User Guide
Page 17
... download files from website feeds for convenient viewing. • Play the NSA's video, music and photo files on your computers using the included media client software. • Play the NSA's video, music and photo files on hardware-based media players. • Use the NSA's website to share files with remote users...
... download files from website feeds for convenient viewing. • Play the NSA's video, music and photo files on your computers using the included media client software. • Play the NSA's video, music and photo files on hardware-based media players. • Use the NSA's website to share files with remote users...
User Guide
Page 163
For example, if you have stateful packet inspection, IDP (Intrusion Detection and Prevention), and anti-virus (like ZyXEL's ZyWALL UTM products for the NSA). Chapter 7 Storage RAID 1 RAID 1 creates an exact copy (or mirror) of a set of data on the NSA. • Keep ... DISK 1 DISK 2 As RAID 1 uses mirroring and duplexing, a RAID 1 volume needs an even number of disks (two or four for example). • Use anti-virus software on your data will still be available (but at degraded speeds until you 're using a RAID 1 volume, then your computer to the size of sizes...
For example, if you have stateful packet inspection, IDP (Intrusion Detection and Prevention), and anti-virus (like ZyXEL's ZyWALL UTM products for the NSA). Chapter 7 Storage RAID 1 RAID 1 creates an exact copy (or mirror) of a set of data on the NSA. • Keep ... DISK 1 DISK 2 As RAID 1 uses mirroring and duplexing, a RAID 1 volume needs an even number of disks (two or four for example). • Use anti-virus software on your data will still be available (but at degraded speeds until you 're using a RAID 1 volume, then your computer to the size of sizes...
User Guide
Page 176
... download using iTunes. The NSA can download iTunes from the Internet directly to the NSA. Your FTP client must be set to use Apple's iTunes software on the NSA. Download Service The NSA's download service downloads files from www.apple.com. The NSA can share files with others without having to...
... download using iTunes. The NSA can download iTunes from the Internet directly to the NSA. Your FTP client must be set to use Apple's iTunes software on the NSA. Download Service The NSA's download service downloads files from www.apple.com. The NSA can share files with others without having to...
User Guide
Page 206
... and Prevention) to control access between your NSA and the Internet). Use a Hardware-based Firewall Place a hardware-based firewall between your network and the Internet (a software-based firewall on your computer would just protect the computer itself, not the NSA since your computer is not between the Internet and your network...
... and Prevention) to control access between your NSA and the Internet). Use a Hardware-based Firewall Place a hardware-based firewall between your network and the Internet (a software-based firewall on your computer would just protect the computer itself, not the NSA since your computer is not between the Internet and your network...
User Guide
Page 207
... speed up P2P download file transfers, configure your firewall's port forwarding to send incoming TCP port 9090 and UDP port 9089 connections to use antivirus software on the Internet from getting files from you . The firewall slows this down because by default, it only allows traffic from the Internet in response...
... speed up P2P download file transfers, configure your firewall's port forwarding to send incoming TCP port 9090 and UDP port 9089 connections to use antivirus software on the Internet from getting files from you . The firewall slows this down because by default, it only allows traffic from the Internet in response...
User Guide
Page 209
... you do not have the NSA behind a good hardware-based firewall. Then press [ENTER] or click Go. Note: The NSA does not use HTML editing software (not included) to create an index.html or index.htm file to access the photos at http://my-NSA's-IP-Address/MyWeb/ FamilyPhotos. In this...
... you do not have the NSA behind a good hardware-based firewall. Then press [ENTER] or click Go. Note: The NSA does not use HTML editing software (not included) to create an index.html or index.htm file to access the photos at http://my-NSA's-IP-Address/MyWeb/ FamilyPhotos. In this...
User Guide
Page 263
... Recovered High This is the time between ECC (Error Correction Code)-corrected errors. 196 Reallocation Low This is the total number of mistakes caused by software ECC (Error Correction Code). 205 Thermal Asperity Low Rate (TAR) This is stuck, the motor driving it tries to oscillate the arm to track. When...
... Recovered High This is the time between ECC (Error Correction Code)-corrected errors. 196 Reallocation Low This is the total number of mistakes caused by software ECC (Error Correction Code). 205 Thermal Asperity Low Rate (TAR) This is stuck, the motor driving it tries to oscillate the arm to track. When...
User Guide
Page 316
...NSA's IP address if you want to having a long key is that no one is faster than turning the NSA off the NSA or perform a software restart. Organization (Optional) Enter this for the Create a certificate authorized by other CA option. Country (Optional) Enter this name of an IP address or... Guide Table 118 Maintenance > SSL > Create or Edit a Certificate LABEL DESCRIPTION Common Name This name describes the certificate's origin, either RSA or DSA. A software restart is logged into the NSA or transferring files to make sure that the file encrypted with it on again.
