Webdav file sharing iomega




















To power off the Iomega StorCenter ix, press but do not hold down the power button. It is not recommended to hold down the power button to shut down the Iomega StorCenter ix This may result in data loss. Security Lock: Connect a security cable to prevent theft. This allows you to regain access if network settings are incorrect or you've forgotten your password. High-Speed USB 2. Power Connector: Plug the power cord into this connector.

If you have purchased more than one Iomega StorCenter ix, complete all steps on one device before setting up additional devices. Use the included network cable to connect the device to a network hub, switch or directly to a computer. Your Iomega StorCenter ix should power on automatically. Start your computer, wait for the operating system to load, and then insert the CD. For best results, use a computer that is connected to the same router, hub, or switch as the device.

If the software doesn't run automatically, double click on the CD icon, then double-click the Start icon. Install the Iomega Storage Manager software. The Iomega Storage Manager will automatically scan your network and connect to available Shares. If you receive a message from your operating system's firewall alerting you of network activity, be sure to unblock communications. Certain other product names, brand names, and company names may be trademarks or designations of their respective owners.

The computer equipment described in this manual generates and uses radio frequency RF energy. If the equipment is not installed and operated in strict accordance with the manufacturer's instructions, interference to radio and television reception might result.

Operation is subject to the following conditions: 1 This device may not cause harmful interference, and 2 this device must accept any interference received, including interference that may cause undesired operation. Part 15, Class B, of the FCC Rules, is designed to provide reasonable protection against radio and television interference in a residential installation.

Although the equipment has been tested and found to comply with the allowed RF emission limits, as specified in the above cited Rules, there is no guarantee that interference will not occur in a particular installation. Interference can be determined by turning the equipment off and on while monitoring radio or television reception.

The user may be able to eliminate any interference by implementing one or more of the following measures:. Plug the computer and its peripherals into a different branch circuit from that used by the affected device. Changes or modifications to the electronics or enclosure of this product must be expressly approved by Iomega; otherwise, the user's authority to operate this product might be voided by the FCC.

Importer's Name: Iomega International, S. Type of Equipment: Information Technology Equipment. Instead, it is the user's responsibility to dispose of this product by returning it to a collection point designated for the recycling of electrical and electronic equipment waste.

Separate collection of this waste helps to optimize the recovery and recycling of any reclaimable materials and also reduces the impact on human health and the environment. For more information concerning the correct disposal of this product, please contact your local authority or the retailer where this product was purchased.

Follow all instructions marked on the Iomega StorCenter ix and in the documentation. Always use the appropriate power supply plug clip for your country. Do not use the Iomega StorCenter ix near water.

Do not spill liquid on or into the Iomega StorCenter ix Do not place the Iomega StorCenter ix on an unstable surface. Do not walk on the power cord or allow anything to rest on it. Openings in the device are provided for fans and air ventilation and should not be blocked or covered. Make sure the device has ample ventilation at least 6 inches or mm in front and behind the unit.

Do not place the device near or on a radiator or heat register. Under any of the following conditions, unplug the device from the wall outlet and contact technical support: The power cord or plug is damaged. Liquid has been spilled into the device. The device does not function properly when the operating instructions are followed.

The device was dropped or the exterior enclosure is damaged. If you encounter a problem while connecting or using your Iomega StorCenter ix, check the topics listed below for possible solutions. If you have properly set port forwarding on your router and remote access still does not work, you may have multiple routers on your network.

One of the easiest ways to identify this issue is to log in to the router to which the Iomega StorCenter ix is connected. There are several options for resolving double NAT situations. The sections below will explore the pros and cons of each resolution:. These instructions will refer to the router that is connected directly to the internet as the Primary Router. The cascaded router or router to which your Iomega StorCenter ix is connected will be referred to as the Secondary Router.

This is the easiest way to configure your network to handle double NAT situations; however, it is dependent on your primary router having DMZ functionality. Log in to the primary router. Refer to the documentation that came with your router for information on where this feature is found.

Enter the secondary router's IP address. Your secondary router is no longer behind your primary router's firewall. If port forwarding is correctly configured, remote access should now be working properly.

Moving your secondary router into the DMZ should not have any effect on the security of the network, since it is still protected by the secondary router's firewall.

If for some reason the network configuration cannot be changed and your setup requires the double NAT, you must perform the port forwarding steps twice. On the primary router, set the port forwarding to the cascaded router's external IP address. The secondary should be changed to bridging mode. Make sure the secondary router connects to the primary router using a standard port rather than the port labeled Uplink or internet. This will basically turn your secondary router into a switch; however, you can still enable its Wireless Access Point if equipped.

