these hyperlinks to navigate to the first or previous log page. Next/Last Use these hyperlinks to navigate to the next or final log page. NSA-220 Plus User’s Guide...
  • Page 263: Log Classes

    Here are some example log messages. Table 97 Log Messages CLASS SEVERITY MESSAGE Auto upload INFO %s is queued. Auto upload INFO %s uploaded (Flickr or YouTube Upload). Auto upload WARNING error uploading "%s" (%s): %s NSA-220 Plus User’s Guide...
  • Page 264 Button Copy/Sync INFO [USB Sync] Finished. Elapsed Time %s Seconds. Button Copy/Sync INFO [USB Sync] Moving %s from Internal Volume to Backup Button Folder. Copy/Sync INFO [USB Sync] Moving %s from USB to Backup Folder Button NSA-220 Plus User’s Guide...
  • Page 265 Service Download INFO Download service set TCP port to %d and UDP port to %d Service Download INFO Download service set torrent monitor location to %s Service Download INFO Download service start to download %s Service NSA-220 Plus User’s Guide...
  • Page 266 %s is inactive because of changing Port Group. Disable DHCP client. Network NOTICE %s MTU > (%s MTU - 8), %s may not work correctly. Network NOTICE (%s MTU - 8) < %s MTU, %s may not work correctly. Network NOTICE Add interface %s. NSA-220 Plus User’s Guide...
  • Page 267 NOTICE FTP server starts Services NOTICE MyClock has changed daylight saving interval Services NOTICE MyClock has disabled daylight saving interval Services NOTICE NTP server has set to '%s' Services NOTICE NTP server has set to null NSA-220 Plus User’s Guide...
  • Page 268 Cancel Internal Volume Scan: FAILED Volume Storage - ERROR Cannot Unmount Volume and RAID. System Busy Using Volume Volume and RAID: Please Reboot and Try Again Storage - ERROR Create External Normal Volume [%s] (%s): FAILED Volume NSA-220 Plus User’s Guide...
  • Page 269 NOTICE Name server is changed. NOTICE An external APC UPS device is plugged/unplugged. NOTICE An external Mass Storage device is plugged/unplugged. NOTICE An external Printer device is plugged/unplugged. NOTICE An external USB hub device is plugged/unplugged. NSA-220 Plus User’s Guide...
  • Page 270: The Configuration Screen

    LABEL DESCRIPTION Backup Current Configuration Settings Backup Click this to save the current configuration of the NSA to your computer. A pop-up screen appears asking you to confirm. Click OK to continue or Cancel to quit. NSA-220 Plus User’s Guide...
  • Page 271: Ssl

    Click Maintenance > SSL to open this screen, where you can turn on HTTPS, create a public key certificate, or upload a public key certificate that was issued by a known certificate authority. Figure 119 Maintenance > SSL NSA-220 Plus User’s Guide...
  • Page 272 Note: Use this method if the device is open to external access, such as allowing users to connect through the Internet using FTP over TLS or HTTPs. NSA-220 Plus User’s Guide...
  • Page 273: Modifying Or Creating A Certificate

    Key Length Select the encryption key length. The longer the key, the better the encryption security. The only drawback to having a long key is that the file encrypted with it swells in size as well. NSA-220 Plus User’s Guide...
  • Page 274: The Firmware Upgrade Screen

    Click this to upload the new firmware. The NSA automatically restarts after you upgrade. Wait until the restart completes before accessing the NSA again. If you interrupt the upgrade, then the NSA may become unusable. Reset Click this to refresh the screen. NSA-220 Plus User’s Guide...
  • Page 275: The Shutdown Screen

    Figure 123 Maintenance > Shutdown > Confirm Restart When you click the Shutdown button a pop-up screen will appear asking you to confirm. Click OK to continue or Cancel to quit the shutdown. Figure 124 Maintenance > Shutdown > Confirm Shutdown NSA-220 Plus User’s Guide...
  • Page 276 Chapter 12 Maintenance Screens NSA-220 Plus User’s Guide...
  • Page 277: Protecting Your Data

    Network down Natural disaster such as a fire or earthquake occurs where your NSA is located The following sections describe these methods in more detail. See Section 5.6.3 on page 121 for more information on RAID. NSA-220 Plus User’s Guide...
  • Page 278: Configuration File Backup And Restoration

    Note: The Memeo Autobackup program uses the same network port as the NDU to discover the NSA. To avoid a port conflict, do not run the Memeo Autobackup program at the same time as the NDU. NSA-220 Plus User’s Guide...
  • Page 279: Troubleshooting And Specifications

    Troubleshooting and Specifications Troubleshooting (281) Product Specifications (295)
  • Page 281: Troubleshooting

    • Make sure the power adaptor or cord is connected to the NSA and plugged in to an appropriate power source. Make sure the power source is turned on. • Turn the NSA off and on. • If the problem continues, contact the vendor. NSA-220 Plus User’s Guide...
  • Page 282 • the hard drive could be faulty. Try a different hard drive or test the original hard drive in a different NSA or computer. If you had to replace the drive, turn on the NSA and go to the Storage screen. NSA-220 Plus User’s Guide...
  • Page 283: Nsa Login And Access

    IP address of the NSA using the NDU. • If you used the RESET button, the NSA may have a new IP address. Close and reopen the NDU to discover the NSA. NSA-220 Plus User’s Guide...
  • Page 284: Reset The Nsa

    IP address and subnet mask. For example, you could connect the NSA directly to your computer. If the computer is also set to get an IP address automatically, the computer and the NSA will choose addresses for themselves and be able to communicate. NSA-220 Plus User’s Guide...
  • Page 285: Enabling Scripting Of Safe Activex Controls

    • Close the NDU and reopen it. 14.3.2 Enabling Scripting of Safe ActiveX Controls If pages of the web configurator do not display properly in Internet Explorer, check that scripting of safe ActiveX controls is enabled. NSA-220 Plus User’s Guide...
  • Page 286 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 125 Internet Options: Security Click the Custom Level... button. Under Script ActiveX controls marked safe for scripting, make sure that Enable is selected (the default). NSA-220 Plus User’s Guide...
  • Page 287 • If this does not work, see Section 14.3.1 on page 284 to reset the device. I cannot see the multi-language web configurator screens while using Internet Explorer. Section 14.3.2 on page 285 to enable the scripting of safe ActiveX controls. NSA-220 Plus User’s Guide...
  • Page 288: I Cannot Access The Nsa

    NSA (or FAT or FAT32 using a computer). See Chapter 5 on page 111 information on volume creation using the NSA (recommended). Back up the files on your computer before you format the USB drive. NSA-220 Plus User’s Guide...
  • Page 289: Some Features' Screens Do Not Display

    Appendix on page 300 for the file formats that the media server supports. I published a folder with the media server function, but the media client does not play some of the files (or does not play them properly). NSA-220 Plus User’s Guide...
  • Page 290 If an iTunes client is connected, the NSA’s iTunes server function scans the published media server folders for files every three minutes. Leave iTunes connected to the NSA for three minutes. Then use the NSA’s eject button (as shown next) to disconnect. Figure 127 iTunes Eject Button NSA-220 Plus User’s Guide...
  • Page 291 UDP port 5353 are open for traffic on both the server and the client and all points in between (especially the NAT router). If your router includes a firewall, make sure it also allows TCP port 3689 and UDP port 5353 traffic. NSA-220 Plus User’s Guide...
  • Page 292: Download Service And Broadcatching Functions

