User Guide
Page 7
... Creating a User Account ...87 5.9.2 Creating a Share ...89 5.9.3 Creating a Group ...91 5.9.4 Accessing a Share From Windows Explorer 92 5.9.5 Accessing a Share Using FTP 94 5.9.6 Accessing a Share Through the Web Configurator 95 5.10 Download Service Tutorial ...96 5.10.1 Copying/Pasting a Download Link 96 5.10.2 Installing the Link Capture... Certificate 122 5.15.2 Downloading and Installing Customized Certificate 123 5.15.3 Turn on the NSA's Web Security 127 5.16 Using FTPES to Connect to the NSA 134 5.17 Using a Mac to Access the NSA 135 5.17.1 Finder ...136 5.17.2 Go Menu ...137 5....
... Creating a User Account ...87 5.9.2 Creating a Share ...89 5.9.3 Creating a Group ...91 5.9.4 Accessing a Share From Windows Explorer 92 5.9.5 Accessing a Share Using FTP 94 5.9.6 Accessing a Share Through the Web Configurator 95 5.10 Download Service Tutorial ...96 5.10.1 Copying/Pasting a Download Link 96 5.10.2 Installing the Link Capture... Certificate 122 5.15.2 Downloading and Installing Customized Certificate 123 5.15.3 Turn on the NSA's Web Security 127 5.16 Using FTPES to Connect to the NSA 134 5.17 Using a Mac to Access the NSA 135 5.17.1 Finder ...136 5.17.2 Go Menu ...137 5....
User Guide
Page 64
...in shares without logging into specific groups. Chapter 4 Web Configurator Basics Table 18 Screens Summary (continued) LINK SCREEN FUNCTION Applications FTP Server Enable FTP file transfer to download frequently updated digital content like TV programs, radio talk shows, Podcasts (audio files), YouTube videos, or... the NSA. Package Set up and/or restore the NSA configuration file. Media Server Enable or disable the sharing of FTP connections allowed, an FTP idle timeout, and the character set the number of media files and select which you want to your NSA. Broadcatching...
...in shares without logging into specific groups. Chapter 4 Web Configurator Basics Table 18 Screens Summary (continued) LINK SCREEN FUNCTION Applications FTP Server Enable FTP file transfer to download frequently updated digital content like TV programs, radio talk shows, Podcasts (audio files), YouTube videos, or... the NSA. Package Set up and/or restore the NSA configuration file. Media Server Enable or disable the sharing of FTP connections allowed, an FTP idle timeout, and the character set the number of media files and select which you want to your NSA. Broadcatching...
User Guide
Page 67
...; Broadcatching Tutorial, see page 111 • Copy and Flickr Auto Upload Tutorial, see page 117 • FTP Uploadr Tutorial, see page 118 • Web Configurator's Security Sessions, see page 121 • Using FTPES to Connect to the NSA, see page 134 • Using a Mac to Access the NSA, see page 135 •...
...; Broadcatching Tutorial, see page 111 • Copy and Flickr Auto Upload Tutorial, see page 117 • FTP Uploadr Tutorial, see page 118 • Web Configurator's Security Sessions, see page 121 • Using FTPES to Connect to the NSA, see page 134 • Using a Mac to Access the NSA, see page 135 •...
User Guide
Page 121
...Susan's NSA 5.15 Web Configurator's Security Sessions These tutorials show you how to the Amy share on her Internet connection. Media Server User's Guide 121 Chapter 5 Tutorials 6 Amy also set up FTP Uploadr to send files to Susan's NSA. Once Susan completes the setup, Amy can go through the steps described... doesn't slow down her NSA. Similarly, Susan can also receive files from Susan's NSA. Now Amy has set the Bandwidth Limit to configure FTP Uploadr on Susan's NSA. You will be uploaded automatically to configure security for the NSA's Web Configurator sessions.