Refer to the documentation that came with your router for configuration information and settings. If none of the above options are available, you will need to enable transparent bridging on your primary router. Once this first firewall in the modem is disabled, the secondary router will handle all the network traffic, Port Forwarding, and allow Remote Access to work. You should not attempt bridging without help from the ISP.

If bridge mode is attempted by the customer and not configured properly it can render the customer's internet connection inoperable. Primary router bridging may also require special configuration information and settings on the secondary router. This is a very simple way to configure the Iomega StorCenter ix but can cause problems with your router's port forwarding settings. The router does not dynamically update port forwarding settings and cannot port forward to your Iomega StorCenter ix if its IP address changes.

Increase the length of the DHCP lease: Your router will attempt to remember all DHCP clients and give them the same IP address every time they request an IP address; however, the router will forget clients if they do not request an IP address for a certain amount of time.

Your router will have a. If your network requires DHCP, this may be a good solution; however, it is not always guaranteed to work. You may need to occasionally update your router's port forwarding settings. This ensures that the Iomega StorCenter ix will always get the same IP address and your port forwarding settings will always be correct. See the manual that came with your router for more information on configuring DHCP settings.

Log in to your router and write down the DHCP range it is using. For more information, check the Network Settings section of this manual. For example, if your router is distributing IP addresses in the range of Make sure you are assigning the Iomega StorCenter ix an IP address that is not in use by another device.

Enter a subnet mask. The subnet mask describes the size of your network. For most networks this will be Enter a gateway address. In most cases, this will be the IP address of your router. Iomega warrants this hardware product to be free from defects in materials and workmanship for the warranty period.

This non-transferable, limited warranty is only to you, the first end-user purchaser. The warranty begins on the date of purchase and lasts for a period of one 1 year for products purchased in the Americas, the Asia-Pacific region, or non-European Union nations in Europe, the Middle East, or Africa; ninety 90 days for Iomega reconditioned products purchased in these regions; or, two 2 years for products purchased by an end-user in member nations of the European Union.

Customers who register their new products at www. Reconditioned products are not eligible for a warranty extension. This warranty does not apply to: a Iomega software products; b expendable components such as fuses or bulbs; or c third-party products, hardware or software, supplied with the warranted product.

Iomega makes no warranty of any kind on such products which, if included, are provided "AS IS. Your sole and exclusive remedy for a covered defect is repair or replacement of the defective product, at Iomega's sole option and expense shipping may be charged , and Iomega may use new or refurbished parts or products to do so.

If Iomega is unable to repair or replace a defective product, your alternate exclusive remedy shall be a refund of the original purchase price. The above is Iomega's entire obligation to you under this warranty. In no event shall Iomega's liability exceed the original purchase price of the drive or the media disk. Some jurisdictions do not allow the exclusion or limitation of incidental or consequential damages, so the above limitation or exclusion may not apply to you.

You must notify Iomega within the warranty period to receive warranty service. Just as technology and market conditions vary, Iomega's specific customer support policies including fees for services and procedures change over time.

To obtain information about Iomega's current policies or warranty service, please visit our website at www. Contact information for Iomega Customer Service can be obtained on our support website at:. If your product is eligible for warranty service, you will be required to return it to Iomega, along with proper identification, a return authorization number obtained from the Iomega website or provided by the Iomega representative, and proof of purchase. Iomega will not protect, recover, or return data during warranty service so you should duplicate your data before shipment.

Any implied warranty required by applicable law shall be limited in duration to the express warranty term. Some jurisdictions do not allow disclaimers of implied warranties or limitations on how long an implied warranty lasts, so the above limitation may not apply to you.

This warranty gives you specific legal rights, and you may also have other rights that vary from jurisdiction to jurisdiction. Any suit for breach of any warranty on your product must be filed within one 1 year of the first date the suit could have been brought.

Getting started is quick and easy with the Iomega StorCenter ix Before you can use your Iomega StorCenter ix, you must connect all the cables and turn it on. Once you have connected the hardware, you can install the optional Iomega Storage Manager Software and begin using your Iomega StorCenter ix It provides access to Shares through your computer's file management program, such as Windows Explorer or Mac Finder, allowing you to drag and drop many files between your computer and the Iomega StorCenter ix Installing the Iomega Storage Manager is optional.

If you are using Remote Access, the Home page is the landing page to access your device. You can access the Home page of your Iomega StorCenter ix by entering the device name or IP address directly in your browser. Identifies an urgent problem with your ixd that may result in data loss and. You can set the date and time used on your ixd, so that it can appear to be in one time zone, when it actually may be in a different one.

This can help your users have the correct date and time if they live and work in a location different from your ixd. You can set the date, time, and time zone through the Date and Time feature. When an Active Directory Domain is in use, the storage device synchronizes time with the domain controller. To change time zones, select a Time Zone from the drop-down menu, and then select how time will be set for the ixd:. To specify a time server, select Specify the time server and type the URL of the internet time server you wish to use in the text box that displays.