    • Web publishing uses TCP protocol and the port number you specify. Make sure there is not another service using TCP protocol with the same port number. See Appendix C on page 329 for a list of common services and their associated protocols and port numbers. NSA-220 Plus User’s Guide...
  • Page 293: Auto Upload

    Make sure the NSA is connected to the Internet. See Section 6.2.2 on page 127 for details about testing network connections. Click Maintenance > Log to check the NSA’s log for a message about the file. NSA-220 Plus User’s Guide...
  • Page 294 100 MB/week. The NSA may have temporarily failed to connect to the service. You can upload the file to the watch folder again. NSA-220 Plus User’s Guide...
  • Page 295: Product Specifications

    RESET Button If you forget your (admin) password, then use the RESET button to restore the factory default password to “1234” (with username “admin”), and auto-IP address (DHCP client). NSA-220 Plus User’s Guide...
  • Page 296: Firmware Features

    Windows computers to an NSA. This software is included on the CD. Time and Date Configure a time server and set a time zone for your NSA to show the correct times in logs. NSA-220 Plus User’s Guide...
  • Page 297: Specification Tables

    20% ~ 90% RH (non-condensing) Certifications EMC: FCC Part15B, VCCI, BSMI, EN55022, EN55024 Safety: CSA International, EN60950-1 A. Hard drives may not be included with your NSA. B. Use an 8-wire Ethernet cable for Gigabit connections. NSA-220 Plus User’s Guide...
  • Page 298 The following list, which is not exhaustive, illustrates the standards and recommendations supported in the NSA. Table 109 Supported Standards and Recommendations CSS level 1 Cascading Style Sheets. CSS level 2 revision 1 Cascading Style Sheets. (“CSS 2.1”) NSA-220 Plus User’s Guide...
  • Page 299 Relative Uniform Resource Locators RFC 1945 The Hypertext Transfer Protocol (HTTP) 1.0. RFC 2131 Dynamic Host Configuration Protocol RFC 2396 Uniform Resource Identifier (URI) RFC 2396 Uniform Resource Identifiers (URI): Generic Syntax RFC 2616 Hypertext Transfer Protocol (HTTP) 1.1. NSA-220 Plus User’s Guide...
  • Page 300: Supported Media Server Content Formats

    CATEGORY FILE TYPE EXTENSION Video MPEG-1/MPEG-2 dat, m1v, m2t, m2v, m4v, mp2, mp2t, mp2p, mpa, mpe, mpeg, mpeg2, mpg, mpg2, vob Windows Media Video asf, wmv DivX divx , avi DVR-MS dvr-ms Matroska Quick Time Video NSA-220 Plus User’s Guide...
  • Page 301: Supported Itunes Server Content Formats

    Note: This table is a laboratory test of NSA power consumption for your reference only. Table 111 Power Consumption in Watts (W) POWER SYSTEM READ/ SYSTEM IDLE SOURCE WRITE 240V/50Hz 25.2W 11.9W 100V/60Hz 23.6W 11.7W NSA-220 Plus User’s Guide...
  • Page 302 Chapter 15 Product Specifications NSA-220 Plus User’s Guide...
  • Page 303: Appendix A Setting Up Your Computer's Ip Address

    TCP/IP application package. TCP/IP should already be installed on computers using Windows NT/2000/XP, Macintosh OS 7 and later operating systems. After the appropriate TCP/IP components are installed, configure the TCP/IP settings in order to “communicate” with your network. NSA-220 Plus User’s Guide...
  • Page 304 In the Network window, click Add. Select Adapter and then click Add. Select the manufacturer and model of your network adapter and then click OK. If you need TCP/IP: In the Network window, click Add. Select Protocol and then click Add. NSA-220 Plus User’s Guide...
  • Page 305 • If your IP address is dynamic, select Obtain an IP address automatically. • If you have a static IP address, select Specify an IP address and type your information into the IP Address and Subnet Mask fields. Figure 130 Windows 95/98/Me: TCP/IP Properties: IP Address NSA-220 Plus User’s Guide...
  • Page 306 Click Start and then Run. In the Run window, type "winipcfg" and then click OK to open the IP Configuration window. Select your network adapter. You should see your computer's IP address, subnet mask and default gateway. NSA-220 Plus User’s Guide...
  • Page 307 Click start (Start in Windows 2000/NT), Settings, Control Panel. Figure 132 Windows XP: Start Menu In the Control Panel, double-click Network Connections (Network and Dial- up Connections in Windows 2000/NT). Figure 133 Windows XP: Control Panel NSA-220 Plus User’s Guide...
  • Page 308 Select Internet Protocol (TCP/IP) (under the General tab in Win XP) and then click Properties. Figure 135 Windows XP: Local Area Connection Properties The Internet Protocol TCP/IP Properties window opens (the General tab in Windows XP). NSA-220 Plus User’s Guide...
  • Page 309 Gateway. To manually configure a default metric (the number of transmission hops), clear the Automatic metric check box and type a metric in Metric. • Click Add. • Repeat the previous three steps for each default gateway you want to add. NSA-220 Plus User’s Guide...
  • Page 310 • Click Obtain DNS server address automatically if you do not know your DNS server IP address(es). • If you know your DNS server IP address(es), click Use the following DNS server addresses, and type them in the Preferred DNS server and Alternate DNS server fields. NSA-220 Plus User’s Guide...
  • Page 311 Click Start, All Programs, Accessories and then Command Prompt. In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also open Network Connections, right-click a network connection, click Status and then click the Support tab. NSA-220 Plus User’s Guide...
  • Page 312 • Select Automatic from the Location list. • Select Built-in Ethernet from the Show list. • Click the TCP/IP tab. For dynamically assigned settings, select Using DHCP from the Configure list. Figure 140 Macintosh OS X: Network NSA-220 Plus User’s Guide...
  • Page 313 Follow the steps below to configure your computer IP address using the KDE. Click the Red Hat button (located on the bottom left corner), select System Setting and click Network. Figure 141 Red Hat 9.0: KDE: Network Configuration: Devices NSA-220 Plus User’s Guide...
  • Page 314 Click OK to save the changes and close the Ethernet Device General screen. If you know your DNS server IP address(es), click the DNS tab in the Network Configuration screen. Enter the DNS server information in the fields provided. Figure 143 Red Hat 9.0: KDE: Network Configuration: DNS NSA-220 Plus User’s Guide...
  • Page 315 • If you have a dynamic IP address, enter dhcp in the BOOTPROTO= field. The following figure shows an example. Figure 145 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0 DEVICE=eth0 ONBOOT=yes BOOTPROTO=dhcp USERCTL=no PEERDNS=yes TYPE=Ethernet NSA-220 Plus User’s Guide...
  • Page 316 Figure 148 Red Hat 9.0: Restart Ethernet Card [root@localhost init.d]# network restart Shutting down interface eth0: [OK] Shutting down loopback interface: [OK] Setting network parameters: [OK] Bringing up loopback interface: [OK] Bringing up interface eth0: [OK] NSA-220 Plus User’s Guide...
  • Page 317 Bcast:172.23.19.255 Mask:255.255.255.0 UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:717 errors:0 dropped:0 overruns:0 frame:0 TX packets:13 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:100 RX bytes:730412 (713.2 Kb) TX bytes:1570 (1.5 Kb) Interrupt:10 Base address:0x1000 [root@localhost]# NSA-220 Plus User’s Guide...
  • Page 318 Appendix A Setting up Your Computer’s IP Address NSA-220 Plus User’s Guide...
  • Page 319: Appendix B Pop-Up Windows, Javascripts And Java Permissions

