About This Guide........................................................................................................................................................3
About the QSW-M5216-1T.........................................................................................................................................4
Front Panel.............................................................................................................................................................5
Front Panel LEDs................................................................................................................................................... 6
Setting Up the Switch................................................................................................................................................ 8
Connecting the Switch to a Computer or Network................................................................................................8
Connecting the Switch to a Computer................................................................................................................9
Connecting the Switch to a Network.................................................................................................................. 9
About QSS.................................................................................................................................................................15
Parts of the User Interface..................................................................................................................................... 15
Conguring Port Settings....................................................................................................................................... 17
Adding a VLAN..........................................................................................................................................................17
Conguring a Link Aggregation Group.................................................................................................................18
Managing Rapid Spanning Tree Protocol (RSTP) Settings.................................................................................. 18
Conguring the RSTP Status..............................................................................................................................18
Conguring the LLDP Status.................................................................................................................................. 19
Adding a Static MAC Address................................................................................................................................. 20
Conguring CoS Priority for QoS...................................................................................................................... 22
Conguring DSCP Priority for QoS....................................................................................................................23
Deleting a Network Setting.................................................................................................................................... 23
System Settings........................................................................................................................................................25
Changing the Switch Name............................................................................................................................... 25
Conguring the Switch IP Information............................................................................................................ 25
Updating the Switch Password..........................................................................................................................26
Conguring Time Settings................................................................................................................................. 26
Backing Up System Settings.............................................................................................................................. 27
Restoring System Settings................................................................................................................................. 27
Resetting the Switch Password......................................................................................................................... 27
Resetting the Switch to Factory Settings..........................................................................................................28
Restarting the Switch..........................................................................................................................................28
Viewing the Switch Information........................................................................................................................29
Checking for Live Updates................................................................................................................................. 30
Updating the Firmware Manually..................................................................................................................... 31
GNU Public License..................................................................................................................................................35
CE Notice...................................................................................................................................................................43
EU Directive 2002/96/EC Waste Electronic and Electrical Equipment (WEEE)...................................................44
EU RoHS Statement................................................................................................................................................. 44
This guide provides information on the QNAP QSW-M5216-1T network switch and step-by-step instructions
on installing the hardware. It also provides instructions on basic operations and support information.
Audience
This document is intended for consumers and storage administrators. This guide assumes that the user has
a basic understanding of storage and backup concepts.
Document Conventions
SymbolDescription
Notes provide default conguration settings and other supplementary
information.
Important notes provide information on required conguration settings and
other critical information.
Tips provide recommendations or alternative methods of performing tasks or
conguring settings.
Warnings provide information that, when ignored, may result in potential loss,
injury, or even death.
Preface 3
Page 5
QSW-M5216-1T User Guide
2. Product Overview
This chapter provides basic information about the QNAP device.
About the QSW-M5216-1T
The QSW-M5216-1T is a Layer 2 web managed switch that features sixteen 25 GbE SFP28 ports and one
10GBASE-T port for high-speed data transfer. The compact form factor allows simple branch deployment
and allows you to manage switch operations using the QNAP Switch System (QSS).
Hardware Specications
Warning
If your QNAP product has hardware defects, return the product to QNAP or a QNAPauthorized service center for maintenance or replacement. Any attempt to repair or
perform maintenance procedures on the product by you or an unauthorized third party
invalidates the warranty.
QNAP is not responsible for any damage or data loss caused by unauthorized
modications and installation of unsupported third-party applications.
For details, see the QNAP Warranty Terms and Conditions.
Tip
Model specications are subject to change without prior notice. To see the latest
specications, go to https://www.qnap.com.
Ordering P/NCPUPower supply
QSW-M5216-1TMarvell ® ARMADA ® 88F6821Single
ComponentQSW-M5216-1T
Processor
CPUMarvell ® ARMADA ® 88F6821
FrequencyDual-core 2.0 GHz
ArchitectureARM 32-bit
Network
25 Gigabit network interface16 x 25 GbE SFP28
10 Gigabit network interface1 x 10GbE RJ45
Interface
ButtonsSwitch reset button
Dimensions
Form factorCompact
Dimensions (H x W x D)43.5 x 285 x 237.7 mm
(1.70 x 11.22 x 9.35 in)
Net weight2.15 kg (4.73 lbs)
Operating temperature0˚C to 40˚C (32˚F to 104˚F)
Relative humidity• Non-condensing relative humidity: 5% to 95%
• Wet-bulb temperature: 27˚C (80.6˚F)
Product Overview 4
Page 6
Package Contents
ItemQuantity
QSW-M5216-1T1
Power cord1
Screws for rackmount brackets6
Rackmount brackets2
Rubber feet4
Quick Installation Guide (QIG)1
Components
Front Panel
QSW-M5216-1T User Guide
No.ComponentNo.Component
1Switch status LED310GBASE-T port (RJ45)
225 Gigabit SFP28 ports--
1Switch status LED410GBASE-T link (left) LED
225 Gigabit SFP28 link (left) LED510GBASE-T link (right) LED
Product Overview 6
Page 8
No.ComponentNo.Component
325 Gigabit SFP28 link (right) LED--
QSW-M5216-1T User Guide
Product Overview 7
Page 9
3. Installation and Access
This chapter provides specic hardware installation and switch access steps.
