EasyManua.ls Logo

ZyXEL Communications NSA325 User Manual

ZyXEL Communications NSA325
535 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
www.zyxel.com
www.zyxel.com
Media Server
NSA325
Copyright © 2011
ZyXEL Communications Corporation
Firmware Version 4.3
Edition 1, 08/2011
Default Login Details
Web Address nsa325
User Name admin
Password 1234

Table of Contents

Other manuals for ZyXEL Communications NSA325

Questions and Answers:

ZyXEL Communications NSA325 Specifications

General IconGeneral
RAID levels0, 1, JBOD
Storage drive size3.5 \
Storage drive capacity0 GB
Supported file systemsext2, ext3, ext4, FAT32, NTFS, ReiserFS, XFS
Storage drive interfaceSerial ATA, Serial ATA II
Total installed storage capacity0 TB
Number of storage drives installed0
Number of storage drives supported2
Ethernet LANYes
Cabling technology10/100/1000BASE-T(X)
Ethernet LAN data rates10, 100, 1000 Mbit/s
Maximum data transfer rate1000 Mbit/s
Supported network protocolsCIFS/SMB, NFS, FTP, HTTP, PPPoE, NTP
Compliance industry standardsIEEE802.3ab/IEEE802.3/IEEE802.3u
CertificationCE, FCC, C-Tick, BSMI, DLNA 1.5, UPnP, CE LVD, BSMI
Power requirements100 - 240 V AC, 50/60Hz
Networking featuresGigabit Ethernet
Minimum system requirementsIE 7.0+, Firefox 3.6+, Google Chrome 10+, Safari 5+
Compatible operating systemsWindows XP/Vista/7 (32 & 64 bit)
Security algorithmsHTTPS
Product colorBlack
LED indicatorsHDD, USB
Number of fans1 fan(s)
Cable lock slot typeKensington
Cables includedLAN (RJ-45)
USB 2.0 ports quantityUSB 2.0 ports have a data transmission speed of 480 Mbps, and are backwards compatible with USB 1.1 ports. You can connect all kinds of peripheral devices to them.
Ethernet LAN (RJ-45) ports1
Power consumption (typical)27 W
Storage temperature (T-T)-30 - 70 °C
Operating temperature (T-T)0 - 40 °C
Operating relative humidity (H-H)0 - 95 %
Internal memory0.5 GB
Processor frequency1.6 GHz
Weight and Dimensions IconWeight and Dimensions
Depth205 mm
Width108 mm
Height147 mm
Weight1080 g
Package weight1810 g

Summary

About This User's Guide

Intended Audience

This manual is intended for people who want to configure the NSA using the Web Configurator.

Document Conventions

Warnings and Notes

These are how warnings and notes are shown in this User's Guide. Warnings tell you about things that could harm you or your device.

Safety Warnings

CHAPTER 1 Getting to Know Your NSA

1.1 Overview

This chapter covers the main features and applications of the NSA. Use the NSA to do the following.

CHAPTER 2 zMedia App

2.1 Overview

Install ZyXEL’s zMedia app from the Apple App Store, Android Market, or www.zyxel.com to play files and manage the NSA from your iOS device or Android smartphone.

zMedia App

2.3 File Browser

Tap File Browser to look through and play files on the NSA.

CHAPTER 3 NAS Starter Utility

3.1 Overview

This chapter describes the NAS Starter Utility. Use the NAS Starter Utility to find, set up, and manage the NSA as well as copy files to it and access the files on it.

CHAPTER 4 Web Configurator Basics

4.1 Overview

This chapter describes how to access the NSA web configurator and provides an overview of its screens.

Web Configurator Basics

4.3 Login

The default username and password are ‘admin’ and ‘1234’ respectively. Enter your username and password.

Web Configurator Basics

4.4.5 File Browser

Click File Browser to open the following screen. Use the file browsing screens to play, open, upload, and download files.

CHAPTER 5 Tutorials

5.1 Overview

This chapter provides tutorials that show how to use the NSA.

Tutorials

5.6 Creating a Volume in a 2-Bay NSA

This section shows you how to create a volume in your 2-bay NSA. Creating a volume deletes all existing data in the hard disk.

