Seagate BARRACUDA ST3750840AS User manual

Add to my manuals
203 Pages

advertisement

Seagate BARRACUDA ST3750840AS User manual | Manualzz

TS-409 Turbo NAS

User Manual (Version: 2.1.0)

©Copyright 2008. QNAP Systems, Inc. All Rights Reserved.

FOREWORD

Thank you for choosing QNAP products! This user manual provides detailed instructions of using TS-409. Please read carefully and start to enjoy the powerful functions of TS-

409!

NOTE

• “TS-409” or “TS-409 Pro” is hereafter referred to as “NAS”.

• This manual provides the description of all functions of TS-409. The product you purchased may not support certain functions dedicated to specific models.

• All features, functionality, and other product specifications are subject to change without prior notice or obligation.

• All brands and products names referred to are trademarks of their respective holders.

LIMITED WARRANTY

In no event shall the liability of QNAP Systems, Inc. (QNAP) exceed the price paid for the product from direct, indirect, special, incidental, or consequential software, or its documentation. QNAP makes no warranty or representation, expressed, implied, or statutory, with respect to its products or the contents or use of this documentation and all accompanying software, and specifically disclaims its quality, performance, merchantability, or fitness for any particular purpose. QNAP reserves the right to revise or update its products, software, or documentation without obligation to notify any individual or entity.

CAUTION

1. Back up your system periodically to avoid any potential data loss. QNAP disclaims any responsibility of all sorts of data loss or recovery.

2. Should you return any components of the NAS package for refund or maintenance, make sure they are carefully packed for shipping. Any form of damages due to improper packaging will not be compensated.

2

Table of Contents

TABLE OF CONTENTS...................................................................................................................................... 3

SAFETY WARNINGS.......................................................................................................................................... 7

CHAPTER 1.

OVERVIEW.......................................................................................................................... 8

1.1

I NTRODUCTION ........................................................................................................................................ 8

1.2

P ACKAGE C ONTENTS ............................................................................................................................. 10

1.3

H ARDWARE I LLUSTRATION .................................................................................................................... 11

CHAPTER 2.

INSTALL NAS .................................................................................................................... 12

2.1

I NSTALL H ARD D ISK .............................................................................................................................. 12

2.2

H ARD D ISK C OMPATIBILITY L IST .......................................................................................................... 14

2.3

S ET UP THE NAS.................................................................................................................................... 17

2.4

C HECK S YSTEM S TATUS ........................................................................................................................ 19

2.5

C ONFIGURE S OFTWARE S ETTINGS ......................................................................................................... 21

2.5.1

Windows® Users........................................................................................................................... 21

2.5.2

Mac Users..................................................................................................................................... 32

CHAPTER 3.

ENJOY THE POWERFUL SERVICES OF THE NAS................................................... 34

3.1

S ERVER A DMINISTRATION ..................................................................................................................... 39

3.2

Q UICK C ONFIGURATION ................................................................................................... 40

3.3

S YSTEM S ETTINGS ........................................................................................................... 43

3.3.1

Server Name.................................................................................................................................. 43

3.3.2

Date & Time.................................................................................................................................. 44

3.3.3

Encoding Setting........................................................................................................................... 45

3.3.4

Configure SMTP Server ................................................................................................................ 45

3.3.5

View System Settings..................................................................................................................... 46

3.4

N ETWORK S ETTINGS ........................................................................................................ 47

3.4.1

TCP/ IP Configuration.................................................................................................................. 47

3.4.2

Microsoft Networking ................................................................................................................... 50

3.4.3

Apple Network .............................................................................................................................. 52

3.4.4

NFS Service .................................................................................................................................. 52

3.4.5

Web File Manager......................................................................................................................... 53

3

3.4.6

FTP Service .................................................................................................................................. 54

3.4.7

Multimedia Station........................................................................................................................ 56

3.4.8

iTunes Service ............................................................................................................................... 56

3.4.9

Download Station ......................................................................................................................... 57

3.4.10

Web Server .................................................................................................................................... 58

3.4.11

DDNS Service ............................................................................................................................... 59

3.4.12

MySQL Server............................................................................................................................... 60

3.4.13

Surveillance Station ...................................................................................................................... 63

3.4.14

System Port Management ............................................................................................................. 70

3.4.15

View Network Settings .................................................................................................................. 71

3.5

D EVICE C ONFIGURATION ................................................................................................. 73

3.5.1

SATA Disk ..................................................................................................................................... 74

3.5.2

RAID Management ....................................................................................................................... 77

3.5.3

USB Disk....................................................................................................................................... 78

3.5.4

USB Printer .................................................................................................................................. 79

3.5.4.1

Windows Users .........................................................................................................................................79

3.5.4.2

Mac Users .................................................................................................................................................82

3.6

U SER M ANAGEMENT ....................................................................................................... 86

3.6.1

Users............................................................................................................................................. 86

3.6.2

User Groups.................................................................................................................................. 88

3.6.3

Quota ............................................................................................................................................ 95

3.7

N ETWORK S HARE M ANAGEMENT .................................................................................... 97

3.7.1

Create ........................................................................................................................................... 97

3.7.2

Property ........................................................................................................................................ 99

3.7.3

Access Control ............................................................................................................................ 100

3.7.4

Delete.......................................................................................................................................... 100

3.7.5

Restore ........................................................................................................................................ 101

3.7.6

NFS Access Control .................................................................................................................... 102

3.8

S YSTEM T OOLS .............................................................................................................. 103

3.8.1

Alert Notification ........................................................................................................................ 103

3.8.2

Restart/ Shutdown....................................................................................................................... 104

3.8.3

Hardware Settings....................................................................................................................... 104

3.8.4

UPS............................................................................................................................................. 106

3.8.5

Hard Disk S.M.A.R.T................................................................................................................... 107

4

3.8.6

System Update ............................................................................................................................ 108

3.8.7

USB One Touch Copy Backup..................................................................................................... 109

3.8.8

Change Logo............................................................................................................................... 110

3.8.9

Back up to an External Storage Device .......................................................................................111

3.8.10

Remote Replication (Disaster Recovery) .................................................................................... 112

3.8.11

Backup/ Restore/ Reset Settings.................................................................................................. 115

3.8.12

IP Filter ...................................................................................................................................... 115

3.8.13

Network Recycle Bin................................................................................................................... 116

3.8.14

Remote Login .............................................................................................................................. 117

3.9

E VENT L OGS .................................................................................................................. 118

3.9.1

System Event Logs ...................................................................................................................... 118

3.9.2

System Connection Logs ............................................................................................................. 119

3.9.3

On-line Users.............................................................................................................................. 120

3.9.4

System Information ..................................................................................................................... 120

CHAPTER 4.

USE FRONT USB BACKUP BUTTON.......................................................................... 121

CHAPTER 5.

MULTIMEDIA STATION ............................................................................................... 122

5.1

S HARE P HOTOS AND M ULTIMEDIA F ILES VIA W EB I NTERFACE ............................................................ 122

5.2

E NABLE I T UNES S ERVICE .................................................................................................................... 132

5.3

U SE UP N P M EDIA S ERVER .................................................................................................................. 134

CHAPTER 6.

DOWNLOAD STATION.................................................................................................. 137

6.1

U SE D OWNLOAD S OFTWARE QG ET ..................................................................................................... 147

CHAPTER 7.

WEB SERVER .................................................................................................................. 149

CHAPTER 8.

FTP SERVER .................................................................................................................... 153

CHAPTER 9.

WEB FILE MANAGER................................................................................................... 156

CHAPTER 10.

NETBAK REPLICATOR .............................................................................................. 161

CHAPTER 11.

CONFIGURING AD AUTHENTICATION ................................................................. 175

CHAPTER 12.

ACCESS THE NAS ON LINUX OS ............................................................................. 180

CHAPTER 13.

NAS MAINTENANCE................................................................................................... 181

13.1

R ESTART / S HUT DOWN S ERVER ........................................................................................................... 181

13.2

R ESET A DMINISTRATOR P ASSWORD AND N ETWORK S ETTINGS ............................................................ 182

13.3

D ISK F AILURE OR M ALFUNCTION ........................................................................................................ 183

13.4

P OWER O UTAGE OR A BNORMAL S HUTDOWN ....................................................................................... 183

13.5

S YSTEM S OFTWARE A BNORMAL O PERATION ....................................................................................... 184

5

13.6

S YSTEM T EMPERATURE P ROTECTION .................................................................................................. 184

CHAPTER 14.

RAID ABNORMAL OPERATION TROUBLESHOOTING ..................................... 185

APPENDIX A NETWORK CAMERA COMPATIBILITY LIST............................................................ 187

TECHNICAL SUPPORT................................................................................................................................. 188

GNU GENERAL PUBLIC LICENSE ............................................................................................................ 189

6

Safety Warnings

1. The NAS can operate normally in the temperature of 0ºC-40ºC and relative humidity of 0%-95%. Please make sure the environment is well-ventilated.

2. The power cord and devices connected to the NAS must provide correct supply voltage (100W, 90-264V).

3. Do not place the NAS in direct sunlight or near chemicals. Make sure the temperature and humidity of the environment are in optimized level.

4. Unplug the power cord and all connected cables before cleaning. Wipe the NAS with a dry towel. Do not use chemical or aerosol to clean the NAS.

5. Do not place any objects on the NAS for the server’s normal operation and to avoid overheat.

6. Use the flat head screws in the product package to lock the hard disks in the NAS when installing hard disks for proper operation.

7. Do not place the NAS near any liquid.

8. Do not place the NAS on any uneven surface to avoid falling off and damage.

9. Make sure the voltage is correct in your location when using the NAS. If you are not sure, please contact the distributor or the local power supply company.

10. Do not place any object on the power cord.

11. Do not attempt to repair your NAS in any occasions. Improper disassembly of the product may expose you to electric shock or other risks. For any enquiries, please contact the distributor.

7

Chapter 1. Overview

1.1 Introduction

Thank you for choosing QNAP NAS. This product has the following key features:

9 Powerful All-in-one NAS Server (12-in-1)

File Server

- Sharing files across Windows, Mac, Linux, and Unix.

- Windows AD service support

FTP Server

- Access files from remote location via FTP server

- Encrypted FTP via SSL/ TLS (explicit) mode

- Passive FTP port range control

Backup Server

- Professional Backup Software- NetBak Replicator

- Automatic/ Instant/ Schedule Backup

Remote Replication

- Back up critical data on QNAP NAS to other QNAP NASes in remote locations over the network.

- Encrypted remote replication

- Block-level backup

Printer Server

- Network printer sharing via USB

- Support Windows & Mac platforms (maximum 3 sets)

RAID Station

- Advanced disk configurations: RAID 0, 1, 5, 6, 5 + spare, single and JBOD.

- Intelligent on-line RAID capacity expansion and RAID level migration

Web Server

- Support Joomla!, PHP and MySQL/ SQLite

- Create your own online shops, forums, and blogs over the Internet

MySQL Server

- MySQL and SQLite dual support

- Can be configured as a standalone database server

- Built-in MySQL management tool- phpMyAdmin

UPnP Media Server

- Built-in TwonkyMedia Server

8

- Media streaming to DLNA compliant DMA, PS3 or Xbox 360 game consoles

- Photos and videos playing on TV, and music and Internet radio playing on Hi-Fi system iTunes Server

- Music streaming from NAS to the iTunes program on Mac or Windows PC

- Smart playlist

Multimedia Station

- Photo sharing via web-based photo album.

- Photo album access authority management

Download Station

- BitTorrent (with DHT), FTP and HTTP download

- Remote management of the download tasks by QGet software anytime, anywhere.

Surveillance Station

- Remote real-time monitoring and recording of network cameras

9 Diagnostic and Monitoring System: HDD S.M.A.R.T. and HHS Technology to prevent physical hard drive failure

9 Powerful System Management: Comprehensive event logs for multiple file sharing protocols and file-level recordings

9

1.2 Package Contents

Your NAS package contains:

9 TS-409 Turbo NAS 9 Adaptor 9 Power cord

9 CD-ROM (user manual,

QNAP Finder & utility inclusive)

9 Quick Installation

Guide

9 Flat head screw x 16

9 Ethernet cable 9 Hard disk lock

10

1.3 Hardware Illustration

One Touch

Copy Button

USB 2.0

Power Button

LED Indicators: USB, Status, HDD1,

HDD2, HDD3, HDD4, and LAN

Smart Fan

Power

Connector

Reset

Button

Giga LAN

USB 2.0 x 2

K-Lock

Security Slot

11

Chapter 2. Install NAS

2.1 Install Hard Disk

1. Open the front cover.

2. Take out the disk trays.

12

3. Install a hard disk on each tray. Make sure the disk holes match the holes at the base of the disk tray and lock the disk with four screws.

4. Insert the disk trays to the NAS. Push the disk trays to the end.

13

2.2 Hard Disk Compatibility List

The following HDD models are verified by QNAP that are compatible with the NAS. It is recommended to use the disk models listed here. Other HDD brands that are not tested by QNAP may or may not work properly with the NAS. For more updated compatible hard disk information, please visit QNAP website at http://www.qnap.com

.

QNAP disclaims any responsibility for product damage/ malfunction or data loss/ recovery due to misuse or improper installation of hard disks in any occasions for any reasons.

