System management installation menu
With version
16.0, this menu is merged with the other settings menu and includes
several new options.
We advice all users to read it again.
Table of contents:
Set Clock from internet time server (NTP
client)
With version 15.1 and above, you can use domain
name
for NTP server instead of their public IP address.
Note: The NTP
client will
fail to start if no Internet access is available
Time Zone
With version 15.3, time is adjusted
automatically for daylight saving.
Important:
After upgrading the
firmware, the selected time zone is overwritten if you use an old time
zone (vers.<15.3) the new
selected time zone is UTC by default when you reboot the NAS. To
restore the right time zone you need to select a new time zone.
NTP server
II - Firmware Interface Settings
Languages
Only English, German, Dutch and
French dictionaries are updated.
For all other languages no update is
made, as result
when using these languages, parts of the menus will stay in English
Since version 16.0 and later you can edit language files (but not create a new language). More detail on our board: Firmware support language: Member contributions
Administrator
The administrator password setting concerns the
password to open the web interface as user "admin-nas"
(so not for any other access).
With version 16.0, the password encryption is stronger. To get it you
must enter again your current password.
Enable/disable
display passwords users
This option allow you to disable displaying the passwords of users in the menus.
In this section , you can change the colors used by the firmware for the administrator console and user console. For each console, you can select a color for :
The main title (NAS name)
The background of the vertical and horizontal menus
The text of menus
Color used when the mouse is over a menu
The background of the selected menu
The text of the selected menu
After selecting your colors, click on "Save the console colors" to save the colors of the current selected console. When you change the administrator console, you must refresh the window to apply the modifications.
You can restore the default colors of the current selected console by clicking on "Restore the default colors"
Web Server Settings: Memory Level used
Feature not available for small NAS (SPD8020,
NWSP1,...).
Allocate more memory, improves performance of the web server what can
be
interesting if you enable Web-Explorer.
Note: High level can
only be selected if the NAS has enough memory (NWSP2, 5Big
x,...)
Feature not available for small NAS (SPD8020, NWSP1,...). Allocate more memory, improves performance of the web server what can be interesting if you enable Web-Explorer.
Web
Server Settings: TLS/SSL protocol
(HTTPS)
New features implemented in version 11.0 fvdw-sl :
- Enable or disable the web server with SSL (HTTPS)
- Choose the HTTPS port. if
you don't chose the
default port (443), url
having to be used is then :
https://My-NAS-Domain-NameWeb:httpsport)
- Edit the Web server's TLS/SSL certificate
- Download the Certificate Authority (to import in client
side)
When you enable SSL, you can access the web
interface
with the url
"https://My-NAS-Domain-NameWeb"
where "My-NAS-Domain-NameWeb"
is the name
entered in the certificate.
This access is only useful with a remote
Internet
connection because it encrypts the data transmitted (also the login
authentication). It slows down the speed of transfers (time required
for data
encryption)
So the
"https://My-NAS-Domain-NameWeb" must logically be the domain name
that you use with DDNS.
For use only within the local network (LAN),
the
"My-NAS-Domain-NameWeb"
must be the name of
the NAS, and the url to use
is: https://YOUR_NAS_NAME.
(Of course, you can still use the standard url
http://Your_NAS_NAME without encryption)
If you have enabled DDNS in the menu "LAN
Setup", it is the domain name entered in this service, which will be proposed when you create
the certificate.
Notes:
To obtain the certificate authority that
validates the
certificate of the web server, click on the button "Download the
Certificate Authority".
It allows you to remove warnings by installing it in your browser.
This certificate must also be sent
to the other users
that you authorize to have access to the NAS server (useful for future
applications)
Notes:
Redirect some servers via a proxy
This feature allows you to enable a proxy gateway for several servers and to access to their interface with the port 80 (http) or 433 (https) via a special url :
The related servers are :
BTSync, url to access the web-interface : http(s)://your-public-ip/bt-sync or http(s)://your-DDNS/bt-sync
webcam, url to access the web-interface : http(s)://your-public-ip/cntrlwebcam or http(s)://your-DDNS/cntrlwebcam and for the webcam streaming http(s)://your-public-ip/mywebcam or http(s)://your-DDNS/mywebcam
Transmission client, url to access the web-interface : http(s)://your-public-ip/transmissioncli or http(s)://your-DDNS/transmissioncli
MlDonkey, url to access the web-interface : http(s)://your-public-ip/ml-donkey or http(s)://your-DDNS/ml-donkey
NzbGet, url to access the web-interface : http(s)://your-public-ip/nzb-get or http(s)://your-DDNS/nzb-get
Twonkymedia(*), url to access the web-interface : http(s)://your-public-ip/twonky-media or http(s)://your-DDNS/twonky-media
Firefly, url to access the web-interface : http(s)://your-public-ip/firefly or http(s)://your-DDNS/firefly
Logitech(*), url to access the web-interface : http(s)://your-public-ip/slimserver or http(s)://your-DDNS/slimserver
Mediatomb and you use, url to access the web-interface : http(s)://your-public-ip/media-tomb or http(s)://your-DDNS/media-tomb
And if you have installed plex media server or pyload, their url is :
PLEX, url to access the web-interface : http(s)://your-public-ip/plex or http(s)://your-DDNS/plex
pyload, url to access the web-interface : http(s)://your-public-ip/.pyload or http(s)://your-DDNS/.pyload
(*) With these media server, you need to install again the last version (it is a patched version for working with this feature)
Safety Warning : NEVER enable this option without changing the default credential of the servers. Needless to explain why...