To set the current date and time, click the appropriate icon for calendar and clock settings. The Languages page allows you to change the language used in email notification messages and on the display screen.

The language used by the ixd Management Console is based on the preferences configured in your browser. You can change the language used in this program by modifying your browser's preferred language settings. Printing documents from your ixd Network Storage is simple after you have attached a compatible printer to the ixd.

The Printers page displays a table of printers that are attached to the ixd. The table contains for each printer the name, model, status, and number of documents waiting. Once attached, the printer will appear in the table. When the cable is unplugged, the printer will be removed from the table. For best results, use a printer without multi-function features for example, scanner, copier, fax, modem. After you have configured some basic features of your ixd Network Storage, you may also want to set up a LenovoEMC Personal Cloud, security, or file sharing.

You can set up a Personal Cloud to allow invited users access to content on your ixd. This content can be in private Shares that are exclusive to the users who join the Personal Cloud, which adds an additional layer of security. In addition, you may want to join other trusted devices to the Personal Cloud, so that content on those devices can be made available to Personal Cloud users. For more information about Personal Cloud, refer to the Personal Cloud overview.

You can enable security so you can secure Shares, create users, and allow selected features to be enabled. With security enabled, you can create users and set access privileges for those users to limit data access on secured Shares. It is recommended to set up file sharing so that content can be added to your ixd, and that content can be made available in a wide variety of ways, including content features such as Active Folders and media sharing.

For more information, refer to the Sharing Overview. Your ixd Network Storage is set up for storing, retrieving, and accessing files among users, client computers, and applications.

File sharing is accomplished by creating Shares; setting up security, which includes creating users; setting up media services; and configuring Active Folders.

Optionally installed on your local computer, LenovoEMC Storage Manager discovers any LifeLine-based network storage devices on your subnet, maps device Shares to computers, and provides local access to your content. It provides access to Shares through your computer's file management program, such as Windows Explorer or Mac Finder, allowing you to drag and drop many files between your computer and your ixd device. The Home page serves as a web-accessible interface to your ixd device.

The Home page content is configured using the ixd Management Console. The Home page displays any unsecured Shares. It can also display secured Shares accessible only to users who log in to the ixd device. You can access the Home page of your ixd device by entering the device.

If security is enabled and you are an administrator user, you can access the ixd Management Console from the Home page by clicking. Shares are folders that contain all types of content, including documents, pictures, and music files. Shares can be unsecured, which means that anyone who has access to your network can access the content in these Shares. Shares can also be secured, which means access to content in them is limited to select users and groups. All Shares on the ixd are displayed on the Shares page.

The Shares page displays a table that contains folders, connected drives, and any cloud storage to which your ixd is connected. The Properties column displays the features that are enabled for each Share.

The Information section displays the Share name, graphically displays the space usage of the Share, and allows you to view the content using the web-based content viewer. To learn how to modify your Share information, refer to Managing Shares on next page.

The Access Permissions section contains a list of users who currently have access to that Share. Access Permissions displays when the ixd is secured , otherwise the section is not shown. If "Everyone" has access to a Share, it means content on the Share can be viewed by anyone with access to your network without needing to log into the ixd. Follow the link to the Active Folder options for information on configuring each:.

From the ixd Management Console, click Shares. To add a new Share, click Add a Share. Type a name for the Share. All Shares must have a name. Names cannot exceed 32 characters. The following are not valid Share names: global, homes, printers. Click Create. To modify an existing Share, click the Share row to expand the Share. You can change Share information, change access permissions, make a Share an Active Folder, use Share volumes, and modify a Share volume.

Modify the existing name for the Share. Choose whether to enable media sharing. When Media sharing is enabled, the media server scans this Share for any media content and makes it available to anyone with access to your network,.

If you do not want media content made available to anyone, do not check this option. When Media sharing search is enabled, displays in the Properties for that Share. You should enable security on your ixd before changing access permissions. Expand Access Permissions to change user permissions to a Share.

If your ixd is not secured, all Shares that you create are unsecured, and anyone with access to your network has read and write permissions to a Share. If your ixd is secured, all existing administrator users have read and write permissions to a Share. New Shares created on a secured device will be. A security icon displays in the Share's properties if that Share is secured.

Check Allow users to change file level security to allow file and folder permissions to be set through other programs, such as Windows Explorer, independent of the ixd. Setting this option allows users to put additional access restrictions on individual files and folders. To limit access to this Share to a specific set of users, click Add access permissions and choose one or more users from the pop-up window.

In the Access Permissions section, check Read, Write, or both to set access to this Share for each user. To remove a user, leave both Read and Write unchecked for that user. If you grant Read and Write permissions to Everyone, the list of users is also cleared since all users will have access to this Share. To enable NFS , first click the switch on from the Protocols page. You cannot apply a rule to an unsecured Share.