Model Interface

Hitachi Deskstar SATA II

Hitachi Deskstar SATA II

Hitachi Deskstar SATA II

Hitachi Deskstar SATA II

Hitachi Deskstar SATA II

Hitachi Deskstar SATA II

Hitachi Deskstar SATA II

Hitachi Deskstar SATA II

Hitachi Deskstar SATA II

Hitachi Deskstar SATA II

Hitachi Deskstar SATA II

Hitachi Deskstar SATA II

Hitachi Deskstar SATA II

Hitachi Deskstar SATA II

Hitachi Deskstar SATA II

Hitachi Deskstar SATA II

Hitachi Deskstar SATA II

Hitachi Deskstar SATA II

Hitachi Deskstar SATA II

Seagate

Seagate

Barracuda ES

Barracuda ES

ST3750640NS

ST3500630NS

SATA II

SATA II

Seagate

Seagate

Seagate

Barracuda ES

Barracuda ES

Barracuda ES

ST3400620NS

ST3320620NS

ST3250620NS

SATA II

SATA II

SATA II

400

320

320

250

750

500

400

320

250

320

250

250

250

160

500

500

400

Drive size

(GB)

RPM

1000 7200

Buffer

Size

(MB)

32

750

500

500

400

400

320

7200

7200

7200

7200

7200

7200

32

16

8

16

8

16

7200

7200

7200

7200

7200

7200

7200

7200

8

16

8

16

8

16

8

8

7200

7200

7200

7200

7200

7200

7200

7200

7200

16

16

16

16

16

8

16

8

8

14

Seagate Barracuda ES

Seagate Barracuda 7200.11

Seagate Barracuda 7200.10

Seagate Barracuda 7200.10

Seagate Barracuda 7200.10

Seagate Barracuda 7200.10

Seagate Barracuda 7200.10

Seagate Barracuda 7200.10

Seagate Barracuda 7200.10

Seagate Barracuda 7200.10

Seagate Barracuda 7200.10

Seagate Barracuda 7200.10

Seagate Barracuda 7200.10

Seagate Barracuda 7200.10

Seagate Barracuda 7200.10

Seagate Barracuda 7200.10

WD

WD

WD

WD

WD

WD

WD

WD

Seagate Barracuda 7200.10

Seagate Barracuda 7200.10

Seagate Barracuda 7200.10

Seagate Barracuda 7200.10

Seagate Barracuda 7200.10

Seagate Barracuda 7200.10

Seagate Barracuda 7200.10

Seagate Barracuda 7200.10

WD

WD

WD

WD

WD

WD Caviar GP

WD Caviar GP

WD Caviar GP

WD Caviar RE2

WD Caviar RE2

WD Caviar RE

WD Caviar RE

WD Caviar RE

WD Caviar SE16

WD Caviar SE16

WD Caviar SE16

WD Caviar SE16

WD Caviar SE16

ST3160815AS

ST3160215AS

ST3120815AS

ST3120215AS

ST380815AS

ST380215AS

ST340815AS

ST340215AS

WD10EACS

WD7500AACS

WD5000AACS

WD5000YS

WD4000YS

WD3200YS

WD2500YS

WD1600YS

WD7500AAKS

WD5000AAKS

WD4000AAKS

WD3200AAKS

WD2500AAKS

ST3250820NS

ST31000340AS

ST3750640AS

ST3750840AS

ST3500630AS

ST3500830AS

ST3400620AS

ST3400820AS

ST3320620AS

ST3320820AS

ST3300820AS

ST3250620AS

ST3250410AS

ST3250310AS

ST3250820AS

ST3200820AS

16

16

16

16

16

16

16

16

16

16

16

16

16

8

2

8

2

8

2

8

2

16

8

8

8

16

8

8

16

16

8

16

8

8

32

16

8

750

500

400

320

250

80

80

40

40

160

160

120

120

1000 7200

750 7200

500

500

7200

7200

400

320

250

160

7200

7200

7200

7200

7200

7200

7200

7200

7200

7200

7200

7200

7200

7200

7200

7200

7200

320

320

300

250

250

250

250

200

250

1000

750

750

500

500

400

400

7200

7200

7200

7200

7200

7200

7200

7200

7200

7200

7200

7200

7200

7200

7200

7200

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

15

WD

WD

WD

WD

WD

WD

WD

WD

WD

WD

WD

WD

WD

WD

WD

WD

WD

WD

WD Caviar SE16

WD Caviar SE16

WD Caviar SE16

WD Caviar SE16

WD Caviar SE

WD Caviar SE

WD Caviar SE

WD Caviar SE

WD Caviar SE

WD Caviar SE

WD Caviar SE

WD Caviar SE

WD Caviar SE

WD Caviar SE

WD Caviar SE

WD Caviar SE

WD Caviar SE

WD Caviar SE

WD5000KS

WD4000KS

WD3200KS

WD2500KS

WD5000AAJS

WD4000AAJS

WD3200AAJS

WD3200JS

WD3000JS

WD2500AAJS

WD2500JS

WD2000JS

WD1600AAJS

WD1600JS

WD1200JS

WD800AAJS

WD800JD

WD400JD

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

SATA II

300

250

250

200

160

160

120

80

80

40

500

400

320

250

500

400

320

320

8

8

8

8

8

8

8

8

8

8

8

8

8

8

16

16

16

16

7200

7200

7200

7200

7200

7200

7200

7200

7200

7200

7200

7200

7200

7200

7200

7200

7200

7200

16

2.3 Set up the NAS

Please check your network environment and select the appropriate installation method before installing the NAS.

1. Office/ Home

Connect the NAS and PC to the same hub/ switch/ router.

2. Individual

Connect the NAS directly to your PC by a network cable.

17

When you have verified your network environment, please follow the steps below to install the NAS.

Network cable

1

USB cable

2

3

1. Connect the NAS to the hub/ switch/ router or PC according your network environment.

2. Connect USB printer to the NAS and enable USB printer service * .

3. Connect the power.

4. Turn on the NAS.

* Note: Please connect a USB printer to the server after the software configuration is completed.

18

2.4 Check System Status

The NAS provides LED indicators for you to indicate the system status and information easily. When the NAS is turned on, please check the following items to make sure the system status is normal. Note that the following LED information is applicable only when you have properly installed HDD1 and/or HDD2, and connected the NAS to the network and power. n

USB Status o

Status p

HDD1 q

HDD2 r

HDD3 s

HDD4 t

LAN

19

LED Display & System Status Overview

LED LED Display & System Status n

Front USB

Status

Blue: You can press the copy button to copy data

Flashes blue: Accessing data o t

Status

LAN p

HDD1/ q

HDD2 r

HDD3/ s

HDD4

Green: System is normal

Flashes green: Hard disk not detected; Hard disk not initialized

Red: Warning on disk full status; Disk capacity is almost full; RAID degraded mode (read-only), abnormal disk writing

Flashes red: RAID degraded mode

Flashes green and red alternatively: Update firmware;

RAID rebuilding/ expanding/ migrating

Off: HDD standby mode y Green: Disks are normal y Flashes green: Reading/ writing data y Red: Abnormal reading/ writing y Flashes red: Hard disks are abnormal, but are still being read/ written

Flashes orange: Accessing data

20

2.5 Configure Software Settings

After checking the system status, please follow the steps below to configure the software settings of the NAS. The configuration procedure of Windows and Mac users are different. Please select the appropriate procedure according to your OS.

2.5.1 Windows® Users

1. Execute the product CD, a model selection menu will be shown. Select your NAS model to continue.

21

2. The following menu will be shown. Select “Install QNAP Finder” to continue.

22

3. Follow screen instructions to install QNAP Finder. QNAP Finder will run automatically.

If you are using Windows XP SP2, the following screen will be shown. Please select

“Unblock”.

23

4. QNAP Finder will detect the NAS in the network and ask if you want to perform quick setup. Click Yes to continue.

Note: If the server is not found, click Refresh to try again.

5. Enter the default user name and password.

Default user name: admin

Password: admin

24

6. The first page of the Quick Setup Wizard will be shown. Click Next to continue and complete the configuration.

25

7. Follow the on-screen instructions to complete the configuration. Please wait patiently while changing the system settings. NAS will restart after changing the settings.

Note: The configuration process may take up to twenty minutes if you are using a hard disk drive with capacity larger than 500GB.

26

8. After quick setup is completed, click Finish to continue.

The NAS provides several default share folders for data sharing and access. To map the share folders on the NAS as your drive, check the option “Continue to map

network drive for me” and follow the steps below to proceed.

27

Map Network Drive

NAS provides several default share folders for sharing and access. Select the share folder to be mapped as the local drive and click Map Network Drive.

The share folders Qdownload, Qmultimedia, Qusb, and Qweb are system default network share of the NAS for the use of Download Station, Multimedia Station, USB auto-copy, and Web Server. Qrecordings is the default network share of Surveillance

Station.

Enter the default user name and password.

28

Select the drive letter for the connection and click Finish.

Upon successful connection, you can start to use the share folder on the NAS. You can access these folders by opening My Computer.

29

9. QNAP Finder will appear when all configurations are completed. Choose the name of

NAS on the list, and click “Connect”.

30

10. When the administration page of the NAS is shown, you can start to use the services.

If you have any questions during web administration, please click the help button on the top right hand corner of the page.

To modify system settings, click “Administration”. Enter the user name and password to login.

Default user name: admin

Password: admin

Note:

1. It is recommended to use Internet Explorer 6.0 or above to access the NAS. If the OS of your PC is Windows ® 98, the NAS supports Internet Explorer 6.0 or above only.

2. The NAS also supports Mozilla Firefox.

31

2.5.2 Mac Users

Insert the NAS CD-ROM in your Mac and find the directory MacWizard. Then run

MacWizard.dmg.

You can find and run the QIW image file on desktop after MacWizard.dmg is opened.

Run Quick Install Wizard.

32

Follow the on-screen instructions to complete the configuration. Please wait patiently while changing the system settings. NAS will restart after changing the settings.

Note:

1. Mac Quick Install Wizard does not support mapping network drive.

2. The Map Drive function of Windows Quick Install Wizard is replaced as “Quick Setup” in Mac Quick Install Wizard.

3. It is recommended to access the NAS by Mozilla Firefox in Mac. Safari does not support Download Station of the NAS.

33

Chapter 3. Enjoy the Powerful Services of the

NAS

The NAS provides the following powerful functions and applications.

A. Use network share-Public folder

1. You can access the public folder of the NAS by the following means: a. Open My Network Places and find the workgroup of the NAS. If you cannot find the server, please browse the whole network to search for the NAS. Double click the name of the NAS for connection. b. Use Run function in Windows ® . Enter \\[NAS name] * or \\[NAS IP] # to access share folder on the NAS. c. Windows ® users can use Quick Install Wizard to find the NAS. When the administration page is shown, click Web File Manager. Enter the user name and password, and then start to manage the NAS.

2. You can upload files to the Public folder.

34

B. Manage the NAS

Manage the NAS using web browser by Windows

® or Mac

1. You can access the NAS web administration page by the following methods: a. Use Quick Install Wizard to find the NAS. b. Open a web browser and enter http://[NAS IP]:8080 #

Note:

1. It is recommended to use Microsoft ® Internet Explorer 6.0 or above to access the NAS. If the OS of your PC is Windows ® 98, the NAS supports Internet Explorer 6.0 only.

2. Please use Mozilla Firefox to access the NAS on Mac.

* The user name here should be the same as the server name you enter in

Chapter 2.5 Configure Software Settings.

# The IP address here should be the same as the IP address you enter in

Chapter 2.5 Configure Software Settings. If you are using DHCP: (a)

connect the PC to the NAS directly, please use the default IP address

169.254.100.100 of the NAS; (b) connect the NAS by network, please run

Quick Install Wizard to view the IP address of the NAS.

2. When the administration page is shown, click Administration, Web File Manager,

Web Server, Multimedia Station, or Download Station. Enter the user name and password, and then start to manage the NAS.

35

3. The NAS supports SSL secure login which enables you to configure and manage the server by encrypted transfer. To use this function, check the box SSL login on the administration page and login the server.

Note: If your NAS is placed behind an NAT gateway and you want to access the NAS by secure login from the Internet, you must open the port 443 on your NAT and forward this port to the NAS LAN IP.

36

C. Use the NAS’s Services

„ Multimedia Station

The NAS provides a user-friendly web management interface for you to manage and share personal albums and multimedia files via network easily. Supports embedded iTunes Server music sharing, UPnP and DLNA standard multimedia

technology to establish home multimedia sharing center. Please refer to Chapter 5.

„ D ownload Station

The NAS supports BT, FTP, and HTTP download. You can add download tasks to the

NAS and let the server finish downloading independently of your PC. Please refer

to Chapter 6.

„ Disaster Recover y

The NAS supports remote share folder backup via the network. In case of data

damage in PC, you can restore all backup data. Please refer to Chapter 3.8.9.

„ Web Server

The NAS enables you to create your own website easily. It also supports Joomla!,

PHP and SQLite to establish interactive websites. Please refer to Chapter 7.

„ Printer Server

The NAS supports network printer sharing function by direct USB connection. No

extra help from PC is needed. Please refer to Chapter 3.5.4.

„ FTP Server

The NAS offers the simplest FTP server setup procedure for you to establish FTP

server without any professional assistance. Please refer to Chapter 8.

„ Backup Server

NetBak Replicator is the powerful backup software designed for Windows users to configure automatic backup schedule. Block level remote replication is supported to provide the most reliable, instant, and secure data backup mechanism. Please

refer to Chapter 10.

„ File Ser ver

The NAS provides convenient and secure file server functions that support central

37

data management. Users can be granted with the right to access network share

and share important files. Please refer to Chapter 3.7 and Chapter 9.

„ Surveillance Station

The Surveillance Station enables you to watch and record live video from your

network cameras quickly and easily. Please refer to Chapter 3.4.13.

38

3.1 Server Administration

There are 8 main sections in server administration:

39

3.2 Quick Configuration

Please follow the step-by-step guide in Quick Configuration to complete the settings of the NAS. If you have any questions during web administration, please click the help button on the top right hand corner of the page. Other buttons are described as below:

: Return to previous page

: Return to home page

: Logout system

Step 1. Enter the server name.

Step 2. Change the administrator password or select to use the original password.

40

Step 3. Enter the date, time and select the time zone for the server.

Step 4. Select the language the server uses to display files and directories. The default setting is English.

Step 5. Enter the IP address, subnet mask and default gateway for the server.

Note:

1. Please contact your ISP or network administrator for the IP address of primary and secondary DNS servers. When the NAS plays the role as a terminal and needs to perform independent connection, e.g. BT download, you must enter at least one DNS server IP for proper URL connection.

Otherwise, the function may not work properly.

2. If you select to obtain IP address via DHCP, there is no need to configure the primary and secondary DNS servers. You can enter “0.0.0.0” in the settings.

41

Finished. The basic system settings are shown.

42

3.3 System Settings

Basic system settings include the server name, date, time, and view system settings.

3.3.1 Server Name

Enter the name of the NAS. The server name can be 14 characters long at maximum, which supports alphabets, numbers, and hyphen (-). The server does not accept names with space, period (.), or names in pure number.

43

3.3.2 Date & Time

Set the date, time, and time zone according to your location. If the settings are incorrect, the following problems may occur:

9 When using a web browser to access or save a file, the display time of the action will be incorrect.

9 The time of event log displayed will be inconsistent with the actual time when an action occurs.

9 Synchronize with an Internet time server automatically

You can enable this option to update the date and time of the system automatically with specified NTP (Network Time Protocol) server. Enter the IP address or domain name of the NTP server, e.g. time.nist.gov, time.windows.com. Then enter the time interval for adjusting the time.

