User Guide
Page 4
Disclaimer Graphics in this manual is accurate. 4 NSA-220 Plus User's Guide About This User's Guide • Product model and serial number. • Warranty Information. • Date that the information in this book may differ slightly from the product due to solve it. Every effort has been made to ensure that you took to differences in operating systems, operating system versions, or if you installed updated firmware/software for your device. • Brief description of the problem and the steps you received your device.
Disclaimer Graphics in this manual is accurate. 4 NSA-220 Plus User's Guide About This User's Guide • Product model and serial number. • Warranty Information. • Date that the information in this book may differ slightly from the product due to solve it. Every effort has been made to ensure that you took to differences in operating systems, operating system versions, or if you installed updated firmware/software for your device. • Brief description of the problem and the steps you received your device.
User Guide
Page 21
NSA-220 Plus User's Guide 21 CHAPTER 1 Getting to Know Your NSA This chapter covers the main features and applications of the NSA. 1.1 NSA Overview Use the NSA (Network Storage Appliance) to do the following. • Share files between computers on your network. • Back up files from your computers to the NSA. ..., music and photo files on your computers using the included media client software. • Play the NSA's video, music and photo files on hardware-based media clients like the DMA-1000. • Use the NSA's website to share files with remote users. • Use iTunes on your...
NSA-220 Plus User's Guide 21 CHAPTER 1 Getting to Know Your NSA This chapter covers the main features and applications of the NSA. 1.1 NSA Overview Use the NSA (Network Storage Appliance) to do the following. • Share files between computers on your network. • Back up files from your computers to the NSA. ..., music and photo files on your computers using the included media client software. • Play the NSA's video, music and photo files on hardware-based media clients like the DMA-1000. • Use the NSA's website to share files with remote users. • Use iTunes on your...
User Guide
Page 124
...virus (like ZyXEL's ZyWALL UTM products for helping to scan files from others before saving the files on the NSA. • Keep another location). 124 NSA-220 Plus User's Guide Typical applications for RAID 1 are some suggestions for example). • Use anti-virus software on your ...computer to protect your data. • Place the NSA behind a hardware-based firewall....
...virus (like ZyXEL's ZyWALL UTM products for helping to scan files from others before saving the files on the NSA. • Keep another location). 124 NSA-220 Plus User's Guide Typical applications for RAID 1 are some suggestions for example). • Use anti-virus software on your ...computer to protect your data. • Place the NSA behind a hardware-based firewall....
User Guide
Page 132
...software on a computer to play music and video files stored on your network play video, music, and photos from the NSA (without having to copy them to another computer). The NSA streams files to DLNA-compliant media clients or computers using a web browser without having to log into the 132 NSA-220 Plus... User's Guide iTunes Server The NSA iTunes server feature lets you "publish" shares (containing folders and files) on the NSA so people can access the files using iTunes. This can download using these...
...software on a computer to play music and video files stored on your network play video, music, and photos from the NSA (without having to copy them to another computer). The NSA streams files to DLNA-compliant media clients or computers using a web browser without having to log into the 132 NSA-220 Plus... User's Guide iTunes Server The NSA iTunes server feature lets you "publish" shares (containing folders and files) on the NSA so people can access the files using iTunes. This can download using these...
User Guide
Page 150
...7.4.9 BitTorrent Security When you download using BitTorrent, you reveal your network and the Internet (a software-based firewall on Info-Hash Tracker Close Select High to have the NSA download this field to set the priority for finding peers sharing the file. Click this download... Malicious Packets 150 Viruses • Stateful packet inspection to verify the torrent file. Ideally your NSA (and computers) from hacking attacks. NSA-220 Plus User's Guide This field displays when the NSA started to have all of hacking attacks, which can be protected against by a good firewall....
...7.4.9 BitTorrent Security When you download using BitTorrent, you reveal your network and the Internet (a software-based firewall on Info-Hash Tracker Close Select High to have the NSA download this field to set the priority for finding peers sharing the file. Click this download... Malicious Packets 150 Viruses • Stateful packet inspection to verify the torrent file. Ideally your NSA (and computers) from hacking attacks. NSA-220 Plus User's Guide This field displays when the NSA started to have all of hacking attacks, which can be protected against by a good firewall....