Tutorials

5.9 File Sharing Tutorials

The following sections cover using the NSA for file sharing. This chapter assumes you have already followed the Quick Start Guide instructions.

Download Service Tutorial

5.10.1 Copying/Pasting a Download Link

This tutorial covers using the NSA to download a file from the Internet. Use this same procedure for BitTorrent downloads as well as regular HTTP.

Web Configurator’s Security Sessions

5.15.1 Customizing the NSA’s Certificate

Click Maintenance > SSL and then select Edit a self-signed CA certificate and click Edit.

How to Use the BackupPlanner

5.18.1 Creating an Archive Backup

Use the NSA’s BackupPlanner to have a backup of your files and folders. Schedule backups for times when the network is not busy.

PART II Technical Reference

CHAPTER 6 Status Screen

6.1 Overview

This chapter describes the Status screen, which is the first advanced administration screen that displays.

CHAPTER 7 System Setting

7.1 Overview

This chapter gives an overview of the various features included in the system setting screens. You can identify your NSA on the network.

System Setting

7.4 The Server Name Screen

Click System Setting > Server Name to open the following screen. Use this screen to configure your CIFS settings.

CHAPTER 8 Storage

8.1 Overview

Several NSA features require a valid internal volume. This chapter covers the management of volumes and disks (both internal and external).

Storage

8.2.1 Disk Replacement Restrictions

See the Quick Start Guide for information on replacing disks in the NSA. When replacing a disk in a degraded or down RAID volume, the new disk must be at least the same size or bigger.

Storage

8.3 Creating an Internal (SATA) Volume

In the Storage screen, click the Create an Internal Volume or Create a SATA Volume button to open the following screen.

CHAPTER 9 Network

9.1 Overview

This chapter discusses the network configuration screens. The Network screens allow you to configure TCP/IP and PPPoE settings for the NSA.

Network

9.4 The TCP/IP Screen

Use the TCP/IP screen to have the NSA use a dynamic or static IP address, subnet mask, default gateway and DNS servers.

Network

9.5 UPnP Port Mapping Screen

Use UPnP (Universal Plug and Play) port mapping to allow access from the WAN to services you select on the NSA.

CHAPTER 10 Applications

10.1 Overview

This chapter discusses the features in the Application screens. The NSA contains various applications for file sharing and downloading.

Applications

10.4 FTP Server

Use FTP or FTPES (FTP over Explicit TTL/SSL) to upload files to the NSA and download files from the NSA.

Applications

10.5 The Media Server Screens

Click Applications > Media Server to open the following screen. Use this screen to view the media server’s status and rebuild the media server database.

Applications

10.6 The Download Service Screen

The Download Service screen allows you to download files from the Internet. Use this screen to manage the NSA’s file downloads.

The Download Service Screen

10.6.3 Configuring the BitTorrent Settings

Click Applications > Download Service > Preferences > BitTorrent to open the following screen. Use this screen to configure BitTorrent settings.

The Web Publishing Screen

10.8 The Broadcatching Screen

This screen displays the NSA’s subscribed channels and the associated contents.

Broadcatching Screen

10.11.5 BitTorrent Security

When you download using BitTorrent, you reveal your IP address. This increases the risk of hacking attacks, which can be protected against by a good firewall.

CHAPTER 11 Package Management

11.1 Overview

Package Management can be used to set up more useful applications in your NSA. The NSA can download multiple packages/files at once.

Package Management

11.4 Package Management Screen

Use this screen to download and install applications from the web.

Package Management

11.7 SMART Screen

Use this screen to view your NSA hard disk(s) statistics and monitor their performance.

Package Management

11.8 Protect Screens

The Protect screens include: Backup screens and Restore screens.

Protect Screens

11.9 Backup Screens

Use this screen to create and customize scheduled backup jobs for your files. You can have several backup jobs for specific folders and time periods.

Backup Screens

11.9.8 Restore Archive Screen

Use this screen to restore previous backups made with the NSA.

Restore Archive Screen

11.10.4 Restore: Step 4

Use this screen to select the location in the NSA where you want to restore your backup.

Restore: Step 4

11.11 Syslog Server Screen

Use this screen to configure the NSA to accept syslog logs from syslog clients such as ZyXEL’s G-4100 v2.