...Susan's NSA 5.15 Web Configurator's Security Sessions These tutorials show you how to the Amy share on her Internet connection. Media Server User's Guide 121 Chapter 5 Tutorials 6 Amy also set up FTP Uploadr to send files to Susan's NSA. Once Susan completes the setup, Amy can go through the steps described... doesn't slow down her NSA. Similarly, Susan can also receive files from Susan's NSA. Now Amy has set the Bandwidth Limit to configure FTP Uploadr on Susan's NSA. You will be uploaded automatically to configure security for the NSA's Web Configurator sessions.
User Guide
Page 133
Chapter 5 Tutorials 8 If the certificate fingerprints match, click Confirm Security Exception, otherwise click Cancel. 9 The login screen displays. Use a secure method to let your users know the correct fingerprint for secure FTP transfers. See the next section for how to use FTPES with the NSA for the NSA's certificate so they can check it before adding a security exception (as in steps 6 to 7 on pages 131 to the NSA's Web Configurator screens will automatically do so by HTTPs. Now, anyone who connects to 132). Media Server User's Guide 133
Chapter 5 Tutorials 8 If the certificate fingerprints match, click Confirm Security Exception, otherwise click Cancel. 9 The login screen displays. Use a secure method to let your users know the correct fingerprint for secure FTP transfers. See the next section for how to use FTPES with the NSA for the NSA's certificate so they can check it before adding a security exception (as in steps 6 to 7 on pages 131 to the NSA's Web Configurator screens will automatically do so by HTTPs. Now, anyone who connects to 132). Media Server User's Guide 133
User Guide
Page 134
This example uses FileZilla. 1 Open FileZilla and click File > Site Manager > New Site. • Configure the Host field with the NSA for secure FTP transfers. Before you go through this section, read Section 5.15 on page 121 to FTPES - Chapter 5 Tutorials 5.16 Using FTPES to Connect to the NSA This section covers how to use FTP over explicit TLS/SSL. • Configure the account name and password. • Click Connect. 134 Media Server User's Guide FTP over Explicit TLS/SSL with the NSA's address. • Set the Servertype to configure HTTPS.
This example uses FileZilla. 1 Open FileZilla and click File > Site Manager > New Site. • Configure the Host field with the NSA for secure FTP transfers. Before you go through this section, read Section 5.15 on page 121 to FTPES - Chapter 5 Tutorials 5.16 Using FTPES to Connect to the NSA This section covers how to use FTP over explicit TLS/SSL. • Configure the account name and password. • Click Connect. 134 Media Server User's Guide FTP over Explicit TLS/SSL with the NSA's address. • Set the Servertype to configure HTTPS.
User Guide
Page 135
... a secure method to let your computer. (Double-click the NSA's certificate file and then click Details and look at the Thumbprint). Now you can use FTP to securely transfer files to which Gonzo has access display. You can check it before adding a security exception. 5.17 Using a Mac to Access the NSA... and folders to or from the NSA to your users know the correct fingerprint for the NSA, or • Use the Finder > Go option to connect to find the NSA on Mac OS X 10.5 (Leopard).
... a secure method to let your computer. (Double-click the NSA's certificate file and then click Details and look at the Thumbprint). Now you can use FTP to securely transfer files to which Gonzo has access display. You can check it before adding a security exception. 5.17 Using a Mac to Access the NSA... and folders to or from the NSA to your users know the correct fingerprint for the NSA, or • Use the Finder > Go option to connect to find the NSA on Mac OS X 10.5 (Leopard).
User Guide
Page 155
...Address Click the Edit icon to the NSA. This field shows the name for more details. ANONYMOUS FTP displays if a username is using . This field shows what type of the user connected to the NSA. For external drives, this shows which hard drive bays are numbered in year, ...page 161 for the volume. This icon indicates whether the volume is using . This shows whether it's a Windows/CIFS, web (web configurator), or FTP connection to the NSA. This displays the shared folder name on the NSA that you insert USB devices. Chapter 6 Status Screen Table 21 Status (continued)...
