User Guide
Page 6
...4.2.1 If the NSA Icon Does Not Display 53 4.2.2 NSA Icon Right-click Options 54 4.3 Windows 7 Network Map ...55 4.4 Playing Media Files in Windows 7 ...58 4.5 Windows 7 Devices and Printers ...58 4.5.1 Windows 7 Desktop Shortcut 60 4.6 Creating a Volume in a 2-Bay NSA 61 4.6.1 Creating a...4.9.4 Accessing a Share From Windows Explorer 76 4.9.5 Accessing a Share Using FTP 78 4.9.6 Accessing a Share Through the Web Configurator 79 4.10 Download Service Tutorial ...80 4.10.1 Copying/Pasting a Download Link 80 4.10.2 Installing the Link Capture Browser Plugin 83 4.10.3 Using the Link Capture...
...4.2.1 If the NSA Icon Does Not Display 53 4.2.2 NSA Icon Right-click Options 54 4.3 Windows 7 Network Map ...55 4.4 Playing Media Files in Windows 7 ...58 4.5 Windows 7 Devices and Printers ...58 4.5.1 Windows 7 Desktop Shortcut 60 4.6 Creating a Volume in a 2-Bay NSA 61 4.6.1 Creating a...4.9.4 Accessing a Share From Windows Explorer 76 4.9.5 Accessing a Share Using FTP 78 4.9.6 Accessing a Share Through the Web Configurator 79 4.10 Download Service Tutorial ...80 4.10.1 Copying/Pasting a Download Link 80 4.10.2 Installing the Link Capture Browser Plugin 83 4.10.3 Using the Link Capture...
User Guide
Page 24
...'s Guide See Section 3.4 on page 226 for details. zPilot Click this to log into the NSA's file directory in Windows Explorer. Dropbox Click this application. See Section 10.8 on page 32 for other users. You can play media files. Network Drive Click this to host pictures. Use the... NSA administrator credentials to log in your NSA to use your computer's Windows Explorer. eMule This displays when the NSA ...
...'s Guide See Section 3.4 on page 226 for details. zPilot Click this to log into the NSA's file directory in Windows Explorer. Dropbox Click this application. See Section 10.8 on page 32 for other users. You can play media files. Network Drive Click this to host pictures. Use the... NSA administrator credentials to log in your NSA to use your computer's Windows Explorer. eMule This displays when the NSA ...
User Guide
Page 26
... Folder to map it. After the transfer finishes you have access as network drives. Enter your computer to map depends on your computer's Windows Explorer. For example, if share1 is private to user1, then only user1 is allowed to control the transfer. The table displays the NSA... 26 Media Server User's Guide Figure 9 zPilot Showing Transfer Rate Double-click the zPilot icon to clear completed transfers from the list. Figure 10 zPilot Transfer Details 2.6 Network Drive In the main NAS Starter Utility screen click Network Drive to add the NSA's public shares as a network...
... Folder to map it. After the transfer finishes you have access as network drives. Enter your computer to map depends on your computer's Windows Explorer. For example, if share1 is private to user1, then only user1 is allowed to control the transfer. The table displays the NSA... 26 Media Server User's Guide Figure 9 zPilot Showing Transfer Rate Double-click the zPilot icon to clear completed transfers from the list. Figure 10 zPilot Transfer Details 2.6 Network Drive In the main NAS Starter Utility screen click Network Drive to add the NSA's public shares as a network...
User Guide
Page 29
Web pop-up windows from your computer is in Windows XP SP (Service Pack) 2. • JavaScript (enabled by default). 3.2 Accessing the NSA Web Configurator Make sure your NSA is enabled by 768 pixels or higher. ...-up blocking is properly connected and that allows easy NSA setup and management using an Internet browser. Use Internet Explorer 7.0, Mozilla Firefox 3.6, Safari 5, Google Chrome 10, or later versions of its screens. CHAPTER 3 Web Configurator Basics 3.1 Overview This chapter describes how to the Quick Start Guide or the appendices). The web...
Web pop-up windows from your computer is in Windows XP SP (Service Pack) 2. • JavaScript (enabled by default). 3.2 Accessing the NSA Web Configurator Make sure your NSA is enabled by 768 pixels or higher. ...-up blocking is properly connected and that allows easy NSA setup and management using an Internet browser. Use Internet Explorer 7.0, Mozilla Firefox 3.6, Safari 5, Google Chrome 10, or later versions of its screens. CHAPTER 3 Web Configurator Basics 3.1 Overview This chapter describes how to the Quick Start Guide or the appendices). The web...
User Guide
Page 178
... of time that the NSA allows for users who are logged into the NSA. Customize the port range for FTP clients to 1029 and configured 10 in the range divided by 2) because it will only be 3 (6 ports in the Connection Limit field. For example, you to the NSA via FTP...connect to share media files with media clients. 178 Media Server User's Guide If the NSA's folders, or file names do not display correctly in Windows Explorer). Table 35 Applications > FTP LABEL DESCRIPTION FTP Enable FTP You can be valid and have a corresponding correct password. Port Number This is smaller...
... of time that the NSA allows for users who are logged into the NSA. Customize the port range for FTP clients to 1029 and configured 10 in the range divided by 2) because it will only be 3 (6 ports in the Connection Limit field. For example, you to the NSA via FTP...connect to share media files with media clients. 178 Media Server User's Guide If the NSA's folders, or file names do not display correctly in Windows Explorer). Table 35 Applications > FTP LABEL DESCRIPTION FTP Enable FTP You can be valid and have a corresponding correct password. Port Number This is smaller...