Syslog Server Screen

11.12 TFTP Server Screen

Trivial File Transfer Protocol (TFTP) is an Internet file transfer protocol similar to FTP and often used for transmitting large numbers of small files.

TFTP Server Screen

11.13 eMule Screens

Use these screens to manage the eMule application in your NSA. eMule is a peer-to-peer (P2P) file sharing console that lets you download files from the Internet.

eMule Screens

11.13.5 eMule Task Screen

Use this screen to view tasks, including completed, downloading, uploading and shared tasks, that are being handled by the NSA.

eMule Task Screen

11.13.11 eMule Search Screen

Use this screen to search for files available in an eMule server using keywords and other parameters, such as file type, file size and extension names.

eMule Search Screen

11.14 pyLoad Screen

Use this screen to configure the NAS so you can use pyLoad to manage your downloads, including those from one-click hosting sites.

CHAPTER 12 Auto Upload

12.1 Overview

This chapter discusses the features in the Auto Upload screens. The auto upload feature uploads media files stored in the NSA to the Flickr and/or YouTube sharing websites.

Auto Upload

12.4.1 Configuring the Flickr Settings

In the Applications > Auto Upload > Flickr/YouTube screen, select Flickr from the list and then click the Config button.

Configuring the Flickr Settings

12.5 The FTP Uploadr Screen

The FTP Uploadr feature uploads files stored in the NSA to FTP servers. Use this screen to configure the FTP Uploadr.

CHAPTER 13 Dropbox

13.1 Overview

The Dropbox Web-based file hosting service uses cloud computing to let you use file synchronization to store and share files and folders with others across the Internet.

Dropbox

13.3 How to Use Dropbox with the NSA

Here is how to use the Drop2NAS and zDownload folders the NSA creates in your Dropbox account.

CHAPTER 14 Users

14.1 Overview

This chapter introduces the Users screens of the NSA. Use the Users screens to create and manage administrator and user accounts.

Users

14.3.2 Adding or Editing an Account

Use this screen to create or edit a NSA user account with NSA access password.

Adding or Editing an Account

14.3.3 Usernames

Enter a username from one to 32 characters. The first character must be alphabetical. The username can only contain the following characters.

CHAPTER 15 Groups

15.1 Overview

This chapter introduces the Groups screens. Use the Groups screens to create and manage groups. You can assign users to groups and grant access rights.

Groups

15.3.1 Adding or Editing a Group

Use this screen to create or edit a NSA group.

CHAPTER 16 Shares

16.1 Overview

A share is a set of access permissions mapped to a specific folder on a volume. It is equivalent to the Windows concept of a shared folder.

Shares

16.3.1 Adding or Editing Share

Click Add Share to create a new share. In the Shares screen, select a share and click Edit Share to open the following screen.

Adding or Editing Share

16.3.2 Configuring Advanced Share Access

In the Sharing > Shares > Add Share or Edit Share screen, select Advanced from the Share Access drop-down list.

Configuring Advanced Share Access

16.4 The Recycle Bin Configuration Screen

Use this screen to periodically clean up items in all recycle bins.

The Recycle Bin Configuration Screen

16.5 The Share Browser Screen

Use this screen to create folders, upload files, and edit files within the share.

CHAPTER 17 Maintenance Screens

17.1 Overview

This chapter discusses the Maintenance screens. The Maintenance screens allow you to manage system configurations.

Maintenance Screens

17.3 The Power Screen

Use this screen to manage power settings for the NSA.

The Power Screen

17.4 The Log Screen

Use this screen to display all NSA logs. There are at most 512 entries in the log. Older logs are removed by the system.

The Log Screen

17.4.2 Email Setting

You can enable and configure e-mail alerts from the NSA. In the Report Config screen, click the Email Setting tab.

Email Setting

17.5 The Configuration Screen

Click Maintenance > Configuration to open the following screen. Use this screen to backup or restore the NSA configuration settings.

The Configuration Screen

17.6 SSL Certification

Click Maintenance > SSL to open this screen, where you can turn on HTTPS, create a public key certificate, or upload a public key certificate.

SSL Certification

17.7 The Firmware Upgrade Screen

Use this screen to upgrade the NSA firmware. You should first have downloaded the latest firmware files from the ZyXEL website.