...NSA's IP address if you want to having a long key is that no one is faster than turning the NSA off the NSA or perform a software restart. Organization (Optional) Enter this for the Create a certificate authorized by other CA option. Country (Optional) Enter this name of an IP address or... Guide Table 118 Maintenance > SSL > Create or Edit a Certificate LABEL DESCRIPTION Common Name This name describes the certificate's origin, either RSA or DSA. A software restart is logged into the NSA or transferring files to make sure that the file encrypted with it on again.
User Guide
Page 317
... Shutdown button a pop-up screen will appear asking you to confirm. Table 119 Maintenance > Shutdown LABEL DESCRIPTION Restart Click this to have the device perform a software restart. When you click the Restart button a pop-up screen will appear asking you to confirm. Shutdown Click this to shut down the system and...
... Shutdown button a pop-up screen will appear asking you to confirm. Table 119 Maintenance > Shutdown LABEL DESCRIPTION Restart Click this to have the device perform a software restart. When you click the Restart button a pop-up screen will appear asking you to confirm. Shutdown Click this to shut down the system and...
User Guide
Page 325
... going to do some major configuration changes, then it to occur while no one is using the NSA. Hard drive malfunction. Use anti-virus software on your data to a computer or other storage devices. Back up the NSA configuration file before saving them onto the NSA. Media Server User... Protecting Your Data 18.1 Overview This chapter compares the different ways of protecting data on the NSA and explains how to use backup management software included on the CD. 18.2 Protection Methods There are a variety of ways to protect your NSA is located The following sections describe these...
... going to do some major configuration changes, then it to occur while no one is using the NSA. Hard drive malfunction. Use anti-virus software on your data to a computer or other storage devices. Back up the NSA configuration file before saving them onto the NSA. Media Server User... Protecting Your Data 18.1 Overview This chapter compares the different ways of protecting data on the NSA and explains how to use backup management software included on the CD. 18.2 Protection Methods There are a variety of ways to protect your NSA is located The following sections describe these...
User Guide
Page 330
... occurs, you will hear three quick beeps after you will lose access to connect and rename the NSAs one-by the number of your model ('nsa320' for five more seconds, then release it. Then connect another NSA and rename it and continue to the NSA. You may have at least... in the NAS Starter Utility screens. After the second beep, continue pressing the button for example). • Use the NAS Starter Utility to your software firewall's allow UDP port 50127 traffic from the NSA. Chapter 19 Troubleshooting The NAS Starter Utility discovered my NSA but the status is always unreachable...
... occurs, you will hear three quick beeps after you will lose access to connect and rename the NSAs one-by the number of your model ('nsa320' for five more seconds, then release it. Then connect another NSA and rename it and continue to the NSA. You may have at least... in the NAS Starter Utility screens. After the second beep, continue pressing the button for example). • Use the NAS Starter Utility to your software firewall's allow UDP port 50127 traffic from the NSA. Chapter 19 Troubleshooting The NAS Starter Utility discovered my NSA but the status is always unreachable...
User Guide
Page 338
... computer's installed codecs, files do not display in the list. Files with formats that are a format supported by iTunes. Since the media client software uses your computer. See Section 20.2 on page 346 for the file formats that the media server supports. 2 If you are not supported on... mentioned in Section 3.5.2 on page 346. 2 Go to your NSA. • If you have installed the application and can install using media client software, you have Enabled the application. 19.12 Media Server Functions I cannot use some of all the music files I published a folder with the media ...
... computer's installed codecs, files do not display in the list. Files with formats that are a format supported by iTunes. Since the media client software uses your computer. See Section 20.2 on page 346 for the file formats that the media server supports. 2 If you are not supported on... mentioned in Section 3.5.2 on page 346. 2 Go to your NSA. • If you have installed the application and can install using media client software, you have Enabled the application. 19.12 Media Server Functions I cannot use some of all the music files I published a folder with the media ...
User Guide
Page 347
..., or storage media resulting from the use of others. APPENDIX A Legal Information Copyright Copyright © 2013 by ZyXEL Communications Corporation. ZyXEL further reserves the right to Part 15 of the download service feature. Do not use of the FCC Rules. ... subject to change without the prior written permission of copyright laws and any products, or software described herein. Operation is subject to the restrictions of ZyXEL Communications Corporation. These limits are also stored elsewhere. Certifications Federal Communications Commission (FCC) Interference...
..., or storage media resulting from the use of others. APPENDIX A Legal Information Copyright Copyright © 2013 by ZyXEL Communications Corporation. ZyXEL further reserves the right to Part 15 of the download service feature. Do not use of the FCC Rules. ... subject to change without the prior written permission of copyright laws and any products, or software described herein. Operation is subject to the restrictions of ZyXEL Communications Corporation. These limits are also stored elsewhere. Certifications Federal Communications Commission (FCC) Interference...