Note: The first time you enable NTP server, it may take several minutes for time synchronization before the time is correctly adjusted.

44

3.3.3 Encoding Setting

Select the language the NAS uses to display files and directories.

Note: All files and directories on the NAS will be created using Unicode encoding. If your FTP clients or the OS of your PC does not support

Unicode, e.g. Windows properly.

® 95/98/ME, select the language the same as your OS here in order to view the files and directories on the server

3.3.4 Configure SMTP Server

Configure the SMTP server for outgoing mails of this server.

If your mail server requires SMTP authentication, please enter the user name and password for the mail server.

45

3.3.5 View System Settings

You can view all current system settings, e.g. server name, on this page.

46

3.4 Network Settings

You can configure network settings in this section and enable several powerful applications of the NAS, e.g. Multimedia Station, Download Station, and Web Server.

3.4.1 TCP/ IP Configuration

You can select one of the following two methods to configure the TCP/IP settings of the

NAS.

1. Obtain IP address settings automatically via DHCP

If your network supports DHCP, the NAS will use DHCP protocol to retrieve the IP address and related information automatically.

2. Use static IP address

To use fixed IP address for network connection, enter fixed IP address, subnet mask, and default gateway.

47

Primary DNS Server: Enter the IP address of primary DNS server that provides DNS service for the NAS in external network.

Secondary DNS Server: Enter the IP address of secondary DNS server that provides

DNS service for the NAS in external network.

Note:

1. Please contact your ISP or network administrator for the IP address of primary and secondary DNS servers. When the NAS plays the role as a terminal and needs to perform independent connection, e.g. BT download, you must enter at least one DNS server IP for proper URL connection. Otherwise, the function may not work properly.

2. If you select to obtain IP address via DHCP, there is no need to configure the primary and secondary DNS servers. You can enter

“0.0.0.0” in the settings.

Enable DHCP Server

If no DHCP is available in the LAN where the NAS locates, you can enable this function to enable the NAS as a DHCP server and allocate dynamic IP address to DHCP clients in

LAN.

You can set the range of IP addresses allocated by DHCP server and the lease time.

Lease time refers to time that IP address is leased to the clients by DHCP server. When the time expires, the client has to acquire an IP address again.

For example, to establish a DLNA network, and share the multimedia files on the NAS to

DLNA DMP via UPnP while there is no NAT gateway that supports DHCP server, you can enable DHCP server of the NAS. The NAS will allocate dynamic IP address to DMP or other clients automatically and set up a local network.

Note: If there is an existing DHCP server in your LAN, do not enable this function. Otherwise, there will be IP address allocation and network access errors.

48

Jumbo Frame Settings (MTU)

"Jumbo Frames" refer to Ethernet frames that are larger than 1500 bytes. It is designed to enhance Ethernet networking throughput and reduce the CPU utilization of large file transfers by enabling more efficient larger payloads per packet.

Maximum Transmission Unit (MTU) refers to the size (in bytes) of the largest packet that a given layer of a communications protocol can transmit.

The NAS uses standard Ethernet frames: 1500 bytes by default. If your network appliances support Jumbo Frame setting, select the appropriate MTU value for your network environment. The NAS supports 4074, 7418, and 9000 bytes for MTU.

Note: Jumbo Frame setting is valid in Gigabit network environment only. Besides, all network appliances connected must enable Jumbo

Frame and use the same MTU value.

49

3.4.2 Microsoft Networking

Enable file service for Microsoft networking: If you are using Microsoft ® Windows ®

OS, enable this service to access the files on network share folders. Assign a workgroup name.

9 Standalone Server

Use local users for user authentication.

9 AD Domain Member

*This option is supported by “TS-409 Pro” only.

The NAS supports Windows 2003 AD (Active Directory) to provide quick and direct import of user accounts to the existing AD server available in your network. This function helps you to save time and effort on creating user accounts and passwords and lowers IT maintenance cost by automatic configuration procedure.

¾ Server Description

Describe the NAS for users to identify the server. To use the NAS on the

Microsoft Windows OS, you must enable Microsoft Network Services.

¾ Workgroup

Specify the workgroup the NAS belongs to. The workgroup is a computer group unit in Microsoft Windows network for network sharing.

¾ AD Server Name

Enter the name of the AD server when AD domain is selected for authentication.

¾ Domain Name

50

The name of Microsoft domain. When you select AD domain, you must enter the domain name, the login user name, and the password.

Please refer to Chapter 11 for the information of AD authentication.

9 WINS server

If the local network has a WINS server installed, specify the IP address. The NAS will automatically register its name and IP address with WINS service. If you have a

WINS server in your network and want to use this server, enter the WINS server IP.

9 Domain Master

There is a unique Domain Master Browser for collecting and recording resources and services available for each PC in the network or workgroup of Windows. When you find the waiting time for accessing Network Neighborhood too long, it may be caused by failure of an existing master browser, or there is no master browser in the network.

If there is no master browser in your network, you can check the box Domain Master in this section to configure the NAS as the master browser to enhance the speed of accessing information on Network Neighborhood.

51

3.4.3 Apple Network

To use the NAS on Apple Mac operating system, enable AppleTalk network support. If your AppleTalk network uses extended networks, and is assigned with multiple zones, assign a zone name to the NAS. If you do not want to assign a network zone, enter an asterisk (*) to use the default setting. This setting is disabled by default.

3.4.4 NFS Service

*This option is supported by “TS-409 Pro” only.

After enabling this service, you can click here to set up the Network access authority to

configure the settings. For detailed configuration, please refer to Chapter 3.7.6. For the

information of connecting to the NAS via NFS on Linux, please refer to Chapter 12.

52

3.4.5 Web File Manager

To access files on the NAS via web browser, enable Web File Manager. If the NAS is connected to the Internet and uses a valid IP address, you can access files on the server

by web browser from anywhere. For more information, please refer to Chapter 9.

The NAS supports SSL secure login. You can select SSL login on the NAS administration page and login Web File Manager via https; or enter https://NAS IP:8080/Qfilemanager/ in the browser.

53

3.4.6 FTP Service

When you enable FTP service, you can define the port number for the service and maximum number of users connected to the FTP at the same time.

9 Select Protocol Type

Select to use standard FTP connection or SSL/TLS encrypted FTP. Select the corresponding protocol type in your client FTP software to ensure successful connection.

9 Unicode Support

Select to enable or disable Unicode Support. The default setting is No. Since most

FTP clients do not support Unicode currently, it is recommended that you disable

Unicode support here and select the language the same as your OS in “System

Settings—Encoding Setting” page so that the folders and files on FTP can be

properly shown (please refer to Chapter 3.3.3). If your FTP client supports Unicode,

make sure you have enabled Unicode support for both your client and the NAS.

54

9 Log on anonymously

You can enable anonymous login to allow users to access the FTP server of the NAS anonymously. The users can access the folders and files which are opened for public access. If this option is disabled, users must enter an authorized user name and password to access the server.

9 Passive FTP Port Range

You can use the default port range (55536-56559) or define a port range larger than 1024. When using this function, please make sure you have opened the configured port range on your router or firewall.

Respond with external IP address for passive FTP connection request

When passive FTP connection is in use and the FTP server is configured under a router, if the remote computer cannot connect to the FTP server via WAN, you can enable this function. By enabling this function, the FTP service replies the manually specified IP address or automatically detects the external IP address so that the remote computer can connect to the FTP server successfully.

9 FTP Transfer Limitation

You can configure the maximum number of all FTP connections, maximum connections of a single account and the maximum upload/ download rates of a single connection.

55

3.4.7 Multimedia Station

To share multimedia files like photos, music or video files on the network, please enable

Multimedia Station. For further information of Multimedia Station, iTunes service and

UPnP Media Server, please refer to Chapter 5.

3.4.8 iTunes Service

By enabling the iTunes service, the NAS shares the mp3 files in the Qmultimedia folder to all the iTunes clients available in the same subnet. The clients can automatically detect, browse, and play the music files in the NAS. For further details, please refer to

Chapter 5.2.

56

3.4.9 Download Station

The NAS supports BT, HTTP and FTP download independent of PC/notebook. To use download function of the NAS, please enable Download Station. For further information,

please refer to Chapter 6.

Warning: Please be warned against illegal downloading of copyrighted materials. The Download Station functionality is provided for downloading authorized files only. Downloading or distribution of unauthorized materials may result in severe civil and criminal penalty.

Users are subject to the restrictions of the copyright laws and should accept all the consequences.

57

3.4.10 Web Server

You can publish your own server by enabling Web Server function of the NAS. Enter the port number for web server service, the default number is 80. For further information,

please refer to Chapter 7.

Configure register_globals

Select to enable or disable register_globals. The setting is disabled by default. When the web program asks to enable php register_globals, please enable this option.

However, for system security concerns, it is recommended to disable this option. php.ini Maintenance

Check the box “php.ini Maintenance” to select to upload, edit or restore php.ini.

Edit: Edit the current php.ini file.

Upload: Upload a new php.ini file to replace the current file.

Restore: Restore the php.ini file to system default.

Note: To use PHP mail() function, you can go to System Settings/ Configure SMTP

Server to configure the SMTP server settings.

58

3.4.11 DDNS Service

To set up a server on the Internet and enable users to access it easily, a fixed and easyto-remember host name is often required. However, if ISP provides only dynamic IP address, the IP address of the server will change from time to time and is difficult to recall. You can enable DDNS service to solve the problem.

After enabling DDNS service of the NAS, whenever the NAS restarts or the IP address is changed, the NAS will notify DDNS provider immediately to record the new IP address.

When the user tries to connect the NAS via the host name, DDNS will transfer the recorded IP address to the user.

Enable and configure DDNS of the NAS:

Before using DDNS service, please register a host name from the DDNS provider*. The

NAS supports the 5 DDNS providers: members.dyndns.org, update.ods.org, members.dhs.org, www.dyns.cx, www.3322.org.

Enable Dynamic DNS Service, and select DDNS server. Then enter the user name, password, and hostname.

* For the information of DDNS service registration, please refer to the website of the

DDNS providers.

59

3.4.12 MySQL Server

You can enable MySQL Server as the website database.

Enable TCP/IP Networking

You can enable this option to configure your NAS’s MySQL Server as a database server of another web server in remote site through Internet connection. When you disable this option, your MySQL Server will only be configured as local database server for NAS’s web server.

After enabling remote connection, please assign a port for the remote connection service of MySQL server. The default port is 3306.

After the first-time installation of the NAS, a folder phpMyAdmin is created in the Qweb network folder. You can enter http://NAS IP/phpMyAdmin/ in the web browser to enter the phpMyAdmin page and manage the MySQL database.

Note:

1. Please do not delete the phpMyAdmin folder. You can rename this folder but the link on the MySQL Server page will not be updated. To access the renamed folder, you can enter the link http://NAS IP/renamed folder in the web browser.

2. The phpMyAdmin folder is created after the first-time installation. When you update the firmware, the folder remains unchanged.

60

Database Maintenance

Check the box Database Maintenance to reset the database password or initialize the database.

Reset root password: Execute this function to reset the password of MySQL root as

admin”.

Re-initialize database: Execute this function to delete all the data on MySQL database.

Description: File location of MySQL database

1. Create a network share in Network Share Management.

2. Enter the network share name and select “Enter path manually”. Then click

“Browse…”

61

3. Select .@mysql and click “OK”. After the network share has been created, configure the access right. The network share name configured in the above step is the file location of MySQL database.

62

3.4.13 Surveillance Station

The Surveillance Station enables you to monitor and record the live video of the network cameras available on the network (LAN or WAN). To use this function, enable

“Surveillance Station” in the “Network Settings” page.

Click on the link or enter the URL “http://NAS IP:8080/Qrecordings” in the web browser or click “Surveillance Station” on the login page to enter the Surveillance Station.

Note: Surveillance Station is only supported on IE browser 6.0 or later.

To set up your network surveillance system by NAS, follow the steps below:

1. Plan your home network topology

2. Set up the IP Cameras

3. Configure the camera settings on NAS

4. Configure your NAT router (for remote monitoring over the Internet)

63

1. Plan your home network topology

Write down your plan of the home network before starting to set up the surveillance system. Consider the following when doing so: i. The IP address of NAS ii. The IP address of the cameras

Your computer, the NAS, and the IP cameras should be installed to the same router in

LAN. Assign fixed IP addresses to the NAS and the IP cameras. For example, y The LAN IP of the home router: 192.168.1.100 y Camera 1 IP: 192.168.1.10 (fixed IP) y Camera 2 IP: 192.168.1.20 (fixed IP) y NAS IP: 192.168.1.60 (fixed IP)

2. Set up the IP Cameras

In this example, two IP cameras will be installed. Connect the IP cameras to your home network. Then set the IP address of the cameras so that they are in the same LAN as the computer. Login the configuration page of the Camera 1 by IE browser. Enter the IP address of the first camera as 192.168.1.10. The default gateway should be set as the

LAN IP of the router (192.168.1.100 in this example). Then configure the IP address of the second camera as 192.168.1.20.

Some cameras provide a utility for IP configuration. You may refer to the user manual of the cameras for further details.

* Please refer to Appendix A

for the supported network camera list.

64

3. Configure the camera settings on NAS

Login the Surveillance Station by IE browser to configure the IP cameras. Go to

“Settings>Camera Settings” page. Enter the camera information, e.g. name, model, and

IP address.

Click “Test” on the right to ensure the connection to the IP camera is successful.

You may enable continuous recording by checking the option “Enable recording on this camera”.

65

If your camera supports audio recording, you may enable the option in “Recording

Settings” page. Click “Apply” to save the changes.

Configure the settings of Camera 2 following the above steps.

After you have added the network cameras to NAS, go to the “Live View” page. The first time you access this page by IE browser, you have to install the ActiveX control in order to view the images of Camera 1 and Camera 2. You can start to use the monitoring and recording functions of the Surveillance Station.

To use other functions of the Surveillance Station such as motion detection recording, schedule recording, and video playback, please refer to the online

help .

66

4. Configure your NAT router (for remote monitoring over the Internet)

To view the monitoring video and access the NAS remotely, you need to change the network settings by forwarding different ports to the corresponding LAN IP on your NAT router.

Change the port settings of NAS and IP cameras

The default HTTP port of NAS is 8080. In this example, the port is changed to 8000.

Therefore, you have to access the NAS via http://NAS IP:8000 after applying the settings.

Then login the network settings page of the IP cameras. Change the HTTP port of

Camera 1 from 80 to 81. Then change the port for Camera 2 from 80 to 82.