Firmware Upgrade Screen

17.8 The Shutdown Screen

Use this screen to turn off the NSA or perform a software restart. A software restart is faster than turning the NSA off and then turning it on again.

Shutdown Screen

17.9 Technical Reference

This section provides technical background information on the topics discussed in this chapter.

CHAPTER 18 Protecting Your Data

18.1 Overview

This chapter compares the different ways of protecting data on the NSA and explains how to use backup management software included on the CD.

Protecting Your Data

18.4 Memeo Autobackup

Use the Memeo Autobackup software (included on the CD) on your computer to schedule and manage backups.

CHAPTER 19 Using Time Machine with the NSA

19.1 Overview

Time Machine is a backup system provided by Mac OS X. It automatically backs up everything on your Mac.

Using Time Machine

19.2 Create an Account and a Share on the NSA

Before configuring Time Machine on your Mac, you need to create an account and a share on the NSA through Web GUI using a Web browser.

Create an Account and a Share on the NSA

19.5 Creating a Sparse Bundle File for the NSA

Now you need to create a sparse bundle disk image file, which is a virtual file system image that Time Machine can backup your files.

Creating a Sparse Bundle File for the NSA

19.6 Using Time Machine

Now the NSA is ready to be used as a backup volume for your computer.

CHAPTER 20 Troubleshooting

20.1 Troubleshooting Overview

This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories.

Troubleshooting Overview

20.2 Power, Hardware, Connections, and LEDs

This section addresses issues related to power, hardware components, connections, and LED indicators on the NSA.

Power, Hardware, Connections, and LEDs

20.4 NSA Login and Access

This section covers issues related to logging into the NSA and accessing its services.

NSA Login and Access

20.5 I Cannot Access The NSA

This section addresses problems users may encounter when trying to access the NSA or its shares.

I Cannot Access The NSA

20.10 Networking

This section covers how to control network access to folders and files on the NSA.

Networking

20.12 Media Server Functions

This section addresses issues related to the Media Server functions, such as files not displaying or not playing properly.

Media Server Functions

20.13 Download Service and Broadcatching Functions

This section addresses issues related to the Download Service and Broadcatching features.

Download Service and Broadcatching Functions

20.14 Web Publishing

This section addresses issues related to accessing web-published shares from the Internet.

Web Publishing

20.15 Auto Upload

This section addresses issues related to the Auto Upload feature not working correctly.

Auto Upload

20.17 Backups

This section addresses issues related to making and running backup jobs.

CHAPTER 21 Product Specifications

21.1 LEDs

This table describes the NSA’s LEDs, their color, status, and description.

LEDs

21.2 Supported Media Server Content Formats

The following describes the details about the files that the NSA media server can publish.

APPENDIX A Setting Up Your Computer’s IP Address

Windows XP/NT/2000

This section shows screens from Windows XP Professional, also applicable to Windows 2000 and Windows NT.

Windows XP/NT/2000

Windows 7

This section shows screens from Windows 7 Enterprise.

Windows 7

Mac OS X: 10.3 and 10.4

This section shows screens from Mac OS X 10.4 but can also apply to 10.3.

APPENDIX B Pop-up Windows, JavaScripts and Java Permissions

Internet Explorer Pop-up Blockers

You may have to disable pop-up blocking to log into your device. Disable pop-up blocking or create an exception.

Internet Explorer Pop-up Blockers

Internet Explorer

This section shows how to import public key certificates into your web browser for Internet Explorer.

Internet Explorer

Installing a Stand-Alone Certificate File in Internet Explorer

Install a stand-alone certificate file if one has been issued to you, rather than browsing to a ZyXEL Web Configurator.

Installing a Stand-Alone Certificate File in Internet Explorer

Removing a Certificate in Internet Explorer

This section shows you how to remove a public key certificate in Internet Explorer 7.

Removing a Certificate in Internet Explorer

Firefox

This section shows how to import public key certificates into your web browser for Firefox.

Firefox

Opera

This section shows how to import public key certificates into your web browser for Opera.

Opera

Konqueror

This section shows how to import public key certificates into your web browser for Konqueror.

APPENDIX E Legal Information

Copyright

Copyright © 2011 by ZyXEL Communications Corporation. All rights reserved.

Legal Information

Disclaimers

ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein.

Related product manuals