User Guide
Page 151
... BitTorrent Requests Blocked Outgoing BitTorrent Request Allowed Corresponding BitTorrent Reply Allowed To speed up BitTorrent file transfers, configure your computer to the NSA. When you download using BitTorrent, many other BitTorrent users are also trying to check files you download for viruses. Chapter 7 Applications.... • Anti-virus to download the file from you. You probably need to use anti-virus software on the Internet from getting files from the Internet in response to NSA-220 Plus User's Guide 151 The firewall slows this down because by default, it lets you ).
... BitTorrent Requests Blocked Outgoing BitTorrent Request Allowed Corresponding BitTorrent Reply Allowed To speed up BitTorrent file transfers, configure your computer to the NSA. When you download using BitTorrent, many other BitTorrent users are also trying to check files you download for viruses. Chapter 7 Applications.... • Anti-virus to download the file from you. You probably need to use anti-virus software on the Internet from getting files from the Internet in response to NSA-220 Plus User's Guide 151 The firewall slows this down because by default, it lets you ).
User Guide
Page 156
...http://192.168.1.23:8080/MyWeb/ FamilyPhotos/" in the published folders. Then you can configure one set of rules for accessing the NSA's web configurator. 156 NSA-220 Plus User's Guide See page 150 for more secure, you can have the web-published shares use another separate set of firewall rules... port number. Additionally, you may need to use HTML editing software (not included) to create an index.html or index.htm file to define and customize how your website works and looks. Chapter 7 Applications Note: The NSA does not use any security for the files in your browser's...
...http://192.168.1.23:8080/MyWeb/ FamilyPhotos/" in the published folders. Then you can configure one set of rules for accessing the NSA's web configurator. 156 NSA-220 Plus User's Guide See page 150 for more secure, you can have the web-published shares use another separate set of firewall rules... port number. Additionally, you may need to use HTML editing software (not included) to create an index.html or index.htm file to define and customize how your website works and looks. Chapter 7 Applications Note: The NSA does not use any security for the files in your browser's...
User Guide
Page 235
... a minimum threshold that were not correctable. the temperature in writing sectors. 20 Soft Read Error Low 1 Rate This is the number of mistakes caused by software ECC (Error Correction Code). An increase in this value decreases and reallocation is the number of data transfer errors through the interface cable according to... not performed. If the value is not zero, make a backup. 20 Data Address 2 Mark Errors Low This is the number of data address mark errors. NSA-220 Plus User's Guide 235
... a minimum threshold that were not correctable. the temperature in writing sectors. 20 Soft Read Error Low 1 Rate This is the number of mistakes caused by software ECC (Error Correction Code). An increase in this value decreases and reallocation is the number of data transfer errors through the interface cable according to... not performed. If the value is not zero, make a backup. 20 Data Address 2 Mark Errors Low This is the number of data address mark errors. NSA-220 Plus User's Guide 235
User Guide
Page 275
... check the System Status > Active Sessions screen to make sure that no one is faster than turning the NSA off the NSA or perform a software restart. Click this to or from the NSA. Figure 123 Maintenance > Shutdown > Confirm Restart When you click the Shutdown button a pop-up screen will...you to turn off and then turning it again later. A software restart is logged into the NSA or transferring files to shut down the system and restart it on again. Figure 124 Maintenance > Shutdown > Confirm Shutdown NSA-220 Plus User's Guide 275 Click OK to continue or Cancel to confirm....
... check the System Status > Active Sessions screen to make sure that no one is faster than turning the NSA off the NSA or perform a software restart. Click this to or from the NSA. Figure 123 Maintenance > Shutdown > Confirm Restart When you click the Shutdown button a pop-up screen will...you to turn off and then turning it again later. A software restart is logged into the NSA or transferring files to shut down the system and restart it on again. Figure 124 Maintenance > Shutdown > Confirm Shutdown NSA-220 Plus User's Guide 275 Click OK to continue or Cancel to confirm....
User Guide
Page 277
... files before saving them onto the NSA. NSA-220 Plus User's Guide 277 Table 103 Overview of Protection Methods SITUATION Unexpected NSA behavior after configuration changes Need to transfer data from your computer to another NSA or external USB hard drive. Use anti-virus software on RAID. Use the Memeo Autobackup program. NSA malfunction Network down Use a firewall...
... files before saving them onto the NSA. NSA-220 Plus User's Guide 277 Table 103 Overview of Protection Methods SITUATION Unexpected NSA behavior after configuration changes Need to transfer data from your computer to another NSA or external USB hard drive. Use anti-virus software on RAID. Use the Memeo Autobackup program. NSA malfunction Network down Use a firewall...