Rules are added to specify the hosts that are allowed to access Shares using NFS. Use this table to add NFS rules to specify access for hosts.

When the rule is added, read access is automatically set to the Share. Select Write to allow users to write to that Share. Use and to modify the rule priority for NFS access.

You can optionally enable Active Folders on a Share to allow you to associate this Share with a specific feature that will happen automatically when files are copied to the Share. For example, you can enable a Share as a social media active folder to upload a file to a social media site. You can only set one Active Folder option per Share. Expand the Active Folder section and check Enable.

Select one of the following Active Folder options and follow the link for details on configuring each:. To delete an existing Share, click to expand the Share. In the Information section, click Delete to delete the Share. In the Delete Share confirmation pop-up window, click Yes.

If you do not wish to delete the Share, click Cancel to return to the Shares page. Your ixd Network Storage uses communication protocols to mount file systems and allow files to be transferred between client computers and the ixd. See Backing up Macs with Time Machine for detailed instructions. AFP is on by default. If AFP has been disabled, click the switch on to re-enable it.

Once a Bluetooth adapter is detected, files can be uploaded from a Bluetooth device to a configurable destination Share on the ixd. To enable Bluetooth, click the switch on. Once Bluetooth Transfer is enabled, check the Enable security checkbox to require Bluetooth users to supply a unique PIN that they have defined before allowing them to transfer files to the destination Share on the ixd.

If you have enabled security , you must define a unique PIN number, which will be supplied by devices attempting to upload data using Bluetooth. To set the destination Share, click.

To change any Bluetooth settings, click. You must enable security to apply SFTP. If you select and enable SFTP, you cannot have the secure rsync protocol enabled. This protocol allows remote hosts to mount file systems over a network and interact with them as though they were mounted locally to your ixd. Select an option to choose how users on client computers are mapped to the ixd:. All files are owned by user guest, and all users accessing the ixd have the same access rights.

If you have enabled Active Directory on your ixd, only this option is available for mapping client computers. If the ixd is using Active Directory mode, you see the following NFS version 4 security settings:.

NFS provides another protocol for sharing storage data with Linux hosts. When NFS is enabled, you can configure rules for host-based access to secure Shares. Rules can be added to secure Shares to specify the hosts that are allowed to access Shares using NFS.

To change any NFS settings, click. When you access your ixd through NFS, the access permissions to content on the ixd are controlled by Host-Based Access Control rules on your client computer, not by user access permissions on your ixd.

This means that any valid user on the Linux computer who has access to the host the storage device can access Shares on the ixd, even if not given specific user permission to those Shares on the device.

When you turn on this protocol, you can enable the ixd Network Storage as an rsync server. If you enable the ixd as an rsync server, you can optionally set up a user account on the ixd for secure rsync Copy Jobs. To enable rsync server, click the switch on. To create a secure user account, check Configure secure rsync credentials. The username is preset as rsync. You can change this to a more meaningful user account name. Enter a password and confirm it for the rsync user account name.

When you create a secure rsync user account on the ixd, you allow other devices to securely copy to or from it. By default, rsync uses TCP port for accepting requests. You can change this value to a different port number, if desired. To change any rsync server settings, click. You cannot enable rsync server if you have already enabled SFTP. When the SNMP protocol is enabled on a device, SNMP agent software on the device reports information to the managers, and an administrator user can perform some configuration of the ixd through the manager.

Information that comes from the ixd is called a trap. Managers and the ixd must be running on the same network. SNMP should be disabled unless you are specifically providing information to a management system that requires this information. To enable SNMP, click the switch on. Enter a unique username and password to define the community. Enter the IP address of the host in the Trap Receivers text box. To grant access to multiple receivers, list all of them in the text box, separating each entry with a space.

To change any SNMP settings, click. A ixd can provide various traps to a manager. These traps provide information on the current state of the ixd. The management information base MIB file is a database of various device object types, which a manager can change.

Best Linux Laptops. Best Wireless iPhone Earbuds. Best Bluetooth Trackers. Best eReaders. Best VPN. Browse All News Articles. Windows 11 Uninstall Clock. Teams Walkie-Talkie. PCI Express 6. Wordle Scams. T-Mobile iCloud Private Relay. Avira Antivirus Crypto Miner. Linux PinePhone Pro. Google Green Messages. Use Your iPhone as a Webcam. Hide Private Photos on iPhone. All Microsoft's PowerToys for Windows.

Take Screenshot by Tapping Back of iPhone. Windows 11 Default Browser. Browse All Windows Articles. Windows 10 Annual Updates. OneDrive Windows 7 and 8. Copy and Paste Between Android and Windows.



0コメント

  • 1000 / 1000