If you have several NAS with fvdw-sl
firmware, you can also redirect their interface.
When you enter a nas names list, use these url to access the nas
web-interface :
http(s)://your-public-ip/nasname1
or http(s)://your-DDNS/nasname1;
http(s)://your-public-ip/nasname2
or http(s)://your-DDNS/nasname2;
...
Note: you must upgrade all your nas with version 16.0
The AFP server must be started only if you have some Mac hosts.
If you enable the option "Stop samba server", samba will be stopped when you start the AFP server and be restarted when you stop it.
Note: Never select this option if you use also Windows/Linux OS (all shares will be no longer available)
This feature can be used only if the NAS has several internal disks (nwspmax; 2bigx or 5bigx NAS) and several volumes are available. With rpsb2 nas, you can also select an USB disk.
With this option, you can select what volume will be used to create the technical shares. No nas rebooting is required after selecting a new volume.
If you enable the option 'Move the technical shares on the new volume', the script lists what features are installed and are running. After changing the add-ons volume, it restarts all features previously running.
After selecting a new volume, read the log to search any reported error. If you restart the NAS, the log file is no longer available!
So if the move is interrupted and/or incomplete, you can use the move feature (share menus) to move manually the missing technical shares (in this case, the feature is available for the technical shares) and/or use directly shell command.
With version 16.0, the technical shares are: fvdw; cronjobs; tr-daemon; tr-downloads; tf-downloads; minidlna; twonkymedia; mt-daapd; mp3; tflux; oxylbox; mediatomb; motion-webcam; btsync; mldonkey; nzbget; owncloud; netatalk; plex-prog.
With version 16.1, as fvdw share must be present in all case on the addons volume, so if you don't have yet created it or you do not select the option 'Move the technical shares on the new volume', a fvdw share will be created on the new addons volume and an existing fvdw shares is renamed (fvdw-old).
Note: Only if you don't have enough free space on the new add-ons volume may make errors. So check this point before changing the current add-ons volume!
Switch power LED On/Off
Since version 16.0, a better LED management is available from the web interface.
With all NAS type you should be able to switch on/off the blue LED and for 5/2 big2 the LED brightness.
Notes:
- For 5/2 big1 you can not switch off the blue LED of the sata disks.
- If a raid volume is not clean, you can not switch off the red led
LED behavior with a raid volume:
if a raid volume is clean and all partitions are working, then the LED have the standard behaviour (blue LED on).
if a raid volume is degraded: at least one partition state is not 'in_sync (for example when raid is building or recoring; or when a disk state is faulty; ...) then:
- The front LED is blinking alternatively blue and red, at every 2s (────────)
- The sata LED of the raid volume are also blinking (────────) but if a disk state is faulty, its red sata LED is on (────────)
Check for new firmware
If automatic check is enabled and you don't have the last version, an alert is displayed in the main Information menu.
Root Certificate
Authority
By default several linux commands require to be able to check validity
of
a certificate before making secure connections to a server over the
Internet, for example with an https url. You have this behaviour with
curl, wget or openssl. Before version 16.1 you had need to use a flag
to disable this check and so it was an unsecure way.
To validate the certificate, you need to have a root certificate
autorities updated list. With this feature you can update it at any
time. You need to update it if you fail to make a secure
connection. If after updating, you still fail to make a
secure
connection, that means that the remote server uses an unvalid
certificate. Then you should ask you if you have to force or
not
the connection...
Advanced feature: you can add some custom root certificate authorities, by adding their public key in the file (/rw_fs/etc/ssl/owncert.pem). After updating this file, you need to get again the rootcertificate autorities list to include your custom root certificate. owncert.pem file uses the PEM format (Base64 encoded ASCII and contain "-----BEGIN CERTIFICATE-----" and "-----END CERTIFICATE-----" statements).
Note: We included the certificate "CA_FVDWSL" in this authorities list so that any url provided by your https server or from another NAS with FVDW-SL firmware, may be automaticaly validated
This can be useful in case database got corrupt for instance because of a power
failure when the NAS was writing to the database or when you did something
stupid and want to restore the database.
If a copy is present the restore button will overwrite the database with this
copy and initiate a reboot.
Only use it when you have no other possibility, we can not guarantee that when
the last database was much different from the copy if the NAS will come up
without problems.
Remark.
Only save your database when you are sure the NAS is working normally