67

Next, login Surveillance Station. Go to “Settings>Camera Settings”. Enter the port numbers of Camera 1 and Camera 2 as 192.168.1.10 port 81 and 192.168.1.20 port

82 respectively. Enter the login name and password for both cameras.

Besides, enter the WAN IP address (or your domain address in public network, e.g.

MyNAS.dyndns.org) and the port on the WAN side for the connection from Internet.

After finishing the settings, click "Test" to ensure successful connection to the cameras.

Go to the configuration page of your router and configure the port forwarding as below: y Forward Port 8000 to NAS LAN IP: 192.168.1.60 y Forward Port 81 to Camera 1's LAN IP: 192.168.1.10 y Forward Port 82 to Camera 2's LAN IP: 192.168.1.20

Note: When you change the port settings, make sure remote access is allowed. For example, if you office network blocks port 8000, you will not be able to access your NAS from the office.

After you have configured the port forwarding and router settings, you can start to use the Surveillance Station for remote monitoring over the Internet.

68

Access the snapshots and video recordings of Surveillance Station

All snapshots taken are saved in the "Snapshot" folder under My Documents in your computer.

The video recordings will be saved in \\NASIP\Qrecordings . Normal recordings are saved in the folder “record_nvr” and alarm recordings are saved in the folder

“record_nvr_alarm” in the network share.

69

3.4.14 System Port Management

Assign a protocol for the system management. The default port is 8080. The services of this port include: System Management, Web File Manager, Multimedia Station, and

Download Station.

The system will restart after clicking “Apply”. Please wait. The website will automatically change to the homepage of the new protocol system.

70

3.4.15 View Network Settings

You can view current network settings and status of the NAS in this section.

71

72

3.5 Device Configuration

You can configure SATA disk, USB disk, and USB printer settings in this section.

73

3.5.1 SATA Disk

This page shows the model, size and current status of the disk(s) installed on the NAS.

You can format and check disks, and scan bad blocks on the disks. When the SATA disks are formatted, the NAS will create the following default share folders:

9 Public: Network share for file sharing

9 Qdownload: Network share for Download Station

9 Qmultimedia: Network share for Multimedia Station

9 Qusb: Network share for data copy function via USB ports

9 Qweb: Network share for Web Server

9 Qrecordings: the default network share of Surveillance Station

You can create the following disk volumes by clicking on the corresponding icon on the

“SATA Disk” page.

74

You can create the following disk volumes:

Single Disk Volume

Each disk will be used as a standalone disk. However, if a disk is damaged, all data will be lost.

RAID 1 Mirroring Disk Volume

RAID 1 (mirroring disk) protects your data by automatically backing up the contents of one drive onto the second drive of a mirrored pair. This protects your data if one of the drives fails. Unfortunately, the storing capacity is equal to a single drive, as the second drive is used to automatically back up the first. Mirroring Disk is suitable for personal or corporate use to store important data.

RAID 0 Striping Disk Volume

RAID 0 (striping disk) combines 2 or more drives into one larger disk. It offers the fastest disk access but it does not have any protection of your data if the striped array fails. The disk capacity equals the number of drives in the array times the size of the smallest drive. Striping disk is usually used to maximize your disk capacity or for fast disk access but not for storing important data.

Linear Disk Volume

You can combine two or more disks into one larger disk. During file saving, the file will be saved on physical disks sequentially but does not have a disk failure file protection function. The overall capacity of linear disk is the sum of all disks. Linear disk is generally used for storing large data and is not appropriate to use for file protection of sensitive data.

RAID 5 Disk Volume

RAID 5 disk volume is ideal for organizations running databases and other transaction-based applications that require storage efficiency and data protection.

To create a RAID 5 disk volume, a minimum of 3 hard disks are required. The total capacity of RAID 5 disk volume = the size of the smallest capacity disk in the array x

(no. of hard disk – 1). It's recommended that you use same brand and same capacity hard drive to establish the most efficient hard drive capacity.

Additionally, if your system contains four disk drives, three of them can be used to implement RAID 5 data disks and the fourth drive can be used as a spare disk. That way, in the event of a physical disk failure, the system will automatically use the

75

spare disk to rebuild your data.

RAID 5 can survive 1 disk failure and system can still operate properly. When a disk fails in RAID 5, the disk volume will be in “degraded mode”. There is no more data protection at this stage. If one more disk fails, all the data will be crashed.

Therefore, you must replace a new disk immediately. You can select the install a new disk after turning off the server or hot swap the new disk when the server is on. The status of the disk volume will become “rebuilding” after installing a new disk. When rebuilding completes, your disk volume resumes to normal status.

Note: To install a disk when the server is on, make sure the disk volume is in

“degraded” mode. Or wait after the two long beeps after the disk crash, then insert the new disk.

RAID 6 Disk Volume

RAID 6 disk volume is ideal for important data protection.

To create a RAID 6 disk volume, a minimum of 4 hard disks are required. The total capacity of RAID 6 disk volume = the size of the smallest capacity disk in the array x

(no. of hard disk–2). It's recommended that you use same brand and same capacity hard drive to establish the most efficient hard drive capacity.

RAID 6 can survive 2 drives failure and system can still operate properly.

Note: To install a disk when the server is on, make sure the disk volume is in

“degraded” mode. Or wait after the two long beeps after the disk crash, and then insert the new disk.

RAID 5, RAID 6 Read-only Mode

The drive configuration enters read-only mode in the following occasions.

- 2 drives are damaged in RAID 5

- 3 drives are damaged in RAID 6

The drives in the above configurations are read-only. It is recommended to re-create new drive configuration in such case.

76

3.5.2 RAID Management

This function enables capacity expansion, RAID migration, or spare drive configuration with the original drive data reserved.

Expand capacity

This function enables drive capacity expansion by replacing the drives in a configuration one by one. This option is supported for the following drive configurations:

- RAID 1 expansion

- RAID 5 expansion

- RAID 6 expansion

Add hard drive

This function enables adding new drive member to a drive configuration. This option is supported for the following drive configurations:

- RAID 5 expansion

Migrate

This function enables a drive configuration to be migrated to a different RAID configuration. This option is supported for the following drive configurations:

- Migrate single drive to RAID 1, 5, or 6

- Migrate RAID 1 to RAID 5 or 6

- Migrate RAID 5 to RAID 6

Configure spare drive

This function enables adding or removing RAID 5 spare drive. The options available are:

- Add spare drive in RAID 5

- Remove spare drive in RAID 5

For detailed operation, please click “Description” on the management interface to view the detailed operation instructions.

77

3.5.3 USB Disk

The NAS supports USB disks and thumb drives for extended storage. Connect the USB device to the USB port of the NAS, when the device is successfully detected, the details will be shown on this page.

It may take tens of seconds for the NAS to detect the external USB device successfully.

Please wait patiently.

78

3.5.4 USB Printer

To provide printer sharing function for network users, you can simply connect a USB printer to the USB port of the NAS. The NAS will detect the printer automatically. This function supports up to 3 printers.

3.5.4.1 Windows Users

Method 1

1. A printer icon should be shown in the share folder of the server. Double click the icon.

79

2. Install the printer driver.

3. When finished, you can start to use network printer service of the NAS.

80

Method 2

The following configuration method has been verified on Windows XP only:

1. Open Printers and Faxes.

2. Delete the existing network printer (if any).

3. Right click the blank area in the Printers and Faxes window. Select Server

Properties.

4. Click the Ports tab and delete the ports configured for the previous network printer

(if any).

5. Restart your PC.

6. Open Printers and Faxes.

7. Click Add a printer and click Next.

8. Select Local printer attached to this computer. Click Next.

9. Click Create a new port and select Local Port from the drop-down menu. Click

Next.

10. Enter the port name. The format is \\NAS IP\NAS namepr, e.g. NAS IP=

192.168.1.1, NAS name= myNAS, the link is \\192.168.1.1\myNASpr .

11. Install the printer driver.

12. Print a test page.

81

3.5.4.2 Mac Users

1. On the toolbar, click Go/ Utilities.

2. Click Printer Setup Utility.

82

3. Click Add.

4. Press and hold the alt key concurrently.

on the keyboard and click More Printers

83

5. In the pop up window: a. Select Advanced*. b. Select Windows Printer with SAMBA. c. Enter the printer name. d. Enter the printer URI, the format is smb://NAS IP/printer name. The printer name is found on the Device Configuration/ USB Printer page. e. Select Generic for Printer Model. f. Click Add.

*Note that you must hold and press the alt key and click More Printers at the same time to view the Advanced printer settings. Otherwise, this option does not appear.

84

6. The printer appears on the printer list. It is ready to use.

Note:

1. The NAS network printer service supports Postscript printer on Mac

OS only.

2. For the latest USB printer compatibility list, please visit http://www.qnap.com

.

85

3.6 User Management

The files on the NAS can be shared among multiple users. For easier management and better control of users’ access right, you have to organize users, user groups and their access right control.

3.6.1 Users

The system has created the following users by default: n admin

By default, administrator has access to system administration and cannot be deleted. o guest

This is a built-in user and will not be displayed on User Management page. When you use a non-registered user name to login, the server will recognize the user as a guest and will allow limited access. A guest does not belong to any user group. The login password for guest is guest. p Anonymous

This is a built-in user and will not be displayed on User Management page. When you connect to the server by FTP service, you can use this name to login as a guest.

86

512 users can be created at maximum (including system default users). You can create a new user according to your needs. The following information is required to create a new user:

9 User name

The user name must not exceed 32 characters. It is case-insensitive and supports double-byte characters, such as Chinese, Japanese, and Korean except:

" / \ [ ] : ; | = , + * ? < > ` '

9 Password

The password is case-sensitive and can be 16 characters long at maximum. It is recommended to use a password of at least 6 characters.

You can perform the following actions for user management:

87

3.6.2 User Groups

User group is a collection of users with the same access right to files or folders. The NAS has created the following user groups by default: n Administrators

All members in this group have administration right. You cannot delete this group. o Everyone

All registered users belong to everyone group. You cannot delete this group.

You can manage user groups with the following options:

1024 groups can be created at maximum. A group name must not exceed 256 characters. It is case-insensitive and supports double-byte characters, such as Chinese,

Japanese, and Korean, except the following ones:

" / \ [ ] : ; | = , + * ? < > ` '

88

Create Users and Assign Users to User Group

The following example demonstrates how to create new users and assign users to a user group.

ABC Co. has recently recruited two employees Mr. Jones Lee for Administration

Department and Ms. Jane Wu for Sales Department. The IT Department therefore needs to create two user accounts for them to access company data on the NAS. i. To create a user account, go to User Management-Users. Click Create.

89

ii. Enter the user name (Jones Lee/ Jane Wu) and password. Check the box

“Continue to set the user groups to which this user belongs” and click OK.

90

iii. Select the user groups the users belong to on the right list, i.e. Mr. Jones Lee for

Administration Dept and Ms. Jane Wu for Sales Dept, and click Add. Then click

Close.

91

iv. The user names will appear on the list on Create User Page.

92

Create Private Network Share for User Groups

You can create particular network share for each user group. The procedure is described as below:

1. To create a network share called media accessible by Administration Department only, please go to “User Management—User Groups” page. Select the user group

Administration Dept and click Create Private Network Share on the right.

2. Enter the network share name media. Select the disk volume that the share will be created in and specify the path automatically or manually. Enter the comment for the network share, e.g. media folder for Admin Dept and click Apply.

93

3. You can see the folder media in Network Share Management page.

4. Enter Access Control. You can see that only Administration Dept has full access right to the folder.

94

3.6.3 Quota

To allocate disk volume efficiently, you can specify the quota that can be used by each user. When this function is enabled and a user has reached his/her disk quota, he/she cannot upload data to the server anymore. By default, no limitations are set for users.

You can modify the following two options: i. Enable quota for all users ii. Quota size on each disk volume

Please refer to the following example to configure the quota setting of users:

The IT department is planning to set the disk quota of Mr. Jones Lee from Administration

Department and Ms. Jane Wu from Sales Department on the NAS. The disk quota is

2000MB for Mr. Jones Lee and 4000MB for Ms. Jane Wu.

1. Please go to Quota page in User Management to enable quota for all users. Enter the quota size on each disk volume, e.g. 1000MB. The quota for individual user can be modified later.

95

2. Select Jones Lee on User page and click Quota Settings on the right.

3. Enter the quota size 2000MB and click OK.

4. Follow the same steps and enter the quota size 4000MB for Jane Wu and click OK.

The quota setting is successfully applied.

96

3.7 Network Share Management

The primary purpose of network storage is file sharing. You can create different network share folders for various types of files, and provide different file access rights to users or user groups.

3.7.1 Create

To create a network share, enter the following information:

9 Network share name

The length of the network share name cannot exceed 32 single-byte characters or

10 double-byte characters, and cannot contain the following characters:

" . + = / \ : | * ? < > ; [ ] %

9 Hide network drive

Select to show or hide the network in My Network Places. Note that the drive can still be shown by entering the directory manually in My Network Places.

9 Disk volume

This area shows the disk volume status.

9 Path

All data is stored under the assigned path onto the disk volume. You can select

“Specify path automatically” or assign a path manually. The path cannot exceed

256 characters and cannot contain the characters below:

" . + = / \ : | * ? < > ; [ ] %

97

9 Comment

Enter a brief description for the share folder. The comment cannot exceed 128 characters.

Note: When you select to enter the path manually, click “Browse…” and the .@mysql directory will be shown. This is the file location of MySQL database.

98

3.7.2 Property

To edit the property of an existing network share, select a share and click Property.

You can then edit the content of that share.

99

3.7.3 Access Control

When a network share is created, you can assign access rights to users or user groups:

9 Deny access

Access to the network share will be denied.

9 Read only

Users can read the files only on the network share.

9 Full access

Users can read, write, create, or delete files and folders on the network share.

3.7.4 Delete

Select a share and click Delete. Click OK to confirm.

100

3.7.5 Restore

If the default network shares of the NAS are not created successfully, you can use the

Restore function to restore the network shares. To do so, click Restore and the shares will be created.

101

3.7.6 NFS Access Control

*This option is supported by “TS-409 Pro” only.

You can set the NFS access right of the network share. The Public folder is for open access while access is denied for other default network shares. For detailed configuration, please click on the link “Click here for more detailed description”.

102

3.8 System Tools

The System Tools enable you to optimize the maintenance and management of the NAS.