    In Internet Explorer, select Tools, Pop-up Blocker and then select Turn Off Pop-up Blocker. Figure 150 Pop-up Blocker You can also check if pop-up blocking is disabled in the Pop-up Blocker section in the Privacy tab. NSA-220 Plus User’s Guide...
  • Page 320 Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps. In Internet Explorer, select Tools, Internet Options and then the Privacy tab. NSA-220 Plus User’s Guide...
  • Page 321 Select Settings…to open the Pop-up Blocker Settings screen. Figure 152 Internet Options: Privacy Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. NSA-220 Plus User’s Guide...
  • Page 322 Figure 153 Pop-up Blocker Settings Click Close to return to the Privacy screen. Click Apply to save this setting. JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed. NSA-220 Plus User’s Guide...
  • Page 323 Figure 154 Internet Options: Security Click the Custom Level... button. Scroll down to Scripting. Under Active scripting make sure that Enable is selected (the default). Under Scripting of Java applets make sure that Enable is selected (the default). NSA-220 Plus User’s Guide...
  • Page 324 Figure 155 Security Settings - Java Scripting Java Permissions From Internet Explorer, click Tools, Internet Options and then the Security tab. Click the Custom Level... button. Scroll down to Microsoft VM. Under Java permissions make sure that a safety level is selected. NSA-220 Plus User’s Guide...
  • Page 325 Click OK to close the window. Figure 156 Security Settings - Java JAVA (Sun) From Internet Explorer, click Tools, Internet Options and then the Advanced tab. Make sure that Use Java 2 for under Java (Sun) is selected. NSA-220 Plus User’s Guide...
  • Page 326 Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary. You can enable Java, Javascripts and pop-ups in one screen. Click Tools, then click Options in the screen that appears. Figure 158 Mozilla Firefox: Tools > Options NSA-220 Plus User’s Guide...
  • Page 327 Appendix B Pop-up Windows, JavaScripts and Java Permissions Click Content.to show the screen below. Select the check boxes as shown in the following screen. Figure 159 Mozilla Firefox Content Security NSA-220 Plus User’s Guide...
  • Page 328 Appendix B Pop-up Windows, JavaScripts and Java Permissions NSA-220 Plus User’s Guide...
  • Page 329: Appendix C Common Services

    Border Gateway Protocol. BOOTP_CLIENT DHCP Client. BOOTP_SERVER DHCP Server. CU-SEEME 7648 A popular videoconferencing solution from White Pines Software. 24032 TCP/UDP Domain Name Server, a service that matches web names (for example www.zyxel.com) to IP numbers. NSA-220 Plus User’s Guide...
  • Page 330 ICMP echo requests to test whether or not a remote host is reachable. POP3 Post Office Protocol version 3 lets a client computer get e-mail from a POP3 server through a temporary connection (TCP/IP or other). NSA-220 Plus User’s Guide...
  • Page 331 Control System). TELNET Telnet is the login and terminal emulation protocol common on the Internet and in UNIX environments. It operates over TCP/IP networks. Its primary function is to allow users to log into remote host systems. NSA-220 Plus User’s Guide...
  • Page 332 NAME PROTOCOL PORT(S) DESCRIPTION TFTP Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP, but uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol). VDOLIVE 7000 Another videoconferencing solution. NSA-220 Plus User’s Guide...
  • Page 333: Appendix D Importing Certificates

