User Guide
Page 17
... download files from website feeds for convenient viewing. • Play the NSA's video, music and photo files on your computers using the included media client software. • Play the NSA's video, music and photo files on hardware-based media players. • Use the NSA's website to share files with remote users...
... download files from website feeds for convenient viewing. • Play the NSA's video, music and photo files on your computers using the included media client software. • Play the NSA's video, music and photo files on hardware-based media players. • Use the NSA's website to share files with remote users...
User Guide
Page 163
... those requiring high fault tolerance without need of large amounts of storage capacity or top performance, for example). • Use anti-virus software on your data. • Place the NSA behind a hardware-based firewall. This is useful when data backup is unused. RAID 1...will still be available (but at degraded speeds until you have stateful packet inspection, IDP (Intrusion Detection and Prevention), and anti-virus (like ZyXEL's ZyWALL UTM products for example, accounting and financial data, small database systems, and enterprise servers. Chapter 7 Storage RAID 1 RAID 1 creates ...
... those requiring high fault tolerance without need of large amounts of storage capacity or top performance, for example). • Use anti-virus software on your data. • Place the NSA behind a hardware-based firewall. This is useful when data backup is unused. RAID 1...will still be available (but at degraded speeds until you have stateful packet inspection, IDP (Intrusion Detection and Prevention), and anti-virus (like ZyXEL's ZyWALL UTM products for example, accounting and financial data, small database systems, and enterprise servers. Chapter 7 Storage RAID 1 RAID 1 creates ...
User Guide
Page 176
... you "publish" shares (containing folders and files) on a computer to log into the Home screens. Your FTP client must be set to use Apple's iTunes software on the NSA so people can free up your network play music and video files stored on your computer's system resources. The Digital Living Network...
... you "publish" shares (containing folders and files) on a computer to log into the Home screens. Your FTP client must be set to use Apple's iTunes software on the NSA so people can free up your network play music and video files stored on your computer's system resources. The Digital Living Network...
User Guide
Page 206
... normal network traffic and take immediate action against by a good firewall. Use a Hardware-based Firewall Place a hardware-based firewall between your network and the Internet (a software-based firewall on your computer would just protect the computer itself, not the NSA since your computer is not between the Internet and your network...
... normal network traffic and take immediate action against by a good firewall. Use a Hardware-based Firewall Place a hardware-based firewall between your network and the Internet (a software-based firewall on your computer would just protect the computer itself, not the NSA since your computer is not between the Internet and your network...
User Guide
Page 207
... (it lets you get files from the Internet and blocks those on the Internet from getting files from you. You probably need to use antivirus software on your firewall's Media Server User's Guide 207 P2P Download and Your Firewall The anti-virus feature on a firewall probably cannot check P2P downloads for...
... (it lets you get files from the Internet and blocks those on the Internet from getting files from you. You probably need to use antivirus software on your firewall's Media Server User's Guide 207 P2P Download and Your Firewall The anti-virus feature on a firewall probably cannot check P2P downloads for...
User Guide
Page 209
... NAT or port forwarding on your web browser and type in the address of the NSA's FamilyPhotos web page. Additionally, you can use HTML editing software (not included) to create an index.html or index.htm file to define and customize how your browser's address bar. If your NSA uses a private...
... NAT or port forwarding on your web browser and type in the address of the NSA's FamilyPhotos web page. Additionally, you can use HTML editing software (not included) to create an index.html or index.htm file to define and customize how your browser's address bar. If your NSA uses a private...
User Guide
Page 263
... Current This is the quantity of high current used to a maximum temperature. 191 G-sense error Low rate This is the number of mistakes caused by software ECC (Error Correction Code). 205 Thermal Asperity Low Rate (TAR) This is the number of errors reading or writing a sector that were not correctable. Media...
... Current This is the quantity of high current used to a maximum temperature. 191 G-sense error Low rate This is the number of mistakes caused by software ECC (Error Correction Code). 205 Thermal Asperity Low Rate (TAR) This is the number of errors reading or writing a sector that were not correctable. Media...
User Guide
Page 316
... and close the window. 17.7 The Shutdown Screen Use this screen to having a long key is that no one is an optional field. A software restart is located. Table 118 Maintenance > SSL > Create or Edit a Certificate LABEL DESCRIPTION Common Name This name describes the certificate's origin, either ... Unit (Optional) Enter this name of the organization or company which the NSA is faster than turning the NSA off the NSA or perform a software restart. This is also the same for the Create a certificate authorized by other CA option. Figure 184 Maintenance > SSL > Create or Edit ...