3.8.1 Alert Notification

In case of warning or malfunction, e.g. CPU fan fails, a drive fails or is unplugged, an email will be sent to the administrator automatically. You can go to Event Logs (refer to

Chapter 3.9) to check the details of all errors and warnings.

To be able to send notification e-mails, you must configure the SMTP server.

Note: It is recommended to send a test e-mail to make sure you can receive the alert mails.

103

3.8.2 Restart/ Shutdown

Select to restart or shut down the NAS.

3.8.3 Hardware Settings

You can enable or disable the hardware functions of the NAS. i. Enable configuration reset switch

By enabling this option, you can press the reset button for 3 seconds to reset the administrator password and system settings to default. ii. Enable hard disk standby mode

When this function is enabled, hard disk will go to standby mode if there is no access within the specified period. The Power LED will glow in blue and the Status LED will be off in hard disk standby mode. iii. Enable light signal alert when the free size of SATA disk is less than the value

The Status LED flashes red and green when this function is enabled and the free space of the SATA disk is less than the value. The range of the value is 1-51200 MB. iv. Auto power on when power resumes after power loss

When this function is enabled, the NAS turns on automatically when power resumes after improper shutdown or power loss. v. Enable alarm buzzer

104

Enable this option. The system will sound when an error occurs. vi. Smart Fan configuration

After enabling Smart Fan, the fan rotation speed is automatically adjusted according to the server temperature. It is recommended to enable this option. By manually setting the fan rotation speed, the fan rotates at the defined speed continuously.

Note: When Smart Fan is enabled, the fan rotates at high speed when the system temperature reaches 48°C or above. You can define the system temperatures to trigger high speed or low speed rotation of the fan. The fan rotates at low speed when the system temperature is below 40°C.

105

3.8.4 UPS

If your UPS device provides USB interface, you can enable UPS (uninterruptible power supply) support to protect your system from abnormal system shutdown caused by power outage. In case of utility power failure, the system shuts down automatically by probing the power status of the connected UPS unit.

9 Enable UPS support

To activate the UPS support, you can select this option. You can set the shutdown timer to turn off the system automatically after the system detects the AC power is abnormal. In general, the UPS can keep supplying the power for the system for about 5~10 minutes, depending on the maximum load of the UPS and the number of the loads connected to it.

UPS Model

Select the UPS model from the list. If the UPS model you are using is not available on the list, please contact our technical support.

IP Address of UPS

If you have selected APC UPS with SNMP for UPS model, enter the IP address of the

UPS.

106

3.8.5 Hard Disk S.M.A.R.T.

This page enables users to monitor hard drive health, temperature, and usage status by the hard disk S.M.A.R.T. mechanism.

Select the hard drive and you can view the following information by clicking the corresponding buttons.

Summary

Test

Settings

Field Description

Hard disk information

SMART information

Displays the hard drive smart summary and the latest test result.

Displays the hard drive details, e.g., model, serial number, drive capacity, etc.

Displays the hard drive SMART. Any items that the values are lower than the threshold are regarded as abnormal.

To perform quick or complete hard drive SMART test and display the results.

To configure temperature alarm. When the hard drive temperature is over the preset values, the system records error logs.

You can also configure quick and complete test schedule. The latest test result is shown in the

Summary page.

107

3.8.6 System Update

Note: If the system is running properly, you do not need to update the firmware.

Before updating system firmware, please make sure the product model and firmware version are correct. Follow the steps below to update firmware:

Step 1: Download the release notes of the same version as the firmware from QNAP website http://www.qnap.com

. Read the release notes carefully to make sure you need to upgrade the firmware.

Step 2: Before upgrading system firmware, back up all disk data on the server to avoid any potential data loss during system update.

Step 3: Click the [Browse…] button to select the correct firmware image for system update. Click Update System to update the firmware.

Note: System update may take tens of seconds to several minutes to complete depending on the network connection status. Please wait patiently. The system will inform you when system update is completed.

108

3.8.7 USB One Touch Copy Backup

You can configure the function of the USB one touch copy button in this page. The following three functions are available:

• Copy from the front USB storage to a directory of the internal drive of the NAS.

• Copy to the front USB storage from a directory of the internal drive of the NAS.

• Disable the one touch copy button

109

3.8.8 Change Logo

You can choose your own picture to display on the login page of the NAS. The size of the picture cannot exceed 20K bytes.

110

3.8.9 Back up to an External Storage Device

You can back up the local drive data to an external storage device. In this page, you can select to execute instant, automatic, or schedule backup methods, and configure the relevant settings.

• Backup Now: To back up data to the external storage device immediately.

• Schedule Backup: To back up data by schedule. You can select the week day and time to execute the backup.

• Auto-backup: To execute the backup automatically once the storage device is connected to the NAS.

Copy Options:

You can select “Copy” or “Synchronize” for the copy options. When “Copy” is selected, files are copied from the NAS to the external device. By selecting “Synchronize”, the data on the internal drives of the NAS and the external storage device are synchronized.

Any different files on the external device are deleted.

Note: In the copying and synchronizing process, if the identical files exist on both sides, the files are not copied. If there are files in the same name but different in size or modified dates on NAS and the external device, the files on the external device are overwritten.

111

3.8.10 Remote Replication (Disaster Recovery)

Remote Replication enables you to replicate files on the NAS to another QNAP NAS. The files are compressed before the replication process in order to save time for data transfer.

Make sure a network share is created before creating a remote replication task.

Using Remote Replication

Login the NAS and go to Remote Replication in System Tools.

9 Port Number: Specify a port number for remote replication. The default port number is 873.

Note: If this server connects to the Internet via a router, make sure the ports 134 and 445, and the specified port for remote replication.

9 Enable backup from a remote server to the local host: Check this option to allow the remote server to back up data to the local host via remote replication. i. New a. Click New to enter the following page.

112

b. Complete all settings and click OK to save or Cancel to quit. c. The port for remote replication is 873, 445, 137-139. If you are using two NAS servers behind an NAT router, please open the port 873, 445, 137-139 on NAT router and forward the port to the corresponding LAN IP of the NAS. Otherwise, the remote replication service will be blocked by NAT.

Note: To use remote replication, enable Microsoft Networking service, make sure the destination network share and directory have been created, and the user name and password are valid to login the destination folder.

113

ii. Edit a. Select the task to be edited. b. Click Edit. c. Modify the settings. d. Click OK to save or Cancel to quit. iii. Delete a. Select the task to be deleted. b. Click Delete.

114

3.8.11 Backup/ Restore/ Reset Settings

• To backup all settings, including user accounts, server name and network configuration etc., click Backup and select to open or save the setting file.

• To restore all settings, click Browse to select a previously saved setting file and click

Restore to confirm.

• To reset all settings to default, click Reset.

Caution: When you press Reset on this page, all drive data, user accounts, network shares and system settings are cleared and restored to default. Please make sure you have backed up all the important data and system settings before resetting the NAS.

3.8.12 IP Filter

Enter the IP address or network from which the connections to this server are allowed or rejected. When the connection of a host server is denied, all protocols of that server are not allowed to access the local server.

115

3.8.13 Network Recycle Bin

This function enables files deleted on the shares of the NAS to be removed to Network

Recycle Bin to reserve the files temporarily. To enable this function, check the box

“Enable Network Recycle Bin” and click Apply. The system creates a network share

"Network Recycle Bin" automatically.

To delete all the files in network recycle bin, click “Clean Network Recycle Bin”.

116

3.8.14 Remote Login

After enabling this option, you can access this server via Telnet or SSH encrypted connection (only the account “admin” can login remotely). You can use certain Telnet or

SSH connection clients for connection, e.g., putty. Please make sure you have opened the configured ports on your router or firewall when using this function.

117

3.9 Event Logs

3.9.1 System Event Logs

The NAS can store 10,000 recent event logs, including warning, error, and information messages. In case of system malfunction, event logs can be retrieved to analyze system problems.

118

3.9.2 System Connection Logs

The logs of connections to the server via samba, FTP, AFP, HTTP, HTTPS, Telnet, and

SSH are recorded in this page.

You can select to start or stop logging. The file transfer performance can be slightly affected by enabling the event logging.

Click “Save” to save the logs as csv file.

Click “Delete” to clear all logs.

119

3.9.3 On-line Users

The information of the on-line users accessing the system via networking services is shown in this page.

3.9.4 System Information

You can view the system information, e.g., CPU usage and memory in this page.

120

Chapter 4. Use Front USB Backup Button

By connecting an external storage device to the NAS, you can use the front USB backup button to copy data from the external device to NAS or from the NAS to the external device. To use this function, please follow the steps below:

1. Make sure a SATA disk is installed correctly in the NAS according to the instructions

in Chapter 2.1.

2. Turn on the NAS.

3. Go to System Tools/ USB one touch copy backup to configure the settings.

4. Connect USB devices, e.g. digital camera, flash, external USB drive to the front USB port of the NAS.

5. Press the Copy button on the NAS. The data is copied according to your settings in

System Tools/ USB one touch copy backup.

# Intelligent one touch copy button: The NAS detects the data in the connected source automatically. The first time a USB device is connected, press the Copy button and the

NAS copies all data in the device automatically. When the same device is connected again and there are changes to the source data, press the Copy button, and the NAS copies all files in the device. If there are no changes, press the Copy button and the

NAS does not copy the files.

Intelligent one touch copy button

121

Chapter 5. Multimedia Station

5.1 Share Photos and Multimedia Files via Web

Interface

The NAS provides a user-friendly web management interface for you to manage personal albums easily. You can view images and multimedia files, or browse photos by thumbnails preview.

A. Upload photos by web administration

1. To use Multimedia Station of the NAS, make sure a SATA disk is installed correctly in

the NAS according to the instructions in Chapter 2.1. A share folder Qmultimedia is

be created. Enable Multimedia function in Network Settings.

122

2. Click on the link http://NAS IP/Qmultimedia on Multimedia Station page or click

Multimedia Station on the login page of the NAS to access Multimedia Station.

Note: To display the Multimedia Station link on the login page, please enable the option “Display service link on the login page”.

3. Click on the top right hand corner. Login with administrator name and password to manage Multimedia Station. Users without administration right can view the photos and multimedia files on Multimedia Station but they do not have the right to modify the files. When logging in as Multimedia Station user, you can access the albums authorized for browsing.

123

4. Click Browse to select the multimedia file and then click Upload to upload the file to the folder.

5. You can also create folders by clicking and upload files to the folders.

124

B. Upload photos to Qmultimedia folder directly

You can upload multimedia files to the NAS directly by the following steps.

1. Use Run function in Windows. Enter \\[server name] or \\[server IP] to access share folder on the NAS.

2. Open the folder Qmultimedia. Enter the user name and password to login.

3. Drag the files and folders to the folder directly. Please wait patiently when the NAS is generating thumbnails for images during uploading.

125

When you login Multimedia Station by web browser again, all multimedia files are shown.

Buttons on Multimedia Station page

Sort files by name

Sort files by size

Sort files by date

Return to previous page

Return to Home

Create folder

Rename file or folder

Select all

Select none

Delete

Support file format list

Picture

Video

Audio

Others jpg, bmp, gif wmx, wvx, avi, mpeg, mpg, mpe, m1v, mp2, mpv2, mp2v, mpa, dvr-ms, asf, asx, wpl, wm, wmx, wmd, wmz wma, wax, cda, wav, mp3, m3u, mid, midi, rmi, aif, aifc, aiff, au, snd

(Other formats not mentioned above)

126

View Photo Information

1. To view detailed information of a photo, click on the thumbnail of the picture.

2. The information of the photo, e.g. file name, resolution, size, camera producer is shown on the right. You can enter a description for the picture in the box below the photo and click Submit. To reset the description to previously saved version, click

Reset.

127

Buttons Description

You can use the buttons on top of the photo to manage the album.

Back to previous level

Previous image

Next image

Rotate image anticlockwise

Rotate image clockwise

Zoom in

Zoom out

Play slideshow. Select the time interval in seconds.

Click play to play slide show. To stop playing, click

stop.

Print the image

Save the picture

Set the picture as album cover

128

Play music or video files

To play music or video files on Multimedia Station, you can click on the thumbnail of the file displayed on the page. The file is played by the default music or video playing program of your PC.

*It is recommended to use Media Player 10.0 or above as the default playing program.

129

C. Configure album authority

1. After logging in as administrator (admin), click page for album authority.

to enter the configuration

2. You can view, add, delete, and edit users. For any inquiries when using these functions, click on the help button on the top right corner of the page.

130

3. You can edit user profile and album access authority on this page. For any inquiries when using these functions, click on the help button on the top right corner of the page.

131

5.2 Enable iTunes Service

Enable iTunes service on the NAS. The mp3 files on Qmultimedia folder of the NAS will be shared via iTunes. All the computers with iTunes installed on LAN are able to find, browse, and play the music files on the NAS.

Password required: To allow the users to access the data only by entering the correct password, please check this option and enter the password.

Click “Edit smart playlist” to enter the smart playlist page. You can define the playlist rules. If there is no song that matches the rules in the playlist, the iTunes client does not show the playlist. For detailed operation, please refer to the on-line help.

132

Note: You can download the latest iTunes software from official Apple website http://www.apple.com

.

133

5.3 Use UPnP Media Server

The NAS is built-in with TwonkyMedia, DLNA compatible UPnP media server. Enable this function and the NAS shares particular music, photos or video files to DLNA network.

You can use DLNA compatible digital media player (DMP), to play the multimedia files on the NAS on TV or acoustic sound system.

To use UPnP Media Server, please enable this function and click the following link

(http://NAS IP:9000/) to enter the configuration page of UPnP Media Server.

134

Click on the link http://NAS IP:9000/ to enter UPnP Media Server configuration page and configure the following settings.

(1) Language: Select the display language.

(2) Server Name: Enter the name of the NAS’s UPnP Media Server. This name is shown on DMP operation interface, e.g. NAS.

(3) Content Locations: Select the share folder on the NAS to be shared to DMP. The default folder is Qmultimedia. You can add more than one share folder.

Click Save Changes to save the settings.

After configuring the settings, you can upload mp3, photos, or video files to Qmultimedia folder or other specified folders on the NAS.

Note: If you upload multimedia files to the default share folder but the files are not shown on Media Player, you can click “Rescan content directories” or

“Restart server” on the Media Server configuration page.

The built-in UPnP Media Server of the NAS is compatible with the DLNA DMP devices in the market.