    In this appendix, you can import a public key certificate for: • Internet Explorer on page 334 • Firefox on page 344 • Opera on page 350 • Konqueror on page 358 NSA-220 Plus User’s Guide...
  • Page 334 If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. Figure 160 Internet Explorer 7: Certification Error Click Continue to this website (not recommended). Figure 161 Internet Explorer 7: Certification Error NSA-220 Plus User’s Guide...
  • Page 335 Appendix D Importing Certificates In the Address Bar, click Certificate Error > View certificates. Figure 162 Internet Explorer 7: Certificate Error In the Certificate dialog box, click Install Certificate. Figure 163 Internet Explorer 7: Certificate NSA-220 Plus User’s Guide...
  • Page 336 Figure 164 Internet Explorer 7: Certificate Import Wizard If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9. Figure 165 Internet Explorer 7: Certificate Import Wizard NSA-220 Plus User’s Guide...
  • Page 337 Figure 166 Internet Explorer 7: Certificate Import Wizard In the Select Certificate Store dialog box, choose a location in which to save the certificate and then click OK. Figure 167 Internet Explorer 7: Select Certificate Store NSA-220 Plus User’s Guide...
  • Page 338 In the Completing the Certificate Import Wizard screen, click Finish. Figure 168 Internet Explorer 7: Certificate Import Wizard 10 If you are presented with another Security Warning, click Yes. Figure 169 Internet Explorer 7: Security Warning NSA-220 Plus User’s Guide...
  • Page 339 12 The next time you start Internet Explorer and go to a ZyXEL Web Configurator page, a sealed padlock icon appears in the address bar. Click it to view the page’s Website Identification information. Figure 171 Internet Explorer 7: Website Identification NSA-220 Plus User’s Guide...
  • Page 340 Figure 172 Internet Explorer 7: Public Key Certificate File In the security warning dialog box, click Open. Figure 173 Internet Explorer 7: Open File - Security Warning Refer to steps 4-12 in the Internet Explorer procedure beginning on page 334 complete the installation process. NSA-220 Plus User’s Guide...
  • Page 341 This section shows you how to remove a public key certificate in Internet Explorer Open Internet Explorer and click Tools > Internet Options. Figure 174 Internet Explorer 7: Tools Menu In the Internet Options dialog box, click Content > Certificates. Figure 175 Internet Explorer 7: Internet Options NSA-220 Plus User’s Guide...
  • Page 342 Remove. Figure 176 Internet Explorer 7: Certificates In the Certificates confirmation, click Yes. Figure 177 Internet Explorer 7: Certificates In the Root Certificate Store dialog box, click Yes. Figure 178 Internet Explorer 7: Root Certificate Store NSA-220 Plus User’s Guide...
  • Page 343 Appendix D Importing Certificates The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. NSA-220 Plus User’s Guide...
  • Page 344 If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. Select Accept this certificate permanently and click OK. Figure 179 Firefox 2: Website Certified by an Unknown Authority NSA-220 Plus User’s Guide...
  • Page 345 The certificate is stored and you can now connect securely to the Web Configurator. A sealed padlock appears in the address bar, which you can click to open the Page Info > Security window to view the web page’s security information. Figure 180 Firefox 2: Page Info NSA-220 Plus User’s Guide...
  • Page 346 Open Firefox and click Tools > Options. Figure 181 Firefox 2: Tools Menu In the Options dialog box, click Advanced > Encryption > View Certificates. Figure 182 Firefox 2: Options NSA-220 Plus User’s Guide...
  • Page 347 Figure 184 Firefox 2: Select File The next time you visit the web site, click the padlock in the address bar to open the Page Info > Security window to see the web page’s security information. NSA-220 Plus User’s Guide...
  • Page 348 This section shows you how to remove a public key certificate in Firefox 2. Open Firefox and click Tools > Options. Figure 185 Firefox 2: Tools Menu In the Options dialog box, click Advanced > Encryption > View Certificates. Figure 186 Firefox 2: Options NSA-220 Plus User’s Guide...
  • Page 349 In the Delete Web Site Certificates dialog box, click OK. Figure 188 Firefox 2: Delete Web Site Certificates The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. NSA-220 Plus User’s Guide...
  • Page 350 If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. Click Install to accept the certificate. Figure 189 Opera 9: Certificate signer not found NSA-220 Plus User’s Guide...
  • Page 351 Appendix D Importing Certificates The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details. Figure 190 Opera 9: Security information NSA-220 Plus User’s Guide...
  • Page 352 Rather than browsing to a ZyXEL Web Configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. Open Opera and click Tools > Preferences. Figure 191 Opera 9: Tools Menu NSA-220 Plus User’s Guide...
  • Page 353 Appendix D Importing Certificates In Preferences, click Advanced > Security > Manage certificates. Figure 192 Opera 9: Preferences NSA-220 Plus User’s Guide...
  • Page 354 Appendix D Importing Certificates In the Certificates Manager, click Authorities > Import. Figure 193 Opera 9: Certificate manager Use the Import certificate dialog box to locate the certificate and then click Open. Figure 194 Opera 9: Import certificate NSA-220 Plus User’s Guide...
  • Page 355 Next, click OK. Figure 196 Opera 9: Install authority certificate The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web page’s security details. NSA-220 Plus User’s Guide...
  • Page 356 This section shows you how to remove a public key certificate in Opera 9. Open Opera and click Tools > Preferences. Figure 197 Opera 9: Tools Menu In Preferences, Advanced > Security > Manage certificates. Figure 198 Opera 9: Preferences NSA-220 Plus User’s Guide...
  • Page 357 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. Note: There is no confirmation when you delete a certificate authority, so be absolutely certain that you want to go through with it before clicking the button. NSA-220 Plus User’s Guide...
  • Page 358 If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. Click Continue. Figure 200 Konqueror 3.5: Server Authentication Click Forever when prompted to accept the certificate. Figure 201 Konqueror 3.5: Server Authentication NSA-220 Plus User’s Guide...
  • Page 359 Appendix D Importing Certificates Click the padlock in the address bar to open the KDE SSL Information window and view the web page’s security details. Figure 202 Konqueror 3.5: KDE SSL Information NSA-220 Plus User’s Guide...
  • Page 360 Figure 203 Konqueror 3.5: Public Key Certificate File In the Certificate Import Result - Kleopatra dialog box, click OK. Figure 204 Konqueror 3.5: Certificate Import Result The public key certificate appears in the KDE certificate manager, Kleopatra. Figure 205 Konqueror 3.5: Kleopatra NSA-220 Plus User’s Guide...
  • Page 361 Appendix D Importing Certificates The next time you visit the web site, click the padlock in the address bar to open the KDE SSL Information window to view the web page’s security details. NSA-220 Plus User’s Guide...
  • Page 362 On the Peer SSL Certificates tab, select the certificate you want to delete and then click Remove. Figure 207 Konqueror 3.5: Configure The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. NSA-220 Plus User’s Guide...
  • Page 363 Appendix D Importing Certificates Note: There is no confirmation when you remove a certificate authority, so be absolutely certain you want to go through with it before clicking the button. NSA-220 Plus User’s Guide...
  • Page 364 Appendix D Importing Certificates NSA-220 Plus User’s Guide...
  • Page 365: Appendix E Open Source Licences