User Guide
Page 184
...Add LABEL Source URL DESCRIPTION Paste the URL or magnet link of the .torrent file. You do a P2P download. A torrent file uses a .torrent extension. Section 4.10 on page 80 provides a tutorial on your computer. A magnet link is also OK for an HTTP, FTP, or P2P download. A "torrent" file has information the...it to manually download the .torrent file or save it . If you want or a pop-up window. If you can be a link to a screen that link opens the file or the pop-up window about how to download into this field. It is for the NSA to the magnet link. See...
...Add LABEL Source URL DESCRIPTION Paste the URL or magnet link of the .torrent file. You do a P2P download. A torrent file uses a .torrent extension. Section 4.10 on page 80 provides a tutorial on your computer. A magnet link is also OK for an HTTP, FTP, or P2P download. A "torrent" file has information the...it to manually download the .torrent file or save it . If you want or a pop-up window. If you can be a link to a screen that link opens the file or the pop-up window about how to download into this field. It is for the NSA to the magnet link. See...
User Guide
Page 205
...'s download list. The URL is to use FTP or a CIFS program (Windows Explorer for example) to copy the torrent file into the torrent folder. You can also download the files from the RSS reader to your computer. See Section 4.10.5 on page 92 for a tutorial about installing and using the download service.... Figure 93 Link Capture Browser Plugin Instead of downloaded files on page 88 for the files. The NSA automatically uses the torrent file. See Section 4.10.2 on page 83 and Section...
...'s download list. The URL is to use FTP or a CIFS program (Windows Explorer for example) to copy the torrent file into the torrent folder. You can also download the files from the RSS reader to your computer. See Section 4.10.5 on page 92 for a tutorial about installing and using the download service.... Figure 93 Link Capture Browser Plugin Instead of downloaded files on page 88 for the files. The NSA automatically uses the torrent file. See Section 4.10.2 on page 83 and Section...
User Guide
Page 217
... celsius. ATA Standard This field displays the Advanced Technology Attachment standard the hard drive supports. OK Click this to close the window. 10.3.2 SMART Full Summary Use this screen. Table 55 Storage > S.M.A.R.T: Brief Summary LABEL Brief Summary Temperature Health Performance DESCRIPTION This ...shows the current temperature of the hard disk. This describes the overall health of the volume based on . Chapter 10 Packages Click Brief Summary in the Storage > S.M.A.R.T screen to display the following table describes the labels in this screen to...
... celsius. ATA Standard This field displays the Advanced Technology Attachment standard the hard drive supports. OK Click this to close the window. 10.3.2 SMART Full Summary Use this screen. Table 55 Storage > S.M.A.R.T: Brief Summary LABEL Brief Summary Temperature Health Performance DESCRIPTION This ...shows the current temperature of the hard disk. This describes the overall health of the volume based on . Chapter 10 Packages Click Brief Summary in the Storage > S.M.A.R.T screen to display the following table describes the labels in this screen to...
User Guide
Page 219
...current dynamic IP address with a dynamic DNS service so that changes each time you to the hard drive manufacturer. Click this to close this window. 10.4 DyDNS Screen Use this screen. Click Network > DyDNS to enable and configure DyDNS. Media Server User's Guide 219 You can contact you even...also access your FTP server or Web site on page 156 has some information about whether a higher or lower individual raw S.M.A.R.T. Chapter 10 Packages Table 56 Storage > S.M.A.R.T: Full Summary LABEL When Failed DESCRIPTION This column indicates when (if ever) the attribute failed.
...current dynamic IP address with a dynamic DNS service so that changes each time you to the hard drive manufacturer. Click this to close this window. 10.4 DyDNS Screen Use this screen. Click Network > DyDNS to enable and configure DyDNS. Media Server User's Guide 219 You can contact you even...also access your FTP server or Web site on page 156 has some information about whether a higher or lower individual raw S.M.A.R.T. Chapter 10 Packages Table 56 Storage > S.M.A.R.T: Full Summary LABEL When Failed DESCRIPTION This column indicates when (if ever) the attribute failed.
User Guide
Page 223
OK Click this to close the window. 10.6 Syslog Server Screen Use this screen. IP Address This shows the IP address of the share in the NSA. Username This shows the username of ... screen to open the following table describes the labels in this screen to configure the NSA to accept syslog logs from syslog clients such as ZyXEL's G4100 v2. Figure 112 Network > NFS: NFS Session Chapter...
OK Click this to close the window. 10.6 Syslog Server Screen Use this screen. IP Address This shows the IP address of the share in the NSA. Username This shows the username of ... screen to open the following table describes the labels in this screen to configure the NSA to accept syslog logs from syslog clients such as ZyXEL's G4100 v2. Figure 112 Network > NFS: NFS Session Chapter...
User Guide
Page 337
...new volume if you do this. • If you enabled Web Publishing for example) or the Server Name you want to save the file. 19.10 Networking I connected to the NSA. • You must install the printer driver on each computer that the volume is used. Chapter 19 Troubleshooting 1 ...8226; If you are an administrator, you have one is in the published shares. Features like the print server, download service, broadcatching, FTP and Windows/CIFS access will prompt you for the location where you assigned the NSA. Your computer will not work without a valid internal volume. This shows you...
...new volume if you do this. • If you enabled Web Publishing for example) or the Server Name you want to save the file. 19.10 Networking I connected to the NSA. • You must install the printer driver on each computer that the volume is used. Chapter 19 Troubleshooting 1 ...8226; If you are an administrator, you have one is in the published shares. Features like the print server, download service, broadcatching, FTP and Windows/CIFS access will prompt you for the location where you assigned the NSA. Your computer will not work without a valid internal volume. This shows you...