135

About UPnP and DLNA

Universal Plug and Play (UPnP) is a set of computer network protocols promulgated by the UPnP Forum. The purpose of UPnP is to allow devices to connect seamlessly and to simplify the implementation of networks at home and in corporate environment. UPnP achieves this by defining and publishing UPnP device control protocols built upon open,

Internet-based communication standards.

The term UPnP is gleaned from Plug-and-play, a technology for dynamically attaching devices to a computer directly.

The Digital Living Network Alliance (DLNA) is an alliance of a number of consumer electronics, mobile and personal computer manufacturers. Its aim is to establish a home network in which the electronic devices from all companies are compatible with each other under an open standard. The alliance also tries to promote the idea of digital home by establishing DLNA certification standard. All DLNA certified products connected to the home network can be accessed seamlessly to enable consumers to enjoy digital life conveniently.

136

Chapter 6. Download Station

The NAS supports BT, HTTP, and FTP download mechanism. You can add download task to the NAS and let the server finish downloading independent of PC.

Warning: Please be warned against illegal downloading of copyrighted materials. The Download Station functionality is provided for downloading authorized files only. Downloading or distribution of unauthorized materials may result in severe civil and criminal penalty.

Users are subject to the restrictions of the copyright laws and should accept all the consequences.

1. To use Download Station, make sure one or two SATA disks are installed correctly in

the NAS according to the instructions in Chapter 2.1. A share folder Qdownload is

created. Enable this function in Network Settings.

137

2. Click on the link http://NAS IP/Qdownload on Download Station page or click

Download Station on the login page of the NAS to access Download Station.

Note: To display the Download Station link on the login page, please enable the option “Display service link on the login page”.

138

3. Select Add new BT task or Add new FTP/HTTP task.

(A) Add new BT task

Click Add new BT task on the left and upload a torrent file. You can download legal torrent files by searching on the Internet. There are websites that provide legally sharing torrents e.g. www.legaltorrents.com

. Please download the torrent files to your local disk and then upload them to the NAS.

139

(B) Add new FTP/HTTP task

To run an FTP download task, click Add new FTP/HTTP task. Enter the FTP URL of the download task and select the share folder to save the files. Enter the user name and password to login the FTP server (if necessary). Then click OK to start downloading.

To run an HTTP download task, click Add new FTP/HTTP task. Enter the HTTP URL of the download task and select the share folder to save the files. Then click OK to start downloading.

4. After uploading a download task, the task appears on View Run List.

140

5. You can select a download task and click BT download property to enable or disable DHT public network and configure the sharing time after download completes.

Note: If the sharing time (larger than 0 hr) is set for a download task, the download task will be moved to Finish List after download completes and the sharing time ends.

141

6. Click Set Config and enter the number of the maximum tasks you want to download at the same time (Default number: 3).

Enter the maximum download rate (default value is 0, which means unlimited).

Enter the maximum upload rate (default value is 0, which means unlimited).

Enter the port range for Download Station (default range is 6881-6899).

Check UPnP NAT port forwarding to enable automatically port forwarding on UPnP supported gateway (default is not checked).

142

7. To pause a running download task, select the task in View Run list and click

Pause/ Restart download task. You can view tasks that are paused or finished in

View Pause List and View Finish List respectively. To restart a paused task, select the task in View Pause List and click Pause/ Restart download task.

8. You can also increase or decrease task priority by clicking Increase download

priority and Decrease download priority when there are multiple download tasks.

9. To delete a running, paused, or finished task, select the task and click Delete

download task. You can select to remove the download task only and retain the downloaded files, or remove the task and downloaded files.

143

10. To logout Download Station, click on the top right hand corner.

11. To access the folders you have downloaded, please go to the share folder

Qdownload of the NAS.

144

Dump Diagnostic Information

To view the diagnostic details of a download task, select a task on the list and click

[Dump Diagnostic Information].

145

The common reasons for slow BT download rate or download error are as follow:

1. The torrent file has expired, the peers have stopped sharing this file, or there is error in the file.

2. The NAS has configured to use fixed IP but DNS server is not configured, or DNS server fails.

3. Set the maximum number of simultaneous downloads as 3-5 for the best download rate.

4. The NAS is located behind NAT router. The port settings have led to slow BT download rate or no response. You may try the following means to solve the problem: a. Open the BitTorrent port range on NAT router manually. Forward these ports to the LAN IP of the NAS. b. The new NAS firmware supports UPnP NAT port forwarding. If your NAT router supports UPnP, enable this function on the NAT. Then enable UPnP NAT port forwarding of the NAS. The BT download rate should be enhanced.

146

6.1 Use Download Software QGet

QGet is a powerful management software for maintaining the BT, HTTP and FTP download tasks of multiple TS series NAS servers via LAN or WAN. By using QGet, you no longer need to login the Download Station web interface of multiple servers and manage the settings one by one. Simply install QGet on any computer running Windows

2000/XP, you can manage the download tasks of all your NAS servers.

1. To use QGet, install the software from the product CD-ROM.

147

2. Follow the instructions to install QGet.

3. Run QGet from the installed location.

4. For the details of using QGet, please refer to the online help of the software.

148

Chapter 7. Web Server

The NAS enables you to upload web pages and manage your own website easily by Web

Server function. It also supports Joomla!, PHP and SQLite for you to establish an interactive website. Once you activate Web Server function, you can access your own homepage from anywhere. You can add hyperlinks in your homepage to connect to all the features of the NAS, such as Download Station, Multimedia Station, and Web Server.

1. To use Web Server, make sure a SATA disk is installed correctly in the NAS

according to the instructions in Chapter 2.1. A share folder Qweb is created.

Enable Web Server function and enter the port number in Network Settings.

149

2. You can upload your web pages to the folder Qweb by the following methods: a. By using samba: You can open a web browser and type \\[NAS IP]\Qweb or

\\[NAS name]\Qweb. Login the folder and upload your web pages. b. By FTP: You can login FTP service and upload your web pages to the folder

(please refer to Chapter 8).

c. By Web File Manager: You can login Web File Manager and upload your web

pages to the folder (please refer to Chapter 9).

The file index.html, index.htm, or index.php is the home path of your webpage.

150

3. Click on the link http://NAS IP/ on Web Server page or click Web Server on the login page of the NAS to access the web page you upload. Note that when Web

Server is enabled, you have to type [http://NAS IP:8080] in your web browser to access the login page of the NAS.

151

MySQL Management

The first time you install the system, the phpMyAdmin software is automatically installed as the MySQL management tool. When you update the firmware in the future, phpMyAdmin will not be re-installed and your data on the database will not be overwritten or changed.

The phpMyAdmin program files are created in the Qweb share folders. You can change the folder name and access the database by entering the URL in the browser. However, the link on the web management interface is not changed.

Note: The default user name of MySQL is “root”. The password is “admin”. Please change your root password immediately after logging in to the phpMyAdmin management interface.

SQLite Management

SQLiteManager is a multilingual web-based tool to manage SQLite databases and can be downloaded from http://www.sqlitemanager.org/ .

Please follow the steps below or refer to the INSTALL file in the downloaded

SQLiteManager-*.tar.gz

?

to install the SQLiteManager.

(1) Unpack your download file SQLiteManager-*.tar.gz.

(2) Upload the unpacked folder SQLiteManager-* to \\NAS IP\Qweb\.

(3) Open your web browser and go to http://NAS IP/SQLiteManager-*/.

?

: The symbol "*" refers to the version number of SQLiteManager.

152

Chapter 8. FTP Server

The NAS supports FTP service. To use FTP service, enable this function in Network

Settings and follow the steps below:

1. Open an IE browser and enter ftp://[NAS IP] or ftp://[NAS name]. OR

2. By Web File Manager of the NAS. a. Go to the NAS administration page and click Web File Manager. Enter user name and password to login the NAS.

153

b. Click FTP.

154

c. Enter the user name and password to login FTP service. d. You can start to use FTP service.

155

Chapter 9. Web File Manager

Using Web File Manager

To use Web File Manager, enable web service in Network Settings first.

Launch the web browser and go to the NAS administration page. Select Web File

Manager and enter the correct login name and password. You can login as “guest” to access the network shares open to guest access on the NAS. The login password of guest is guest.

Note: Make sure a network share has been created before using Web

File Manager.

156

Select an existing network share.

You can organize share folders of the NAS. With Web File Manager, you can upload, rename, or delete files and folders in the network shares.

View files online

Click on a file displayed on the web page. The information of the file is shown. If your browser does not support the file format, a download window pops up automatically.

Download the file and you can open it on your PC.

Create folder i. Select a network share or folder in which you want to create a new folder. ii. Click (Create Folder) on the toolbar. iii. Enter the name of the new folder and click OK.

157

Rename file or folder i. Select a file or folder to rename. ii. Click (Rename) on the toolbar. iii. Enter the new file or folder name and click OK.

Delete file or folder i. Select a file or folder to delete. ii. Click (Delete) on the toolbar. iii. Confirm to delete the file or folder.

To delete all files and folders, click (Select All) and

Upload file i. Open the folder to upload file to. ii. Click Browse to select the file. iii. Click Upload.

Download file i. Select a file to download. ii. Right click the file and select “Save Target As” to save the file.

Logout

To exit Web File Manager, click (Logout).

(Delete).

158

View Files Named in Local Language

To view files named in Chinese, you may have to configure the browser settings. Take

Internet Explorer as an example, follow the steps below to configure the settings.

1. Click on Tools in IE browser.

2. Click Internet Options.

3. Cancel this option in Advanced tab.

4. Click OK.

5. Restart the browser.

159

Web File Manager Icons

Icon Description

Return to the parent folder

Refresh the current page

Return to network share list home page

Create folder

Rename file or folder

Delete file or folder

Select all

Cancel selection

Logout

Full access network share folder

Read-only network share folder

Malfunction network share folder

160

Chapter 10. NetBak Replicator

NetBak Replicator is a powerful program installed in user’s system (Windows ® OS only) for data backup. You can back up any files or folders on local PC to specified share folder on the NAS by LAN or WAN.

Main Functions

1. Backup

• Instant Backup

You can select files and folders on local PC and back up files to specified network share folder on the NAS immediately.

• File Filter

You can select particular file types to be excluded from backup. The system filters all files belonging to these file types when backing up data.

• Schedule

You can specify a schedule for backing up data with this option, e.g. 12:00 every day or 05:00 every Saturday.

• Monitor

When this option is enabled, the system uploads all files or folders to the server instantly for backup when the files or folders are modified.

2. Restore

Select this option to restore backed up data to the original location of the file or to a new directory.

3. Log

Enable this option to record events of NetBak Replicator, e.g. the time when NetBak

Replicator starts and terminates.

161

Install NetBak Replicator

1. Select Install NetBak Replicator in the NAS CD-ROM.

2. Follow the steps to install NetBak Replicator.

3. Upon successful installation, a shortcut icon

Double click the icon to run NetBak Replicator.

is shown on the Desktop.

162

Use NetBak Replicator

1. Before using NetBak Replicator, please login the NAS administration and go to

Network Share Management to create a share folder for backup. Make sure the share folder is open for everyone access or you login the share folder with an authorized account or administrator by NetBak Replicator.

2. Run NetBak Replicator. Click network is displayed.

. All the NAS and their share folders within the

163

3. When the following window appears, all the NAS servers in the LAN appear on the left list. Select a server and a share folder on the right. NetBak Replicator also supports backup via WAN, you can enter the IP address of the NAS for data backup directly and select a share folder. Then click OK.

4. Enter the user name and password to login the server.

5. You can start the backup procedure upon successful connection to the NAS.

164

Description of Buttons on NetBak Replicator

Open Configuration: Open a previously saved NetBak Replicator configuration.

Save Configuration: Save the settings on NetBak Replicator. The file is named as *.rpr

Select All: Select all items in the window.

Clear All: Clear selection.

Select My Document: Select all folders in My Document.

Open NAS Backup Folder: This button allows users to find out where the files were backed up, and check or manage the archived files manually.

Advanced Backup: Advanced Backup allows power user to back up a single folder with more advanced options.

165

Backup

Select files and folders for backup.

166

9 Start

When you have selected the files for backup to the NAS, click Start on NetBak

Replicator. The program starts to copy the selected files to the specified share folder on the NAS.

167

9 File Filter

Click File Filter on NetBak Replicator main page to select file format to be skipped from backup. Then click OK.

168

9 Schedule

Click Schedule on NetBak Replicator main page. Then check the box “Enable

Backup Schedule” and select the frequency and time for backup. Click OK to confirm.

169

9 Monitor

Select a folder for monitoring. When this option is enabled, the system uploads all files or folders to the server instantly for backup when the files or folders are modified. Other files are gray and cannot be selected. Click Monitor again to cancel monitoring. An icon appears on task bar of Windows ® when monitoring is in process.

170

9 Initialize Configuration

When using this function, NetBak Replicator records all current settings of the user, including whether or not monitor function is enabled. When the user login again, this program loads the previous recorded settings for users to manage data backup.

171

Restore

Please follow the steps below to restore files from the NAS to your PC. a. Restore to original position: Select the location that the data is restored to. b. Select new restore position: Click to select the directory to restore data to or select a previously chosen location from the drop-down menu. c. Select the folder(s) and sub-folder(s) for restoring data on the right list and click Start.

172

d. Option: Select recovery option and error option.

If the restoring file existed, NetBak Replicator will:

9 Overwrite all the files

9 Ask first

9 Skip this file

If an error happens in the process of file restoring, NetBak Replicator will:

9 Stop the restoring

9 Ask first

9 Ignore this error message

173

Log a. Save As…: To save all logs on NetBak Replicator, click this button. All logs are saved as text file. b. Clear All: Click this button to clear all logs. c. Option: Select the type of logs to be recorded― “Record all logs” or “Record error logs only”.

174

Chapter 11. Configuring AD Authentication

*This option is supported by “TS-409 Pro” only.

AD environment mixed mode can be supported by the NAS. For example, qatest.com.tw and sub2.qatest.com.tw are domains controlled by Windows 2003 server, and sub1.qatest.com.tw domain is controlled by Windows 2000 server.

175

Please make sure you have enabled the Active Directory Service on the Windows Server and check the following items: z

The NAS’s DNS server setting must be assigned to AD server.

z z z

The NAS and AD server can synchronize only if their time difference is less than 5 minutes.

The NAS and AD server synchronize every 5 minutes. To configure the settings manually, the NAS has to be set as standalone mode and then added to AD domain.

After adding to AD domain, you must login as Domain_name\Username to access z z z z z

Network Neighborhood. Local users of the NAS cannot access the server by

Network Neighborhood.