...Address Click the Edit icon to the NSA. This field shows the name for more details. ANONYMOUS FTP displays if a username is using . This field shows what type of the user connected to the NSA. For external drives, this shows which hard drive bays are numbered in year, ...page 161 for the volume. This icon indicates whether the volume is using . This shows whether it's a Windows/CIFS, web (web configurator), or FTP connection to the NSA. This displays the shared folder name on the NSA that you insert USB devices. Chapter 6 Status Screen Table 21 Status (continued)...
User Guide
Page 168
... in Figure 87 on page 163 to open the following screen. Username This displays the name of the computer connected to for CIFS sessions and is not defined for FTP and web sessions. Share Name This displays the shared folder name on the NSA that the user is defined....User's Guide Type This shows whether it's a Windows/CIFS, web (Web Configurator), or FTP connection to repair any errored files it detects during the scan. ANONYMOUS FTP displays if a username is blank for the user's connection. Use this to have the NSA scan the volume. They will be disconnected if you ...
... in Figure 87 on page 163 to open the following screen. Username This displays the name of the computer connected to for CIFS sessions and is not defined for FTP and web sessions. Share Name This displays the shared folder name on the NSA that the user is defined....User's Guide Type This shows whether it's a Windows/CIFS, web (Web Configurator), or FTP connection to repair any errored files it detects during the scan. ANONYMOUS FTP displays if a username is blank for the user's connection. Use this to have the NSA scan the volume. They will be disconnected if you ...
User Guide
Page 179
...'s UPnP Port Mapping screen to configure the UPnP settings your Internet gateway uses to allow access to the NSA from the WAN (Internet) to send FTP traffic (using TCP port number 21) from the Internet. Figure 96 UPnP Port Address Translation for the service. Note: To use UPnP port mapping, ...access a specific service on the NSA. They do not automatically update if the NSA's IP address changes. UPnP can have UPnP enabled. Chapter 9 Network network connectivity between devices. The UPnP-created NAT mappings keep the IP address the NSA had when you select on the NSA.
...'s UPnP Port Mapping screen to configure the UPnP settings your Internet gateway uses to allow access to the NSA from the WAN (Internet) to send FTP traffic (using TCP port number 21) from the Internet. Figure 96 UPnP Port Address Translation for the service. Note: To use UPnP port mapping, ...access a specific service on the NSA. They do not automatically update if the NSA's IP address changes. UPnP can have UPnP enabled. Chapter 9 Network network connectivity between devices. The UPnP-created NAT mappings keep the IP address the NSA had when you select on the NSA.
User Guide
Page 180
...but cannot get it is also less secure. Using UPnP port mapping for CIFS allows users to connect from the Internet and use programs like Windows Explorer to access the NSA's shares to copy ...on page 188 for more secure. Using UPnP may want to use the custom port number when using FTP to the NSA's management screens. Remember to tell the remote users to use a different WAN port... network. HTTP (Web Configurator) You can use UPnP to allow access to access the NSA. FTP File Transfer Protocol is a standard protocol supported by most operating systems in order to make your UPnP...
...but cannot get it is also less secure. Using UPnP port mapping for CIFS allows users to connect from the Internet and use programs like Windows Explorer to access the NSA's shares to copy ...on page 188 for more secure. Using UPnP may want to use the custom port number when using FTP to the NSA's management screens. Remember to tell the remote users to use a different WAN port... network. HTTP (Web Configurator) You can use UPnP to allow access to access the NSA. FTP File Transfer Protocol is a standard protocol supported by most operating systems in order to make your UPnP...
User Guide
Page 188
... the maximum number of time that an FTP connection can use FTP to send files to the NSA or get files from the NSA. The timeout limit is considered a username, so must be idle before timing out. Idle Timeout Enter the length of concurrent FTP connections allowed on the NSA in this field.... Enable Anonymous FTP Access Select this check box to allow any user to log into the NSA using...