    Open Source Licences End-User License Agreement for "NSA-220 Plus" WARNING: ZyXEL Communications Corp. IS WILLING TO LICENSE THE SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT. PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM.
  • Page 366 (express, implied or statutory) whatsoever with respect thereto. Please NSA-220 Plus User’s Guide...
  • Page 367 AGREEMENT OR OTHERWISE WITH RESPECT TO THE SOFTWARE AND DOCUMENTATION OR OTHERWISE SHALL BE EQUAL TO THE PURCHASE PRICE, BUT SHALL IN NO EVENT EXCEED THE PRODUCT'S PRICE. BECAUSE SOME STATES/COUNTRIES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF NSA-220 Plus User’s Guide...
  • Page 368 Agreement shall constitute the entire Agreement between the parties hereto. This License Agreement, the rights granted hereunder, the Software and Documentation shall not be assigned by you without the prior written consent of ZyXEL. Any waiver or modification of this License Agreement shall only be NSA-220 Plus User’s Guide...
  • Page 369 Programs that we distributed to you if we are in possession of such. NSA-220 Plus User’s Guide...
  • Page 370 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts NSA-220 Plus User’s Guide...
  • Page 371 Also, if the library is modified by someone else and passed on, the recipients should know that what they have is not the original version, so that the original author's reputation will not be affected by problems that might be introduced by others. NSA-220 Plus User’s Guide...
  • Page 372 Pay close attention to the difference between a "work based on the library" and a "work that uses the library". The former contains code derived from the library, whereas the latter must be combined with the library in order to run. NSA-220 Plus User’s Guide...
  • Page 373 The modified work must itself be a software library. b) You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change. c) You must cause the whole of the work to NSA-220 Plus User’s Guide...
  • Page 374 NSA-220 Plus User’s Guide...
  • Page 375 Library will not necessarily be able to recompile the application to use the modified definitions.) b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a NSA-220 Plus User’s Guide...
  • Page 376 These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Library (or any work based on the Library), you indicate your acceptance of this License to do so, and all its NSA-220 Plus User’s Guide...
  • Page 377 Each version is given a distinguishing version number. If the Library specifies a version number of this License which applies to it and "any later NSA-220 Plus User’s Guide...
  • Page 378 END OF TERMS AND CONDITIONS. This Product includes Linux Kernel, cups, busybox, dhcpcd, fuse, gphoto2, gphotofs, ipkg, libeeprog, libiconv, libid3tag, libol, lm-sensors, mdadm, mt-daapd, mtd-utils, ntfs-3g, pciutils, quotatool, reiserfsprogs, samba, sg3_utils, sqeezecenter, syslog-ng, upnpigdctrl, dar, ez-ipupdate, inadyn, aMule, Glib, NSA-220 Plus User’s Guide...
  • Page 379 You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. NSA-220 Plus User’s Guide...
  • Page 380 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: NSA-220 Plus User’s Guide...
  • Page 381 (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in NSA-220 Plus User’s Guide...
  • Page 382 Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any NSA-220 Plus User’s Guide...
  • Page 383 OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND NSA-220 Plus User’s Guide...
  • Page 384 By contrast, the GNU General Public License is intended to guarantee your freedom to share and change all versions of a program--to make sure it remains free software for all its users. We, NSA-220 Plus User’s Guide...
  • Page 385 To prevent this, the GPL assures that patents cannot be used to render the program non-free. The precise terms and conditions for copying, distribution and modification follow. NSA-220 Plus User’s Guide...
  • Page 386 A "Standard Interface" means an interface that either is an official standard defined by a recognized standards body, or, in the case of interfaces specified for a particular programming language, one that is widely used among developers working in that language. NSA-220 Plus User’s Guide...
  • Page 387 Conveying under any other circumstances is permitted solely under the conditions stated below. Sublicensing is not allowed; section 10 makes it unnecessary. NSA-220 Plus User’s Guide...
  • Page 388 7 additional terms, to the whole of the work, and all its parts, regardless of how they are packaged. This License gives no permission to license the work in any other way, but it does not invalidate such permission if you have separately received it. NSA-220 Plus User’s Guide...
  • Page 389 (operated by you or a third party) that supports equivalent copying facilities, provided you maintain clear directions next to the object code saying where to find the Corresponding Source. Regardless of what NSA-220 Plus User’s Guide...
  • Page 390 Access to a network may be denied when the modification itself materially and adversely affects the operation of the network or violates the rules and protocols for communication across the network. NSA-220 Plus User’s Guide...
  • Page 391 "f) Requiring indemnification of licensors and authors of that material by anyone who conveys the material (or modified versions of it) with contractual assumptions of liability to the recipient, for any liability that these contractual assumptions directly impose on those licensors and authors. NSA-220 Plus User’s Guide...
  • Page 392 You are not required to accept this License in order to receive or run a copy of the Program. Ancillary propagation of a covered work occurring solely as a consequence of using peer-to-peer transmission to receive a copy likewise does not require acceptance. However, nothing other than this License grants you NSA-220 Plus User’s Guide...
  • Page 393 Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributor's essential patent claims, to make, use, sell, offer for sale, import and otherwise run, modify and propagate the contents of its contributor version. NSA-220 Plus User’s Guide...
  • Page 394 If conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot convey a covered work so as to NSA-220 Plus User’s Guide...
  • Page 395 COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK NSA-220 Plus User’s Guide...
  • Page 396 Copyright (C) This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by NSA-220 Plus User’s Guide...
  • Page 397 If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Lesser General Public License instead of this License. But first, please read . NSA-220 Plus User’s Guide...
  • Page 398 (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This Product includes flac software under FDL license GNU Free Documentation License NSA-220 Plus User’s Guide...
  • Page 399 This License applies to any manual or other work, in any medium, that contains a notice placed by the copyright holder saying it can be distributed under the terms of this License. Such a notice grants a world-wide, royalty-free license, unlimited NSA-220 Plus User’s Guide...
  • Page 400 Transparent file format whose markup, or absence of markup, has been arranged to thwart or discourage subsequent modification by readers is not Transparent. An image format is not Transparent if used for any substantial amount of text. A copy that is not "Transparent" is called "Opaque". NSA-220 Plus User’s Guide...
  • Page 401 However, you may accept compensation in exchange for copies. If you distribute a large enough number of copies you must also follow the conditions in section 3. NSA-220 Plus User’s Guide...
  • Page 402 It is requested, but not required, that you contact the authors of the Document well before redistributing any large number of copies, to give them a chance to provide you with an updated version of the Document. 4. MODIFICATIONS NSA-220 Plus User’s Guide...
  • Page 403 Modified Version as given on the Title Page. If there is no section Entitled "History" in the Document, create one stating the title, year, NSA-220 Plus User’s Guide...
  • Page 404 You may add a section Entitled "Endorsements", provided it contains nothing but endorsements of your Modified Version by various parties--for example, statements of peer review or that the text has been approved by an organization as the authoritative definition of a standard. NSA-220 Plus User’s Guide...
  • Page 405 In the combination, you must combine any sections Entitled "History" in the various original documents, forming one section Entitled "History"; likewise combine any sections Entitled "Acknowledgements", and any sections Entitled "Dedications". You must delete all sections Entitled "Endorsements". 6. COLLECTIONS OF DOCUMENTS NSA-220 Plus User’s Guide...
  • Page 406 Document is in electronic form. Otherwise they must appear on printed covers that bracket the whole aggregate. 8. TRANSLATION Translation is considered a kind of modification, so you may distribute translations of the Document under the terms of section 4. NSA-220 Plus User’s Guide...
  • Page 407 The Free Software Foundation may publish new, revised versions of the GNU Free Documentation License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. See http://www.gnu.org/copyleft/. NSA-220 Plus User’s Guide...
  • Page 408 If you have Invariant Sections without Cover Texts, or some other combination of the three, merge those two alternatives to suit the situation. If your document contains nontrivial examples of program code, we recommend releasing these examples in parallel under your choice of free NSA-220 Plus User’s Guide...
  • Page 409 Contributor. 1.3. "Covered Code" means the Original Code or Modifications or the combination of the Original Code and Modifications, in each case including portions thereof. 1.4. "Electronic Distribution Mechanism" means a mechanism generally NSA-220 Plus User’s Guide...
  • Page 410 Original Code or any previous Modifications. When Covered Code is released as a series of files, a Modification is: A. Any addition to or deletion from the contents of a file containing Original Code or previous Modifications. NSA-220 Plus User’s Guide...
  • Page 411 Source Code can be in a compressed or archival form, provided the appropriate decompression or de-archiving software is widely available for no charge. 1.12. "You" (or "Your") means an individual or a legal entity exercising rights under, and complying with all of the terms of, this NSA-220 Plus User’s Guide...
  • Page 412 Larger Work; and (b) under Patents Claims infringed by the making, using or selling of Original Code, to make, have made, use, practice, sell, and offer for sale, and/or otherwise dispose of the Original Code (or portions thereof). NSA-220 Plus User’s Guide...
  • Page 413 Larger Work; and (b) under Patent Claims infringed by the making, using, or selling of Modifications made by that Contributor either alone and/or in combination with its Contributor Version (or portions NSA-220 Plus User’s Guide...
  • Page 414 Covered Code in the absence of Modifications made by that Contributor. 3. Distribution Obligations. 3.1. Application of License. The Modifications which You create or to which You contribute are governed by the terms of this License, including without limitation NSA-220 Plus User’s Guide...