It is suggested to use Windows 2000 Service Pack 4, or Windows 2003 Service

Pack 1.

When the NAS is added to AD domain, the authority of “everyone” does not work,

“everyone” is the default account of the NAS, but is not supported in AD domain.

Therefore the authority has to be reset.

The IP address of the AD server should be recorded in the DNS settings on the AD server.

You must change the password of “administrator” after you create “Active

Directory” service on the AD server.

The DNS server on the AD Server should have two records on it. For example, when the AD server name is 2003tc.testad.com, the records will be:

2003tc.testad.com A 192.168.1.100

Testad.com A 192.168.1.100

One is “A record” for AD server, and the other is the domain “A record” for DNS queries.

176

Adding the NAS to Windows Server 2003 Active Directory Domain

1. In TCP/IP Configuration in Network Settings, enter the IP address of Windows AD server as the primary DNS Server IP.

2. Go to Microsoft Networking of Network Settings. Enable AD Domain Member, and enter the domain name and the user name with administrator access right to that domain.

Note: a. Make sure that a fully qualified domain name such as AD.local has been filled in. b. Make sure the user name with administrator access right to that domain.

177

3. When the following message appears after applying the settings in step 2, check the time zone settings. Make sure the difference of your time and that of AD server is less than 5 minutes. If the time difference is larger than 5 minutes, you will not be able to add the domain member.

4. Upon successful adding of domain member, you can view the list for domain users and local users in User Management.

5. Go to Access Control in Network Share Management to configure the access control right of AD users for all available network shares.

178

Using AD users to access services

To access services like FTP, Network Neighborhood, or Apple Talk with an AD user account, add DomainName\ before the user name when logging in.

179

Chapter 12. Access the NAS on Linux OS

*This option is supported by “TS-409 Pro” only.

In addition to Microsoft and Mac OS, the NAS also supports Linux systems through the

NFS service:

1. In Linux, run the following command: mount -t nfs <NAS IP address>:/<Network Share Name> <Directory to

Mount>

For example, if the IP address of your NAS is 192.168.0.1 and you want to link the network share folder “public” under the /mnt/pub directory, use the following command: mount -t nfs 192.168.0.1:/public /mnt/pub

Note: You must login as “root” user to initiate the above command.

2. Login as the user ID you define, you can use the mounted directory to access your network share files.

180

Chapter 13. NAS Maintenance

This section provides a general overview on system maintenance.

13.1 Restart/ Shut down Server

Follow the steps below to restart or shut down the NAS.

1. Enter the administration page and go to “Restart/ Shutdown” in System Tools.

2. Click Restart to reboot the server or Shut Down to turn off the server.

To force shut down the NAS server, press the power button for more than 10 seconds.

The server will beep once and shut down immediately.

181

13.2 Reset Administrator Password and Network

Settings

To reset the administrator password and network settings of the NAS,

1. Press the reset button of the NAS for a few seconds. A beep sound will be heard.

The following settings are reset to default: a. System admin password: admin b. Network Settings/ TCP/IP Configuration: Obtain IP address settings automatically via DHCP c. Network Settings/ TCP/IP Configuration: Disable Jumbo Frame d. Network Setting/ System Port Management: 8080 (system service port) e. System Tools/ IP Filter: Allow all connections

2. Login the NAS with the default user name and password:

Default user name: admin

Password: admin

Note: To reset the system by the reset button, the option “Enable configuration reset switch” in Hardware Settings must be activated.

182

13.3 Disk Failure or Malfunction

When you encounter disk malfunction or failure, please do the following:

1. Record the malfunction status or error messages shown in Event Logs.

2. Stop using the failed NAS and turn off the server.

3. Contact customer service for technical support.

Note: The NAS must be repaired by professional technicians, do not try to repair the server yourself.

Please back up any important files or folders to avoid potential data loss due to disk crash.

13.4 Power Outage or Abnormal Shutdown

In case of power outage or improper shutdown of the NAS, the system will resume to the state before it is shut down. If your server does not function properly after restart, please do the following:

1. If the system configuration is lost, configure the system again.

2. In the event of abnormal operation of the server, contact customer service for technical support.

To avoid the above situations, please back up your data periodically and make sure you have done the following:

• Follow the instructions described in Chapter 13.1 to restart or shut down the server.

• If there is an anticipated power outage, back up all important data and turn off the server properly until power supply is resumed.

183

13.5 System Software Abnormal Operation

When the system software does not operate properly, the NAS automatically restarts to resume normal operation. If you find the system restarts continuously, it may fail to resume normal operation. In this case, please contact the technical support immediately.

13.6 System Temperature Protection

When the system temperature exceeds 70°C or 158°F, the system shuts down automatically for hardware protection.

184

Chapter 14. RAID Abnormal Operation

Troubleshooting

If the RAID configuration of your NAS is found abnormal or there are error messages, please try the following solutions:

Note: You must back up the important data on the NAS first to avoid any potential data crash.

1. Check that the RAID rebuilding has failed: a. LED: The Status LED of NAS flashes in red. b. In Device Configuration/ SATA Disk page, the status of the disk volume configuration is “In degraded mode”.

2. Check which hard drive(s) causes the RAID rebuilding failure. a. You can go to System Logs/ System Event Logs to search for the following error message and find out which hard drive(s) causes the error.

Error occurred while accessing Drive X.

Drive X has been removed.

X refers to the number of the hard drive slot.

3. Troubleshooting

After plugging in the new hard drive (e.g., HDD 1), drive rebuilding will start. If the drive configuration fails again due to read/write error of the hard drive in the rebuilding process, identify which hard drive causes the error and follow the steps below to solve the problems.

Situation 1: The error is caused by the newly plugged in drive.

If the newly inserted drive (e.g., HDD 1) causes the rebuilding error, please unplug HDD

1 and plug in another new drive to start RAID rebuilding.

Situation 2: The error is caused by an existing drive (e.g., HDD 2) in the RAID configuration.

If the RAID configuration is RAID 1, you can do either one of the following:

185

a. Back up the drive data to another storage device. Then reinstall and set up the NAS. b. Format the newly plugged in drive (e.g. HDD 1) as a single drive. Then back up the data on the NAS to this drive (HDD 1) via Web File Manager. Unplug the drive with errors (e.g., HDD 2). After that, insert a new drive to NAS to replace the fault drive, and execute RAID 1 migration.

When the RAID configuration is RAID 5 or 6: The RAID configuration is changed to degraded mode (read-only). It is recommended that you back up the data and run system installation and configuration again.

Note: When plugging in or unplugging a hard drive, please strictly adhere to the following rules to avoid abnormal system operation or data crash.

1. Plug in only one drive to NAS or unplug only one drive from NAS at one time.

2. After plugging in or unplugging a hard drive, please wait for about ten seconds or more until you hear two beeps from the NAS. Then unplug or plug in the next hard drive.

186

Appendix A Network Camera Compatibility List

Brand Model

AXIS

AXIS 206

AXIS 207

D-Link

AXIS 207W

DCS-900

DCS-2120

DCS-3220 (G)/ DCS-3420

DCS-5220

DCS-5300 (G)

DCS-6620 (G)

ICS 1013/ ICS 1003 IPUX

FCS-1010/ WCS-2010

FCS-1030/ WCS-2030

FCS-1040/ WCS-2040

LevelOne

FCS-1060/ WCS-2060

FCS-1070/ WCS-2070

FCS-3000/ FCS-3021

Linksys WVC54GCA

VIVOTEK

BL-C11/ BL-C10/ BL-C111/ BL-C131/ BL-C30/ BL-C31

IP3112/ IP3122/ IP3111/ IP3121/ IP3132

IP3135/ IP3137

PT3112/ PT3122/ PT3117/ PT3127

IP7135/ IP7137

IP7131/ IP7132

PT7135/ PT7137

*For the updated information of supported camera models, please visit QNAP website at http://www.qnap.com/ .

187

Technical Support

QNAP provides dedicated online support and customer service via instant messenger.

You can contact us by the following means:

Online Support: http://www.qnap.com

E-mail: [email protected]

MSN: [email protected]

SKYPE: qnapskype

Technical support for North America users:

E-mail: [email protected]

1-800 Hotline: 866-276-6754 ext.110

Address: 168 UNIVERSITY PARKWAY POMONA, CA 91768-4300

188

GNU GENERAL PUBLIC LICENSE

Version 3, 29 June 2007

Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/>

Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.

Preamble

The GNU General Public License is a free, copyleft license for software and other kinds of works.

The licenses for most software and other practical works are designed to take away your freedom to share and change the works. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change all versions of a program--to make sure it remains free software for all its users. We, the Free Software Foundation, use the GNU

General Public License for most of our software; it applies also to any other work released this way by its authors. You can apply it to your programs, too.

When we speak of free software, we are referring to freedom, not price. Our General Public

Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for them if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs, and that you know you can do these things.

To protect your rights, we need to prevent others from denying you these rights or asking you to surrender the rights. Therefore, you have certain responsibilities if you distribute copies of the software, or if you modify it: responsibilities to respect the freedom of others.

For example, if you distribute copies of such a program, whether gratis or for a fee, you must pass on to the recipients the same freedoms that you received. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights.

189

Developers that use the GNU GPL protect your rights with two steps: (1) assert copyright on the software, and (2) offer you this License giving you legal permission to copy, distribute and/or modify it.

For the developers' and authors' protection, the GPL clearly explains that there is no warranty for this free software. For both users' and authors' sake, the GPL requires that modified versions be marked as changed, so that their problems will not be attributed erroneously to authors of previous versions.

Some devices are designed to deny users access to install or run modified versions of the software inside them, although the manufacturer can do so. This is fundamentally incompatible with the aim of protecting users' freedom to change the software. The systematic pattern of such abuse occurs in the area of products for individuals to use, which is precisely where it is most unacceptable. Therefore, we have designed this version of the GPL to prohibit the practice for those products. If such problems arise substantially in other domains, we stand ready to extend this provision to those domains in future versions of the

GPL, as needed to protect the freedom of users.

Finally, every program is threatened constantly by software patents. States should not allow patents to restrict development and use of software on general-purpose computers, but in those that do, we wish to avoid the special danger that patents applied to a free program could make it effectively proprietary. To prevent this, the GPL assures that patents cannot be used to render the program non-free.

The precise terms and conditions for copying, distribution and modification follow.

TERMS AND CONDITIONS

0. Definitions.

“This License” refers to version 3 of the GNU General Public License.

“Copyright” also means copyright-like laws that apply to other kinds of works, such as semiconductor masks.

“The Program” refers to any copyrightable work licensed under this License. Each licensee is addressed as “you”. “Licensees” and “recipients” may be individuals or organizations.

190

To “modify” a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission, other than the making of an exact copy. The resulting work is called a “modified version” of the earlier work or a work “based on” the earlier work.

A “covered work” means either the unmodified Program or a work based on the Program.

To “propagate” a work means to do anything with it that, without permission, would make you directly or secondarily liable for infringement under applicable copyright law, except executing it on a computer or modifying a private copy. Propagation includes copying, distribution (with or without modification), making available to the public, and in some countries other activities as well.

To “convey” a work means any kind of propagation that enables other parties to make or receive copies. Mere interaction with a user through a computer network, with no transfer of a copy, is not conveying.

An interactive user interface displays “Appropriate Legal Notices” to the extent that it includes a convenient and prominently visible feature that (1) displays an appropriate copyright notice, and (2) tells the user that there is no warranty for the work (except to the extent that warranties are provided), that licensees may convey the work under this License, and how to view a copy of this License. If the interface presents a list of user commands or options, such as a menu, a prominent item in the list meets this criterion.

1. Source Code.

The “source code” for a work means the preferred form of the work for making modifications to it. “Object code” means any non-source form of a work.

A “Standard Interface” means an interface that either is an official standard defined by a recognized standards body, or, in the case of interfaces specified for a particular programming language, one that is widely used among developers working in that language.

The “System Libraries” of an executable work include anything, other than the work as a whole, that (a) is included in the normal form of packaging a Major Component, but which is not part of that Major Component, and (b) serves only to enable use of the work with that

Major Component, or to implement a Standard Interface for which an implementation is available to the public in source code form. A “Major Component”, in this context, means a major essential component (kernel, window system, and so on) of the specific operating

191

system (if any) on which the executable work runs, or a compiler used to produce the work, or an object code interpreter used to run it.

The “Corresponding Source” for a work in object code form means all the source code needed to generate, install, and (for an executable work) run the object code and to modify the work, including scripts to control those activities. However, it does not include the work's

System Libraries, or general-purpose tools or generally available free programs which are used unmodified in performing those activities but which are not part of the work. For example, Corresponding Source includes interface definition files associated with source files for the work, and the source code for shared libraries and dynamically linked subprograms that the work is specifically designed to require, such as by intimate data communication or control flow between those subprograms and other parts of the work.

The Corresponding Source need not include anything that users can regenerate automatically from other parts of the Corresponding Source.

The Corresponding Source for a work in source code form is that same work.

2. Basic Permissions.

All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program. The output from running a covered work is covered by this License only if the output, given its content, constitutes a covered work. This License acknowledges your rights of fair use or other equivalent, as provided by copyright law.

You may make, run and propagate covered works that you do not convey, without conditions so long as your license otherwise remains in force. You may convey covered works to others for the sole purpose of having them make modifications exclusively for you, or provide you with facilities for running those works, provided that you comply with the terms of this

License in conveying all material for which you do not control copyright. Those thus making or running the covered works for you must do so exclusively on your behalf, under your direction and control, on terms that prohibit them from making any copies of your copyrighted material outside their relationship with you.

Conveying under any other circumstances is permitted solely under the conditions stated below. Sublicensing is not allowed; section 10 makes it unnecessary.

192

3. Protecting Users' Legal Rights From Anti-

Circumvention Law.

No covered work shall be deemed part of an effective technological measure under any applicable law fulfilling obligations under article 11 of the WIPO copyright treaty adopted on

20 December 1996, or similar laws prohibiting or restricting circumvention of such measures.

When you convey a covered work, you waive any legal power to forbid circumvention of technological measures to the extent such circumvention is effected by exercising rights under this License with respect to the covered work, and you disclaim any intention to limit operation or modification of the work as a means of enforcing, against the work's users, your or third parties' legal rights to forbid circumvention of technological measures.

4. Conveying Verbatim Copies.

You may convey verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that this License and any nonpermissive terms added in accord with section 7 apply to the code; keep intact all notices of the absence of any warranty; and give all recipients a copy of this License along with the

Program.