... the maximum number of time that an FTP connection can use FTP to send files to the NSA or get files from the NSA. The timeout limit is considered a username, so must be idle before timing out. Idle Timeout Enter the length of concurrent FTP connections allowed on the NSA in this field.... Enable Anonymous FTP Access Select this check box to allow any user to log into the NSA using...
User Guide
Page 189
.../s) that the NSA allows for users who are logged into the NSA. • Max. Apply Reset This setting applies to all FTP client connections to save your previously saved settings. 10.5 The Media Server Screens The media server application allows you want to limit the download/upload...port range for data transfer Select this check box to assign a port range for FTP clients to use when downloading files from 1024 to 1029 and configured 10 in the Connection Limit field. The FTP connection limit will not correct the character display in Windows Explorer). Enter the download speed...
.../s) that the NSA allows for users who are logged into the NSA. • Max. Apply Reset This setting applies to all FTP client connections to save your previously saved settings. 10.5 The Media Server Screens The media server application allows you want to limit the download/upload...port range for data transfer Select this check box to assign a port range for FTP clients to use when downloading files from 1024 to 1029 and configured 10 in the Connection Limit field. The FTP connection limit will not correct the character display in Windows Explorer). Enter the download speed...
User Guide
Page 290
... to save your settings and check whether you can use the settings to connect to the FTP server. Address Account Name Enter the account name used to configure the general settings for the FTP server. Description Enter additional information about this to test your changes. Remote...Enter the path of the FTP server. Table 95 Applications > Auto Upload > FTP Uploadr > Add or Edit a Server LABEL DESCRIPTION Domain Name/IP Enter the domain name or IP address of the FTP server where the NSA automatically uploads files. Test Connection Click this FTP server. Cancel Click this...
... to save your settings and check whether you can use the settings to connect to the FTP server. Address Account Name Enter the account name used to configure the general settings for the FTP server. Description Enter additional information about this to test your changes. Remote...Enter the path of the FTP server. Table 95 Applications > Auto Upload > FTP Uploadr > Add or Edit a Server LABEL DESCRIPTION Domain Name/IP Enter the domain name or IP address of the FTP server where the NSA automatically uploads files. Test Connection Click this FTP server. Cancel Click this...
User Guide
Page 292
...if you want to close the screen. Click Apply to save your changes in a watched folder for other traffic, especially if your Internet connection has restricted upload speed. Select the share from a range of the folder/file. Settings Grace Period Bandwidth Limit Apply Reset Close •...• Folder Name - You can choose from the list. • Path - Chapter 12 Auto Upload Table 96 Applications > Auto Upload > FTP Uploadr > Preferences (continued) LABEL DESCRIPTION Add Click this to open the following screen where you can set a folder that contains files you do ...
...if you want to close the screen. Click Apply to save your changes in a watched folder for other traffic, especially if your Internet connection has restricted upload speed. Select the share from a range of the folder/file. Settings Grace Period Bandwidth Limit Apply Reset Close •...• Folder Name - You can choose from the list. • Path - Chapter 12 Auto Upload Table 96 Applications > Auto Upload > FTP Uploadr > Preferences (continued) LABEL DESCRIPTION Add Click this to open the following screen where you can set a folder that contains files you do ...
User Guide
Page 305
... spaces within names are converted to display a user's information. Other reserved usernames that are not allowed are: • bin • daemon • ftp • anonymous-ftp • anonymous • nobody • root • pc-guest • admin • password 15.4 Displaying User Info Use this screen to ...to 32 characters. numeric characters are case insensitive. For example, if a user exists with CIFS logins, but use 'BOB' when connecting via CIFS or FTP, it will use the account settings used for 'bob'. • The username cannot be the same as a system username such as...