User Guide
Page 278
... does not affect data (your files and folders), volumes on the NSA. 13.2.2 Memeo Autobackup Use the Memeo Autobackup software (included on the CD) on your computer to the NSA whenever you can set the Memeo Autobackup software to automatically back up files from your computer to schedule and manage backups... always go back to do not run the Memeo Autobackup program at the same time as the NDU. 278 NSA-220 Plus User's Guide Install the included DLNA-compliant Memeo Autobackup software on your Windows 2000 or later computers to let them browse and play files stored on page 284) to...
... does not affect data (your files and folders), volumes on the NSA. 13.2.2 Memeo Autobackup Use the Memeo Autobackup software (included on the CD) on your computer to the NSA whenever you can set the Memeo Autobackup software to automatically back up files from your computer to schedule and manage backups... always go back to do not run the Memeo Autobackup program at the same time as the NDU. 278 NSA-220 Plus User's Guide Install the included DLNA-compliant Memeo Autobackup software on your Windows 2000 or later computers to let them browse and play files stored on page 284) to...
User Guide
Page 290
... 15.4 on page 300 for the file formats that are using media client software, you are not supported on the media server may not support the file's format. See Section 15.5 on page 301. 2 Go to the NSA for files every three minutes. Leave iTunes connected to Applications > Media Server....iTunes does not display the names of all the music or video files I just put on your computer. Figure 127 iTunes Eject Button 290 NSA-220 Plus User's Guide Since the media client software uses your computer's installed codecs, files do not play if the required codec is connected, the...
... 15.4 on page 300 for the file formats that are using media client software, you are not supported on the media server may not support the file's format. See Section 15.5 on page 301. 2 Go to the NSA for files every three minutes. Leave iTunes connected to Applications > Media Server....iTunes does not display the names of all the music or video files I just put on your computer. Figure 127 iTunes Eject Button 290 NSA-220 Plus User's Guide Since the media client software uses your computer's installed codecs, files do not play if the required codec is connected, the...
User Guide
Page 296
... network drive. Access the NSA using the web configurator. This software is also a DLNA-certified media server that lets DLNA- Configure a password for six minutes, the NSA puts it again. Use the NDU from a Windows computer to find NSA(s) in logs. 296 NSA-220 Plus User's Guide Chapter 15 Product... Specifications 15.2 Firmware Features These are some of the main firmware features of protecting your computer. If a hard disk inside the NSA is a DLNA-compliant media server that...
... network drive. Access the NSA using the web configurator. This software is also a DLNA-certified media server that lets DLNA- Configure a password for six minutes, the NSA puts it again. Use the NDU from a Windows computer to find NSA(s) in logs. 296 NSA-220 Plus User's Guide Chapter 15 Product... Specifications 15.2 Firmware Features These are some of the main firmware features of protecting your computer. If a hard disk inside the NSA is a DLNA-compliant media server that...
User Guide
Page 303
TCP/IP should already be installed on your network. Windows 3.1 requires the purchase of UNIX/LINUX include the software components you need to install and use TCP/IP on computers using Windows NT/2000/XP, Macintosh OS 7 and later operating systems. After ...communicate" with your computer. APPENDIX A Setting up Your Computer's IP Address All computers must have a 10M or 100M Ethernet adapter card and TCP/IP installed. NSA-220 Plus User's Guide 303 Windows 95/98/Me/NT/2000/XP, Macintosh OS 7 and later operating systems and all versions of a thirdparty TCP/IP application package....
TCP/IP should already be installed on your network. Windows 3.1 requires the purchase of UNIX/LINUX include the software components you need to install and use TCP/IP on computers using Windows NT/2000/XP, Macintosh OS 7 and later operating systems. After ...communicate" with your computer. APPENDIX A Setting up Your Computer's IP Address All computers must have a 10M or 100M Ethernet adapter card and TCP/IP installed. NSA-220 Plus User's Guide 303 Windows 95/98/Me/NT/2000/XP, Macintosh OS 7 and later operating systems and all versions of a thirdparty TCP/IP application package....
User Guide
Page 329
...Domain Name Server, a service that use this service. For a comprehensive list of the applications that matches web names (for example www.zyxel.com) to RFC 1700 for the service. If this is the type of IP protocol used . BOOTP_SERVER UDP 67 DHCP Server. CU...24032 A popular videoconferencing solution from White Pines Software. Please refer to IP numbers. AIM/New-ICQ TCP 5190 AOL's Internet Messenger service. BOOTP_CLIENT UDP 68 DHCP Client. APPENDIX C Common Services The following table lists some servers. NSA-220 Plus User's Guide 329 Table 112 Commonly Used ...