  • Page 415 Source Code version remains available even if the Electronic Distribution Mechanism is maintained by a third party. 3.3. Description of Modifications. You must cause all Covered Code to which You contribute to contain a NSA-220 Plus User’s Guide...
  • Page 416 Contributor makes available thereafter and shall take other steps (such as notifying appropriate mailing lists or newsgroups) reasonably calculated to inform those who received the Covered Code that new knowledge has been obtained. (b) Contributor APIs. NSA-220 Plus User’s Guide...
  • Page 417 Covered Code. You may choose to offer, and to charge a fee for, warranty, support, indemnity or liability obligations to one or more recipients of Covered Code. However, You may do so only on Your own behalf, and not on behalf of the Initial NSA-220 Plus User’s Guide...
  • Page 418 Source Code version from the rights set forth in this License. If You distribute the Executable version under a different license You must make it absolutely clear that any terms which differ from this License are offered by You alone, not by the Initial NSA-220 Plus User’s Guide...
  • Page 419 Source Code. Except to the extent prohibited by statute or regulation, such description must be sufficiently detailed for a recipient of ordinary skill to be able to understand it. 5. Application of this License. NSA-220 Plus User’s Guide...
  • Page 420 Covered Code governed by this License), You must (a) rename Your license so that the phrases "Mozilla", "MOZILLAPL", "MOZPL", "Netscape", "MPL", "NPL" or any confusingly similar phrase do not appear in your NSA-220 Plus User’s Guide...
  • Page 421 YOU (NOT THE INITIAL DEVELOPER OR ANY OTHER CONTRIBUTOR) ASSUME COST OF ANY NECESSARY SERVICING, REPAIR OR CORRECTION. THIS DISCLAIMER OF WARRANTY CONSTITUTES AN ESSENTIAL PART OF THIS LICENSE. NO USE ANY COVERED CODE IS AUTHORIZED HEREUNDER EXCEPT UNDER THIS DISCLAIMER. NSA-220 Plus User’s Guide...
  • Page 422 Your past and future use of Modifications made by such Participant, or (ii) withdraw Your litigation claim with respect to the Contributor Version against such Participant. If within 60 days of notice, a reasonable royalty and payment arrangement are not NSA-220 Plus User’s Guide...
  • Page 423 8.4. In the event of termination under Sections 8.1 or 8.2 above, all end user license agreements (excluding distributors and resellers) which have been validly granted by You or any distributor hereunder prior to termination shall survive termination. NSA-220 Plus User’s Guide...
  • Page 424 THIS EXCLUSION AND LIMITATION MAY NOT APPLY TO YOU. 10. U.S. GOVERNMENT END USERS. The Covered Code is a "commercial item," as that term is defined in 48 C.F.R. 2.101 (Oct. 1995), consisting of "commercial computer NSA-220 Plus User’s Guide...
  • Page 425 The application of the United Nations Convention on Contracts for the International Sale of Goods is expressly excluded. Any law or regulation which provides that the language of a contract shall be construed against the drafter shall not apply to this NSA-220 Plus User’s Guide...
  • Page 426 ``The contents of this file are subject to the Mozilla Public License Version 1.1 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.mozilla.org/MPL/ NSA-220 Plus User’s Guide...
  • Page 427 [___] License. If you do not delete the provisions above, a recipient may use your version of this file under either the MPL or the [___] License." NSA-220 Plus User’s Guide...
  • Page 428 Kurt Garloff , Grant Grundler , Christophe Varoqui , Michael Weller , Eric Youngdale NSA-220 Plus User’s Guide...
  • Page 429 The DBI module is Copyright (c) 1994-2008 Tim Bunce. Ireland. All rights reserved. You may distribute under the terms of either the GNU General Public License or the Artistic License, as specified in the Perl README file. NSA-220 Plus User’s Guide...
  • Page 430 Currently, some Boost libraries have their own licenses. The hope is that eventually all Boost libraries will be covered by the Boost Software License. In the meantime, all libraries comply with the Boost License requirements. HISTORY NSA-220 Plus User’s Guide...
  • Page 431 Software, and to prepare derivative works of the Software, and to permit third-parties to whom the Software is furnished to do so, all subject to the following: The copyright notices in the Software and this entire statement, including NSA-220 Plus User’s Guide...
  • Page 432 (I make some recommendations about a possible short-form license below.) [Standardizing the license will not] necessarily address the issue of satisfying corporate licensees. Each corporation will have its own concerns, based on their NSA-220 Plus User’s Guide...
  • Page 433 (including intellectual property infringement liability), and requires that all subsequent copies of the code [except machine-executable object code], including partial copies and derivative works, include the license. NSA-220 Plus User’s Guide...
  • Page 434 Why the phrase "machine-executable object code generated by a source language processor"? To distinguish cases where we do not require reproduction of the copyrights and license, such as object libraries, shared libraries, and final program executables, from cases where reproduction is still required, such as distribution NSA-220 Plus User’s Guide...
  • Page 435 Can I use the Boost license for my own projects outside Boost? Sure; there are no restrictions on the use of the license itself. Is the Boost license "Open Source"? Yes. The Open Source Initiative certified the Boost Software License 1.0 in early 2008. NSA-220 Plus User’s Guide...
  • Page 436 Copyright Beman Dawes, Daniel Frey, David Abrahams, 2003-2004. Copyright Rene Rivera 2004-2005. Distributed under the Boost Software License, Version 1.0. This Product includes curl software under below license COPYRIGHT AND PERMISSION NOTICE Copyright (c) 1996 - 2009, Daniel Stenberg, . All rights reserved. NSA-220 Plus User’s Guide...
  • Page 437 This section is just a brief summary for the cases we get the most questions. (Parts of this section was much enhanced by Bjorn Reese.) NSA-220 Plus User’s Guide...
  • Page 438 6.5 Can I modify curl/libcurl for my program and keep the changes secret? Yes! The MIT/X derivate license practically allows you to do almost anything with the sources, on the condition that the copyright texts in the sources are NSA-220 Plus User’s Guide...
  • Page 439 You do not have to reveal or make public any changes to the libcurl source code. You do not have to reveal or make public that you are using libcurl within your app. As can be seen here: http://curl.haxx.se/docs/companies.html and NSA-220 Plus User’s Guide...
  • Page 440 Bell Communications Research, Inc (Bellcore). Regular expression support is provided by the PCRE library package, which is open source software, written by Philip Hazel, and copyright by the University of Cambridge, England. The original software is available from ftp://ftp.csx.cam.ac.uk/pub/software/programming/pcre/ NSA-220 Plus User’s Guide...
  • Page 441 (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity. "You" (or "Your") shall mean an individual or Legal Entity NSA-220 Plus User’s Guide...
  • Page 442 License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof. "Contribution" shall mean any work of authorship, including NSA-220 Plus User’s Guide...
  • Page 443 Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form. 3. Grant of Patent License. Subject to the terms and conditions of NSA-220 Plus User’s Guide...
  • Page 444 (a) You must give any other recipients of the Work or Derivative Works a copy of this License; and (b) You must cause any modified files to carry prominent notices stating that You changed the files; and NSA-220 Plus User’s Guide...
  • Page 445 Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the License. You may add Your own copyright statement to Your modifications and NSA-220 Plus User’s Guide...
  • Page 446 Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A NSA-220 Plus User’s Guide...
  • Page 447 Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason NSA-220 Plus User’s Guide...
  • Page 448 License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, NSA-220 Plus User’s Guide...
  • Page 449 * acknowledge Cisco Systems as the original contributor of this module. * All other licensing and usage conditions are those of the Apache Group. * Some of this code is derived from the free version of the file command NSA-220 Plus User’s Guide...
  • Page 450 * 3. Altered versions must be plainly marked as such, and must not be * misrepresented as being the original software. Since few users ever read * sources, credits must appear in the documentation. * 4. This notice may not be removed or altered. * ------------------------------------------------------------------------- NSA-220 Plus User’s Guide...
  • Page 451 * University of Illinois at Urbana-Champaign * 605 E. Springfield, Champaign, IL 61820 * [email protected] * Copyright (C) 1995, Board of Trustees of the University of Illinois ***************************************************************** ******* * md5.c: NCSA HTTPd code which uses the md5c.c RSA Code NSA-220 Plus User’s Guide...
  • Page 452 * Mellon University not be used in advertising or publicity * pertaining to distribution of the software without specific, * written prior permission. Carnegie Mellon University makes no * representations about the suitability of this software for any NSA-220 Plus User’s Guide...
  • Page 453 * that the above copyright notice and this permission notice * appear in all copies, and that the name of Bellcore not be * used in advertising or publicity pertaining to this * material without the specific, prior written permission NSA-220 Plus User’s Guide...
  • Page 454 "RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing this software or this function. License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data NSA-220 Plus User’s Guide...
  • Page 455 * The RSA copyright statement and Licence for that original material is * included below. This is followed by the Apache copyright statement and * licence for the modifications made to that material. /* MD5C.C - RSA Data Security, Inc., MD5 message-digest algorithm NSA-220 Plus User’s Guide...
  • Page 456 These notices must be retained in any copies of any part of this documentation and/or software. * The apr_md5_encode() routine uses much code obtained from the FreeBSD 3.0 * MD5 crypt() function, which is licenced as follows: * ---------------------------------------------------------------------------- NSA-220 Plus User’s Guide...
  • Page 457 * License is also granted to make and use derivative works provided * that such works are identified as "derived from the RSA Data * Security, Inc. MD4 Message-Digest Algorithm" in all material * mentioning or referencing the derived work. NSA-220 Plus User’s Guide...
  • Page 458 * Algorithm" in all material mentioning or referencing this software * or this function. * License is also granted to make and use derivative works provided * that such works are identified as "derived from the RSA Data NSA-220 Plus User’s Guide...