... spaces within names are converted to display a user's information. Other reserved usernames that are not allowed are: • bin • daemon • ftp • anonymous-ftp • anonymous • nobody • root • pc-guest • admin • password 15.4 Displaying User Info Use this screen to ...to 32 characters. numeric characters are case insensitive. For example, if a user exists with CIFS logins, but use 'BOB' when connecting via CIFS or FTP, it will use the account settings used for 'bob'. • The username cannot be the same as a system username such as...
User Guide
Page 329
...Apply if you want to turn on -screen instructions for creating a public key certificate signed by the NSA as allowing users to connect through the Internet using FTP over TLS or HTTPs. 18.6.1 Modifying or Creating a Certificate When you select the Edit a self-signed CA certificate option, then ... Chapter 18 Maintenance Screens The following table describes the labels in this method if the device is open to external access. Anyone who connects via HTTPS to the NSA must install the public key certificate associated with it . Modify the Existing Certificate Note: Each web browser ...
...Apply if you want to turn on -screen instructions for creating a public key certificate signed by the NSA as allowing users to connect through the Internet using FTP over TLS or HTTPs. 18.6.1 Modifying or Creating a Certificate When you select the Edit a self-signed CA certificate option, then ... Chapter 18 Maintenance Screens The following table describes the labels in this method if the device is open to external access. Anyone who connects via HTTPS to the NSA must install the public key certificate associated with it . Modify the Existing Certificate Note: Each web browser ...
User Guide
Page 351
...listed previously for more details. • Check if the shared folder is turned on and connected to the network. See Section 10.4 on page 188 for local users, check that has ANONYMOUS FTP only access rights (as these require 'no login'). He may need to disconnect existing CIFS... connections as new CIFS connection may use previously-saved login information that may already be connected to another (parent) share. Media Server User's Guide ...
...listed previously for more details. • Check if the shared folder is turned on and connected to the network. See Section 10.4 on page 188 for local users, check that has ANONYMOUS FTP only access rights (as these require 'no login'). He may need to disconnect existing CIFS... connections as new CIFS connection may use previously-saved login information that may already be connected to another (parent) share. Media Server User's Guide ...
User Guide
Page 353
... • Install an internal disk if one on the internal disk yet. • Make sure the volume on page 346 and check for related connectivity issues. 20.11 Some Features' Screens Do Not Display Many NSA features require a valid internal volume. One of security is in the NSA. ... computer's folder or your storage device. • You can configure a user's access rights. Features like the print server, download service, broadcatching, FTP and Windows/CIFS access will prompt you for how to control who can play the media files in a healthy state. Chapter 20 Troubleshooting 1 On your...
... • Install an internal disk if one on the internal disk yet. • Make sure the volume on page 346 and check for related connectivity issues. 20.11 Some Features' Screens Do Not Display Many NSA features require a valid internal volume. One of security is in the NSA. ... computer's folder or your storage device. • You can configure a user's access rights. Features like the print server, download service, broadcatching, FTP and Windows/CIFS access will prompt you for how to control who can play the media files in a healthy state. Chapter 20 Troubleshooting 1 On your...
User Guide
Page 356
To authorize a computer, open iTunes and click Store > Authorize Computer. 3 If you are connecting through a NAT router, make sure it store all items or only new items automatically once the channel is possible to remove one and still use ... ID and password to authorize other . Chapter 20 Troubleshooting 2 If you have files from that channel (where '*' is a folder that you have set.) • HTTP/FTP jobs are stored on page 209). With two JBOD volumes, the hard disk that was installed first is active but no files are missing after...
To authorize a computer, open iTunes and click Store > Authorize Computer. 3 If you are connecting through a NAT router, make sure it store all items or only new items automatically once the channel is possible to remove one and still use ... ID and password to authorize other . Chapter 20 Troubleshooting 2 If you have files from that channel (where '*' is a folder that you have set.) • HTTP/FTP jobs are stored on page 209). With two JBOD volumes, the hard disk that was installed first is active but no files are missing after...