...Domain Name Server, a service that use this service. For a comprehensive list of the applications that matches web names (for example www.zyxel.com) to RFC 1700 for the service. If this is the type of IP protocol used . BOOTP_SERVER UDP 67 DHCP Server. CU...24032 A popular videoconferencing solution from White Pines Software. Please refer to IP numbers. AIM/New-ICQ TCP 5190 AOL's Internet Messenger service. BOOTP_CLIENT UDP 68 DHCP Client. APPENDIX C Common Services The following table lists some servers. NSA-220 Plus User's Guide 329 Table 112 Commonly Used ...
User Guide
Page 365
... to use the program with which this license is distributed (the "Software"), including any documentation files accompanying the Software ("Documentation"), for internal business use only, for "NSA-220 Plus" WARNING: ZyXEL Communications Corp. PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM. Appendix E Open Source Licences...
... to use the program with which this license is distributed (the "Software"), including any documentation files accompanying the Software ("Documentation"), for internal business use only, for "NSA-220 Plus" WARNING: ZyXEL Communications Corp. PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM. Appendix E Open Source Licences...
User Guide
Page 366
... rights therein shall remain at all implied licenses are reserved by ZyXEL, and all times with ZyXEL. Any other person or entity. You may not market, co-brand, and private label or otherwise permit third parties to link to the Software. Please 366 NSA-220 Plus User's Guide Ownership of any part thereof. You may not...
... rights therein shall remain at all implied licenses are reserved by ZyXEL, and all times with ZyXEL. Any other person or entity. You may not market, co-brand, and private label or otherwise permit third parties to link to the Software. Please 366 NSA-220 Plus User's Guide Ownership of any part thereof. You may not...
User Guide
Page 367
... APPLY TO YOU. BECAUSE SOME STATES/COUNTRIES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF NSA-220 Plus User's Guide 367 ZyXEL's TOTAL AGGREGATE LIABILITY WITH RESPECT TO ITS OBLIGATIONS UNDER THIS AGREEMENT OR OTHERWISE WITH RESPECT TO THE SOFTWARE AND DOCUMENTATION OR OTHERWISE SHALL BE EQUAL TO THE PURCHASE PRICE, BUT SHALL IN NO...
... APPLY TO YOU. BECAUSE SOME STATES/COUNTRIES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF NSA-220 Plus User's Guide 367 ZyXEL's TOTAL AGGREGATE LIABILITY WITH RESPECT TO ITS OBLIGATIONS UNDER THIS AGREEMENT OR OTHERWISE WITH RESPECT TO THE SOFTWARE AND DOCUMENTATION OR OTHERWISE SHALL BE EQUAL TO THE PURCHASE PRICE, BUT SHALL IN NO...
User Guide
Page 368
... License Agreement, the rights granted hereunder, the Software and Documentation shall not be construed, interpreted and governed by you agree to destroy or return to a binding arbitration. Any waiver or modification of this License Agreement shall be 368 NSA-220 Plus User's Guide YOU AGREE TO INDEMNIFY ZyXEL AGAINST ALL CLAIMS, LOSSES, DAMAGES, LIABILITIES, COSTS...
... License Agreement, the rights granted hereunder, the Software and Documentation shall not be construed, interpreted and governed by you agree to destroy or return to a binding arbitration. Any waiver or modification of this License Agreement shall be 368 NSA-220 Plus User's Guide YOU AGREE TO INDEMNIFY ZyXEL AGAINST ALL CLAIMS, LOSSES, DAMAGES, LIABILITIES, COSTS...
User Guide
Page 369
.... NSA-220 Plus User's Guide 369 Appendix E Open Source Licences effective if it is found invalid or unenforceable by both parties hereto. For at least three (3) years from the date of distribution of the applicable product or software, we will give to anyone who contacts us at the ZyXEL Technical... Support (support@zyxel.com.tw), for a charge of no more than our cost of physically performing source code distribution,...
.... NSA-220 Plus User's Guide 369 Appendix E Open Source Licences effective if it is found invalid or unenforceable by both parties hereto. For at least three (3) years from the date of distribution of the applicable product or software, we will give to anyone who contacts us at the ZyXEL Technical... Support (support@zyxel.com.tw), for a charge of no more than our cost of physically performing source code distribution,...