  • Page 459 * Copyright (C) 1990-2, RSA Data Security, Inc. Created 1990. All * rights reserved. * RSA Data Security, Inc. makes no representations concerning either * the merchantability of this software or the suitability of this * software for any particular purpose. It is provided "as is" NSA-220 Plus User’s Guide...
  • Page 460 # publicity pertaining to distribution of the software without specific, # written prior permission. M.I.T. makes no representations about the # suitability of this software for any purpose. It is provided "as is" # without express or implied warranty. NSA-220 Plus User’s Guide...
  • Page 461 Perl 5 language. Release 5 of PCRE is distributed under the terms of the "BSD" licence, as specified below. The documentation for PCRE, supplied in the "doc" NSA-220 Plus User’s Guide...
  • Page 462 * Neither the name of the University of Cambridge nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" NSA-220 Plus User’s Guide...
  • Page 463 ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF POSSIBILITY OF SUCH DAMAGE. End PCRE LICENCE For the test\zb.c component: ZeusBench V1.01 =============== This program is Copyright (C) Zeus Technology Limited 1996. NSA-220 Plus User’s Guide...
  • Page 464 Written by Adam Twiss ([email protected]). March 1996 Thanks to the following people for their input: Mike Belshe ([email protected]) Michael Campanella ([email protected]) For the expat xml parser component: Copyright (c) 1998, 1999, 2000 Thai Open Source Software Center Ltd NSA-220 Plus User’s Guide...
  • Page 465 CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. ================================================== ================== This Product includes libtecla software under below license NSA-220 Plus User’s Guide...
  • Page 466 OF THIRD PARTY RIGHTS. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR HOLDERS INCLUDED IN THIS NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NSA-220 Plus User’s Guide...
  • Page 467 * Neither the name of Rasterbar Software nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. NSA-220 Plus User’s Guide...
  • Page 468 This Product includes libupnp software under below license Copyright (c) 2000-2003 Intel Corporation All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: NSA-220 Plus User’s Guide...
  • Page 469 OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This Product includes libxml2 software under below license NSA-220 Plus User’s Guide...
  • Page 470 NESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE DANIEL VEILLARD BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CON- NSA-220 Plus User’s Guide...
  • Page 471 2.Bernd Altmeier hopf Elektronik serial line and PCI-bus devices 3.Viraj Bais and Clayton Kirkwood port to WindowsNT 3.5 4.Michael Barone GPSVME fixes 5.Jean-Francois Boudreault IPv6 support 6.Karl Berry syslog to file option NSA-220 Plus User’s Guide...
  • Page 472 24.Hans Lambermont or ntpsweep 25.Poul-Henning Kamp Oncore driver (Original author) 26.Frank Kardel PARSE driver (>14 reference clocks), STREAMS modules for PARSE, support scripts, syslog cleanup, dynamic interface handling NSA-220 Plus User’s Guide...
  • Page 473 42.Dirce Richards Digital UNIX V4.0 port 43.Wilfredo Sánchez added support for NetInfo 44.Nick Sayer SunOS streams modules 45.Jack Sasportas Saved a Lot of space on the stuff in the html/pic/ subdirectory 46.Ray Schnitzler Unixware1 port NSA-220 Plus User’s Guide...
  • Page 474 3. The name of any author may not be used to endorse or promote products derived from this software without their specific prior written permission. NSA-220 Plus User’s Guide...
  • Page 475 * Permission to use, copy, modify, and distribute this software for any * purpose with or without fee is hereby granted, provided that the above * copyright notice and this permission notice appear in all copies. NSA-220 Plus User’s Guide...
  • Page 476 SQLite code, either in source code form or as a compiled binary, for any purpose, commercial or non-commercial, and by any means. The previous paragraph applies to the deliverable code in SQLite - those parts of the SQLite library that you actually bundle and ship with a larger application. NSA-220 Plus User’s Guide...
  • Page 477 We are not able to accept patches or changes to SQLite that are not accompanied by a statement such as the above. In addition, if you make changes or enhancements as an employee, then a simple statement such as the above is NSA-220 Plus User’s Guide...
  • Page 478 SQLite website, http://www.sqlite.org/. Precompiled binaries are excluded from the definition of "SQLite software" in this document because the process of compiling the software may introduce information from outside sources which is not properly a part of SQLite. NSA-220 Plus User’s Guide...
  • Page 479 SQLite code base from other sources. I agree never to publish on the SQLite website any information that would violate a law or breach a contract. Signature: Date: Name (printed): This Product includes tz32 software under below license === asctime.c========== NSA-220 Plus User’s Guide...
  • Page 480 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED * WARRANTIES OF MERCHANT[A]BILITY AND FITNESS FOR A PARTICULAR PURPOSE. === difftime.c ========== ** This file is in the public domain, so clarified as of ** 1996-06-05 by Arthur David Olson. NSA-220 Plus User’s Guide...
  • Page 481 * from this software without specific prior written permission. * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED * WARRANTIES OF MERCHANT[A]BILITY AND FITNESS FOR A PARTICULAR PURPOSE. =================== NSA-220 Plus User’s Guide...
  • Page 482 Crypto++ was either written specifically for this project by its contributors and placed in the public domain, or derived from other sources that are public domain (again with the exception of mars.cpp). NSA-220 Plus User’s Guide...
  • Page 483 Leonard Janke - cast.cpp, seal.cpp Steve Reid - cast.cpp Phil Karn - des.cpp Andrew M. Kuchling - md2.cpp, md4.cpp Colin Plumb - md5.cpp Seal Woods - rc6.cpp Chris Morgan - rijndael.cpp Paulo Baretto - rijndael.cpp, skipjack.cpp, square.cpp NSA-220 Plus User’s Guide...
  • Page 484 WITHOUT EXPRESS OR IMPLIED WARRANTY INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT WILL WEI DAI OR ANY OTHER CONTRIBUTOR BE LIABLE DIRECT, INCIDENTAL OR CONSEQUENTIAL DAMAGES, EVEN IF NSA-220 Plus User’s Guide...
  • Page 485 Wei Dai is not required but would also be appreciated. This Product includes wxWidgets software under below license Licence Background wxWidgets is currently licensed under the "wxWindows Licence" pending approval of the "wxWidgets Licence" which will be identical apart from the name. NSA-220 Plus User’s Guide...
  • Page 486 This library is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Library General Public Licence for more details. NSA-220 Plus User’s Guide...
  • Page 487 4. If you write modifications of your own for this library, it is your choice whether to permit this exception to apply to your modifications. If you do not wish that, you must delete the exception notice from such code and/or adjust the licensing conditions notice accordingly. NSA-220 Plus User’s Guide...
  • Page 488 2 of the GPL license, included below for your convenience. - SoftSqueeze is (c) Richard Titmuss and is licensed under GPL. - The CODE2000 TrueType Font is (c) James Kass and is Shareware. See Graphics/CODE2000.HTM for more information. NSA-220 Plus User’s Guide...
  • Page 489 (c) Slim Devices and are not licensed for redistribution. When in doubt look for a GPL notice at the top of the file, or ask us for written permission to redistribute, which we will grant for any reasonable purpose. NSA-220 Plus User’s Guide...
  • Page 490 Microsoft subsidiary. #------------------------------------------------------------------ GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies NSA-220 Plus User’s Guide...
  • Page 491 To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. NSA-220 Plus User’s Guide...
  • Page 492 To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and NSA-220 Plus User’s Guide...
  • Page 493 Program (independent of having been made by running the Program). Whether that is true depends on what the Program does. 1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you NSA-220 Plus User’s Guide...
  • Page 494 License. c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an NSA-220 Plus User’s Guide...
  • Page 495 Program. In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of NSA-220 Plus User’s Guide...
  • Page 496 Subsection b above.) The source code for a work means the preferred form of the work for NSA-220 Plus User’s Guide...
  • Page 497 However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5. You are not required to accept this License, since you have not NSA-220 Plus User’s Guide...
  • Page 498 License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by NSA-220 Plus User’s Guide...
  • Page 499 This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the NSA-220 Plus User’s Guide...
  • Page 500 Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and NSA-220 Plus User’s Guide...
  • Page 501 WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/ REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED NSA-220 Plus User’s Guide...
  • Page 502 * Neither the author nor the names of any contributors may be used to endorse or promote products derived from this software without specific prior written permission. NSA-220 Plus User’s Guide...
  • Page 503 "This is an Open Source license, certified by the Open Source Initiative. "The PHP license is a BSD-style license which does not have the "copyleft" restrictions associated with GPL. "Some files have been contributed under other (compatible) licenses and carry additional requirements and copyright information. NSA-220 Plus User’s Guide...
  • Page 504 3. The name "PHP" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact [email protected]. NSA-220 Plus User’s Guide...
  • Page 505 "This product includes PHP software, freely available from ". THIS SOFTWARE IS PROVIDED BY THE PHP DEVELOPMENT TEAM ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A NSA-220 Plus User’s Guide...
  • Page 506 PHP includes the Zend Engine, freely available at . This Product includes AutoXS-Header, Class-C3-XS, Class-XSAccessor, Class- XSAccessor-Array, Compress-Raw-Zlib, Digest-SHA1, EV, ExtUtils-Cbuilder, GD, HTML-Parser, JSON-XS, Module-Build, Sub-Name, Template-Toolkit and XML- Parser software under the same terms as Perl 's license NSA-220 Plus User’s Guide...
  • Page 507 -- Larry Wall This Product includes gd software under below license Portions copyright 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002 by Cold Spring Harbor Laboratory. Funded under Grant P41-RR02188 by the National Institutes of Health. NSA-220 Plus User’s Guide...
  • Page 508 2001, 2002, Doug Becker and copyright (C) 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, Thomas G. Lane. This software is based in part on the work of the Independent JPEG Group. See the file README-JPEG.TXT for more information. NSA-220 Plus User’s Guide...
  • Page 509 Although their code does not appear in gd, the authors wish to thank David Koblas, David Rowley, and Hutchison Avenue Software Corporation for their prior contributi NSA-220 Plus User’s Guide...
  • Page 510 Appendix E Open Source Licences NSA-220 Plus User’s Guide...
  • Page 511: Appendix F Legal Information

    ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved. Disclaimers ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein.
  • Page 512: Appendix F Legal Information

    God, or subjected to abnormal working conditions. Note Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, NSA-220 Plus User’s Guide...
  • Page 513 Registration Register your product online to receive e-mail notices of firmware upgrades and information at www.zyxel.com for global products, or at www.us.zyxel.com North American products. NSA-220 Plus User’s Guide...
  • Page 514 Appendix F Legal Information NSA-220 Plus User’s Guide...
  • Page 515: Index

    150, 151 settings status torrent files 138, 142 142, 195 health 131, 133 info-hash activation trackers anonymous access broadcatching 133, 158 passive mode transfer adding channels 158, 160 media server 132, 135 channel guides NSA-220 Plus User’s Guide...
  • Page 516 238, 240 volumes 115, 118 fan speed File Transfer Protocol over TLS, see FTPS files, uploading FileZilla fingerprint data protection firmware, upgrading database, rebuilding Flickr date access rights deleting shares activation diagnostic tools authorization 170, 171 NSA-220 Plus User’s Guide...
  • Page 517 30, 41, 44 global moving contents 30, 41 34, 35, 256 shares My NSA 30, 31 users configuring shares 36, 37 IP address creating shares icons IP filtering language selection iTunes server 132, 135, 136 share browser NSA-220 Plus User’s Guide...
  • Page 518 YouTube 175, 176 configuration shares 31, 247 name access rights 38, 251, 252 protection, download service adding 150, 151 248, 250 public key certificate browser editing configuration 36, 37 copying contents 34, 35, 256 NSA-220 Plus User’s Guide...
  • Page 519 113, 116 web configurator access USB devices 118, 119 volumes 111, 120 striping synchronization 164, 165 configuration upgrading firmware directions single direction uploading files 33, 200, 254 two directions system NSA-220 Plus User’s Guide...
  • Page 520 121, 123, 124 recovering resynchronization status 113, 116 storage methods duplexing mirroring parity striping web configurator icons language selection login My NSA 30, 31 navigation panel password 29, 30, 40 status web publishing 132, 152, 155 activation NSA-220 Plus User’s Guide...
  • Table of Contents