... and close the window. 17.7 The Shutdown Screen Use this screen to having a long key is that no one is an optional field. A software restart is located. Table 118 Maintenance > SSL > Create or Edit a Certificate LABEL DESCRIPTION Common Name This name describes the certificate's origin, either ... Unit (Optional) Enter this name of the organization or company which the NSA is faster than turning the NSA off the NSA or perform a software restart. This is also the same for the Create a certificate authorized by other CA option. Figure 184 Maintenance > SSL > Create or Edit ...
User Guide
Page 317
... This log class shows information on log classes. Figure 185 Maintenance > Shutdown The following table shows information on user access to have the device perform a software restart. Figure 186 Maintenance > Shutdown > Confirm Restart When you click the Shutdown button a pop-up screen will appear asking you to confirm. Services This log...
... This log class shows information on log classes. Figure 185 Maintenance > Shutdown The following table shows information on user access to have the device perform a software restart. Figure 186 Maintenance > Shutdown > Confirm Restart When you click the Shutdown button a pop-up screen will appear asking you to confirm. Services This log...
User Guide
Page 325
...things go back to the previous configuration by virus ACTION Back up data to another NSA or external USB hard drive. Use anti-virus software on your computer to scan files before you make the configuration changes, you make major configuration changes. If you may be done in ...18 Protecting Your Data 18.1 Overview This chapter compares the different ways of protecting data on the NSA and explains how to use backup management software included on the CD. 18.2 Protection Methods There are a variety of your NSA configurations such as a fire or earthquake occurs where your...
...things go back to the previous configuration by virus ACTION Back up data to another NSA or external USB hard drive. Use anti-virus software on your computer to scan files before you make the configuration changes, you make major configuration changes. If you may be done in ...18 Protecting Your Data 18.1 Overview This chapter compares the different ways of protecting data on the NSA and explains how to use backup management software included on the CD. 18.2 Protection Methods There are a variety of your NSA configurations such as a fire or earthquake occurs where your...
User Guide
Page 330
...using the NAS Starter Utility. • If the server name has changed and you may need to add the NAS Starter Utility to your software firewall or anti-virus scanner's security level. After the second beep, continue pressing the button for example). • Use the NAS Starter ... the NAS Starter Utility, see which IP address belongs to which one until you have to configure your software firewall or other security software to allow list or lower your software firewall's allow UDP port 50127 traffic from the NSA. Chapter 19 Troubleshooting The NAS Starter Utility discovered my...
...using the NAS Starter Utility. • If the server name has changed and you may need to add the NAS Starter Utility to your software firewall or anti-virus scanner's security level. After the second beep, continue pressing the button for example). • Use the NAS Starter ... the NAS Starter Utility, see which IP address belongs to which one until you have to configure your software firewall or other security software to allow list or lower your software firewall's allow UDP port 50127 traffic from the NSA. Chapter 19 Troubleshooting The NAS Starter Utility discovered my...
User Guide
Page 338
...media server supports. 2 If you are not supported on page 346 for the file formats that the media server supports. Since the media client software uses your computer's installed codecs, files do not display in the list on the media client. Make sure the share containing the music files ...) to your NSA includes the features mentioned in Section 3.5.2 on your computer. This does not include the applications you can install using media client software, you may need to install codecs on the media server may not display in the list. Files with formats that are a format supported by ...
...media server supports. 2 If you are not supported on page 346 for the file formats that the media server supports. Since the media client software uses your computer's installed codecs, files do not display in the list on the media client. Make sure the share containing the music files ...) to your NSA includes the features mentioned in Section 3.5.2 on your computer. This does not include the applications you can install using media client software, you may need to install codecs on the media server may not display in the list. Files with formats that are a format supported by ...
User Guide
Page 347
...designed to provide reasonable protection against harmful interference in any products, or software described herein. Operation is not responsible for a Class B digital device pursuant to make changes in a residential installation. ZyXEL further reserves the right to Part 15 of the download service feature. ... This device has been tested and found to any data, programs, or storage media resulting from the use of ZyXEL Communications Corporation. Disclaimers ZyXEL does not assume any liability arising out of the application or use , misuse, or disuse of this publication may...
...designed to provide reasonable protection against harmful interference in any products, or software described herein. Operation is not responsible for a Class B digital device pursuant to make changes in a residential installation. ZyXEL further reserves the right to Part 15 of the download service feature. ... This device has been tested and found to any data, programs, or storage media resulting from the use of ZyXEL Communications Corporation. Disclaimers ZyXEL does not assume any liability arising out of the application or use , misuse, or disuse of this publication may...