You may charge any price or no price for each copy that you convey, and you may offer support or warranty protection for a fee.

5. Conveying Modified Source Versions.

You may convey a work based on the Program, or the modifications to produce it from the

Program, in the form of source code under the terms of section 4, provided that you also meet all of these conditions: a) The work must carry prominent notices stating that you modified it, and giving a relevant date. b) The work must carry prominent notices stating that it is released under this License and any conditions added under section 7. This requirement modifies the requirement in section 4 to “keep intact all notices”.

193

c) You must license the entire work, as a whole, under this License to anyone who comes into possession of a copy. This License will therefore apply, along with any applicable section 7 additional terms, to the whole of the work, and all its parts, regardless of how they are packaged. This License gives no permission to license the work in any other way, but it does not invalidate such permission if you have separately received it. d) If the work has interactive user interfaces, each must display Appropriate Legal

Notices; however, if the Program has interactive interfaces that do not display

Appropriate Legal Notices, your work need not make them do so.

A compilation of a covered work with other separate and independent works, which are not by their nature extensions of the covered work, and which are not combined with it such as to form a larger program, in or on a volume of a storage or distribution medium, is called an

“aggregate” if the compilation and its resulting copyright are not used to limit the access or legal rights of the compilation's users beyond what the individual works permit. Inclusion of a covered work in an aggregate does not cause this License to apply to the other parts of the aggregate.

6. Conveying Non-Source Forms.

You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways: a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software interchange. b) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by a written offer, valid for at least three years and valid for as long as you offer spare parts or customer support for that product model, to give anyone who possesses the object code either (1) a copy of the Corresponding Source for all the software in the product that is covered by this License, on a durable physical medium customarily used for software interchange, for a price no more than your reasonable cost of physically performing this conveying of source, or (2) access to copy the Corresponding Source from a network server at no charge. c) Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source. This alternative is allowed only occasionally and noncommercially, and only if you received the object code with such an offer, in accord with subsection 6b.

194

d) Convey the object code by offering access from a designated place (gratis or for a charge), and offer equivalent access to the Corresponding Source in the same way through the same place at no further charge. You need not require recipients to copy the

Corresponding Source along with the object code. If the place to copy the object code is a network server, the Corresponding Source may be on a different server (operated by you or a third party) that supports equivalent copying facilities, provided you maintain clear directions next to the object code saying where to find the Corresponding Source.

Regardless of what server hosts the Corresponding Source, you remain obligated to ensure that it is available for as long as needed to satisfy these requirements. e) Convey the object code using peer-to-peer transmission, provided you inform other peers where the object code and Corresponding Source of the work are being offered to the general public at no charge under subsection 6d.

A separable portion of the object code, whose source code is excluded from the

Corresponding Source as a System Library, need not be included in conveying the object code work.

A “User Product” is either (1) a “consumer product”, which means any tangible personal property which is normally used for personal, family, or household purposes, or (2) anything designed or sold for incorporation into a dwelling. In determining whether a product is a consumer product, doubtful cases shall be resolved in favor of coverage. For a particular product received by a particular user, “normally used” refers to a typical or common use of that class of product, regardless of the status of the particular user or of the way in which the particular user actually uses, or expects or is expected to use, the product. A product is a consumer product regardless of whether the product has substantial commercial, industrial or non-consumer uses, unless such uses represent the only significant mode of use of the product.

“Installation Information” for a User Product means any methods, procedures, authorization keys, or other information required to install and execute modified versions of a covered work in that User Product from a modified version of its Corresponding Source. The information must suffice to ensure that the continued functioning of the modified object code is in no case prevented or interfered with solely because modification has been made.

If you convey an object code work under this section in, or with, or specifically for use in, a

User Product, and the conveying occurs as part of a transaction in which the right of possession and use of the User Product is transferred to the recipient in perpetuity or for a fixed term (regardless of how the transaction is characterized), the Corresponding Source conveyed under this section must be accompanied by the Installation Information. But this

195

requirement does not apply if neither you nor any third party retains the ability to install modified object code on the User Product (for example, the work has been installed in ROM).

The requirement to provide Installation Information does not include a requirement to continue to provide support service, warranty, or updates for a work that has been modified or installed by the recipient, or for the User Product in which it has been modified or installed.

Access to a network may be denied when the modification itself materially and adversely affects the operation of the network or violates the rules and protocols for communication across the network.

Corresponding Source conveyed, and Installation Information provided, in accord with this section must be in a format that is publicly documented (and with an implementation available to the public in source code form), and must require no special password or key for unpacking, reading or copying.

7. Additional Terms.

“Additional permissions” are terms that supplement the terms of this License by making exceptions from one or more of its conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law. If additional permissions apply only to part of the

Program, that part may be used separately under those permissions, but the entire Program remains governed by this License without regard to the additional permissions.

When you convey a copy of a covered work, you may at your option remove any additional permissions from that copy, or from any part of it. (Additional permissions may be written to require their own removal in certain cases when you modify the work.) You may place additional permissions on material, added by you to a covered work, for which you have or can give appropriate copyright permission.

Notwithstanding any other provision of this License, for material you add to a covered work, you may (if authorized by the copyright holders of that material) supplement the terms of this

License with terms: a) Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License; or b) Requiring preservation of specified reasonable legal notices or author attributions in that material or in the Appropriate Legal Notices displayed by works containing it; or

196

c) Prohibiting misrepresentation of the origin of that material, or requiring that modified versions of such material be marked in reasonable ways as different from the original version; or d) Limiting the use for publicity purposes of names of licensors or authors of the material; or e) Declining to grant rights under trademark law for use of some trade names, trademarks, or service marks; or f) Requiring indemnification of licensors and authors of that material by anyone who conveys the material (or modified versions of it) with contractual assumptions of liability to the recipient, for any liability that these contractual assumptions directly impose on those licensors and authors.

All other non-permissive additional terms are considered “further restrictions” within the meaning of section 10. If the Program as you received it, or any part of it, contains a notice stating that it is governed by this License along with a term that is a further restriction, you may remove that term. If a license document contains a further restriction but permits relicensing or conveying under this License, you may add to a covered work material governed by the terms of that license document, provided that the further restriction does not survive such relicensing or conveying.

If you add terms to a covered work in accord with this section, you must place, in the relevant source files, a statement of the additional terms that apply to those files, or a notice indicating where to find the applicable terms.

Additional terms, permissive or non-permissive, may be stated in the form of a separately written license, or stated as exceptions; the above requirements apply either way.

8. Termination.

You may not propagate or modify a covered work except as expressly provided under this

License. Any attempt otherwise to propagate or modify it is void, and will automatically terminate your rights under this License (including any patent licenses granted under the third paragraph of section 11).

However, if you cease all violation of this License, then your license from a particular copyright holder is reinstated (a) provisionally, unless and until the copyright holder explicitly and finally terminates your license, and (b) permanently, if the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation.

197

Moreover, your license from a particular copyright holder is reinstated permanently if the copyright holder notifies you of the violation by some reasonable means, this is the first time you have received notice of violation of this License (for any work) from that copyright holder, and you cure the violation prior to 30 days after your receipt of the notice.

Termination of your rights under this section does not terminate the licenses of parties who have received copies or rights from you under this License. If your rights have been terminated and not permanently reinstated, you do not qualify to receive new licenses for the same material under section 10.

9. Acceptance Not Required for Having Copies.

You are not required to accept this License in order to receive or run a copy of the Program.

Ancillary propagation of a covered work occurring solely as a consequence of using peer-topeer transmission to receive a copy likewise does not require acceptance. However, nothing other than this License grants you permission to propagate or modify any covered work.

These actions infringe copyright if you do not accept this License. Therefore, by modifying or propagating a covered work, you indicate your acceptance of this License to do so.

10. Automatic Licensing of Downstream Recipients.

Each time you convey a covered work, the recipient automatically receives a license from the original licensors, to run, modify and propagate that work, subject to this License. You are not responsible for enforcing compliance by third parties with this License.

An “entity transaction” is a transaction transferring control of an organization, or substantially all assets of one, or subdividing an organization, or merging organizations. If propagation of a covered work results from an entity transaction, each party to that transaction who receives a copy of the work also receives whatever licenses to the work the party's predecessor in interest had or could give under the previous paragraph, plus a right to possession of the Corresponding Source of the work from the predecessor in interest, if the predecessor has it or can get it with reasonable efforts.

You may not impose any further restrictions on the exercise of the rights granted or affirmed under this License. For example, you may not impose a license fee, royalty, or other charge for exercise of rights granted under this License, and you may not initiate litigation (including a cross-claim or counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or any portion of it.

198

11. Patents.

A “contributor” is a copyright holder who authorizes use under this License of the Program or a work on which the Program is based. The work thus licensed is called the contributor's

“contributor version”.

A contributor's “essential patent claims” are all patent claims owned or controlled by the contributor, whether already acquired or hereafter acquired, that would be infringed by some manner, permitted by this License, of making, using, or selling its contributor version, but do not include claims that would be infringed only as a consequence of further modification of the contributor version. For purposes of this definition, “control” includes the right to grant patent sublicenses in a manner consistent with the requirements of this License.

Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributor's essential patent claims, to make, use, sell, offer for sale, import and otherwise run, modify and propagate the contents of its contributor version.

In the following three paragraphs, a “patent license” is any express agreement or commitment, however denominated, not to enforce a patent (such as an express permission to practice a patent or covenant not to sue for patent infringement). To “grant” such a patent license to a party means to make such an agreement or commitment not to enforce a patent against the party.

If you convey a covered work, knowingly relying on a patent license, and the Corresponding

Source of the work is not available for anyone to copy, free of charge and under the terms of this License, through a publicly available network server or other readily accessible means, then you must either (1) cause the Corresponding Source to be so available, or (2) arrange to deprive yourself of the benefit of the patent license for this particular work, or (3) arrange, in a manner consistent with the requirements of this License, to extend the patent license to downstream recipients. “Knowingly relying” means you have actual knowledge that, but for the patent license, your conveying the covered work in a country, or your recipient's use of the covered work in a country, would infringe one or more identifiable patents in that country that you have reason to believe are valid.

If, pursuant to or in connection with a single transaction or arrangement, you convey, or propagate by procuring conveyance of, a covered work, and grant a patent license to some of the parties receiving the covered work authorizing them to use, propagate, modify or convey a specific copy of the covered work, then the patent license you grant is automatically extended to all recipients of the covered work and works based on it.

199

A patent license is “discriminatory” if it does not include within the scope of its coverage, prohibits the exercise of, or is conditioned on the non-exercise of one or more of the rights that are specifically granted under this License. You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software, under which you make payment to the third party based on the extent of your activity of conveying the work, and under which the third party grants, to any of the parties who would receive the covered work from you, a discriminatory patent license (a) in connection with copies of the covered work conveyed by you (or copies made from those copies), or (b) primarily for and in connection with specific products or compilations that contain the covered work, unless you entered into that arrangement, or that patent license was granted, prior to 28 March 2007.

Nothing in this License shall be construed as excluding or limiting any implied license or other defenses to infringement that may otherwise be available to you under applicable patent law.

12. No Surrender of Others' Freedom.

If conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this

License. If you cannot convey a covered work so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not convey it at all. For example, if you agree to terms that obligate you to collect a royalty for further conveying from those to whom you convey the Program, the only way you could satisfy both those terms and this License would be to refrain entirely from conveying the Program.

13. Use with the GNU Affero General Public License.

Notwithstanding any other provision of this License, you have permission to link or combine any covered work with a work licensed under version 3 of the GNU Affero General Public

License into a single combined work, and to convey the resulting work. The terms of this

License will continue to apply to the part which is the covered work, but the special requirements of the GNU Affero General Public License, section 13, concerning interaction through a network will apply to the combination as such.

14. Revised Versions of this License.

200

The Free Software Foundation may publish revised and/or new versions of the GNU General

Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.

Each version is given a distinguishing version number. If the Program specifies that a certain numbered version of the GNU General Public License “or any later version” applies to it, you have the option of following the terms and conditions either of that numbered version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of the GNU General Public License, you may choose any version ever published by the Free Software Foundation.

If the Program specifies that a proxy can decide which future versions of the GNU General

Public License can be used, that proxy's public statement of acceptance of a version permanently authorizes you to choose that version for the Program.

Later license versions may give you additional or different permissions. However, no additional obligations are imposed on any author or copyright holder as a result of your choosing to follow a later version.

15. Disclaimer of Warranty.

THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY

APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE

COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS

IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,

INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF

MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE

RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH

YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF

ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

16. Limitation of Liability.

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN

WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO

MODIFIES AND/OR CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE

LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL,

INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR

201

INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF

DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY

YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH

ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN

ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

17. Interpretation of Sections 15 and 16.

If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to their terms, reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in connection with the Program, unless a warranty or assumption of liability accompanies a copy of the Program in return for a fee.

END OF TERMS AND CONDITIONS

How to Apply These Terms to Your New

Programs

If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms.

To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively state the exclusion of warranty; and each file should have at least the “copyright” line and a pointer to where the full notice is found.

<one line to give the program's name and a brief idea of what it does.>

Copyright (C) <year> <name of author>

This program is free software: you can redistribute it and/or modify

it under the terms of the GNU General Public License as published by

the Free Software Foundation, either version 3 of the License, or

(at your option) any later version.

This program is distributed in the hope that it will be useful,

but WITHOUT ANY WARRANTY; without even the implied warranty of

MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the

202

GNU General Public License for more details.

You should have received a copy of the GNU General Public License

along with this program. If not, see <http://www.gnu.org/licenses/>.

Also add information on how to contact you by electronic and paper mail.

If the program does terminal interaction, make it output a short notice like this when it starts in an interactive mode:

<program> Copyright (C) <year> <name of author>

This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.

This is free software, and you are welcome to redistribute it

under certain conditions; type `show c' for details.

The hypothetical commands `show w' and `show c' should show the appropriate parts of the

General Public License. Of course, your program's commands might be different; for a GUI interface, you would use an “about box”.

You should also get your employer (if you work as a programmer) or school, if any, to sign a

“copyright disclaimer” for the program, if necessary. For more information on this, and how to apply and follow the GNU GPL, see <http://www.gnu.org/licenses/>.

The GNU General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Lesser General Public License instead of this License. But first, please read

<http://www.gnu.org/philosophy/why-not-lgpl.html>.

203

advertisement

Was this manual useful for you? Yes No
Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Related manuals

Download PDF

advertisement

Table of contents