Installation Requirements
CategoryItem
Environment• Room temperature: 0˚C to 40˚C (32˚F to 104˚F)
• Non-condensing relative humidity: 5% to 95%
• Wet-bulb temperature: 27˚C (80.6˚F)
• Flat, anti-static surface without exposure to direct sunlight, liquids,
or chemicals
• Free from objects that may obstruct the switch ventilation or apply
pressure to the switch or power cord.
Hardware and peripherals• Computer or NAS
QSW-M5216-1T User Guide
• Network cable
Tools• Phillips #1 or #2 screwdriver
• Flat head screwdriver
• Anti-static wrist strap
Setting Up the Switch
1. Place your switch in an environment that meets the requirements.
For details, see Installation Requirements.
2. Install the switch on a rack.
You can nd installation information in the rail kit package.
3. Power on the switch.
For details, see Rear Panel.
4. Connect the switch to a computer or network.
For details, see Connecting the Switch to a Computer or Network.
5. Log in to QSS.
Connecting the Switch to a Computer or Network
You can connect the QSW-M5216-1T can be connected to a computer or local area network. For details, see
the following topics:
• Connecting the Switch to a Computer
• Connecting the Switch to a Network
Installation and Access 8
Page 10
QSW-M5216-1T User Guide
Connecting the Switch to a Computer
Connecting the switch to a QNAP NAS allows you to expand storage capacity and backup data to another
NAS through network cable connections to a PoE or host port on the switch. However, you must connect the
switch to a computer to congure the settings.
1. Power on the switch.
2. Connect the switch to a computer.
a. Connect a network cable to the host port on the switch.
b. Connect the network cable to a Gigabit network port on the computer.
3. Verify that the computer recognizes the switch.
a. Open Qnder Pro on the host computer.
Note
To download Qnder Pro, go to https://www.qnap.com/utilities.
b. Locate the switch on the list.
Connecting the Switch to a Network
You can connect the switch to the local area network through the host port or a PoE port.
Installation and Access 9
Page 11
1. Power on the switch.
2. Connect the switch to your local area network using the host port.
3. Run Qnder Pro on a computer that is connected to the same local area network.
Note
To download Qnder Pro, go to https://www.qnap.com/utilities.
4. Locate the switch in the list and then double-click the name or IP address.
The QSS login screen appears.
5. Enter your QSS login information.
6. Click Log In.
Switch Access
MethodDescriptionRequirements
Web browserYou can access the switch using any
computer on the same network if you have
the following information:
• Computer that is connected
to the same network as the
switch
QSW-M5216-1T User Guide
• Switch name (Example: http://
example123/) or IP address
• Login credentials of a valid user account
For details, see Accessing the Switch Using a
Browser
Qnder ProQnder Pro is a desktop utility that enables
you to locate and access QNAP devices
on a specic network. The utility supports
Windows, macOS, Linux, and Chrome OS.
For details, see Accessing the Switch Using
Qnder Pro.
• Web browser
• Computer that is connected
to the same network as the
switch
• Web browser
• Qnder Pro
Accessing the Switch Using a Browser
You can access the switch using any computer on the network if you know its IP address and the login
credentials of a valid user account. QNAP switches support DHCP client conguration by default for IP
assignment. When connected to a network, the switch automatically obtains an IP address from a DHCP
server.
Note
• If you do not know the IP address of the switch, can locate it using Qnder Pro.
• If the switch is not connected to a DHCP supported network, you can access the switch
web interface by changing the IP address of the computer to 169.254.100.102.
• The default IP address of the switch is 169.254.100.101.
1. Verify that your computer is connected to the same network as the switch.
2. Open a web browser on your computer.
Installation and Access 10
Page 12
3. Type the IP address of the switch in the address bar.
The QSS login page appears.
4. Specify the default username and password.
Default UsernameDefault Password
admin
The MAC address of the switch image omitting any punctuation and
capitalizing any letters.
Tip
For example, if the MAC address is 00:0a:0b:0c:00:01, the
default password is 000A0B0C0001.
You can nd the MAC address using Qnder Pro. It is also
printed on a sticker on the device as "MAC".
Note
You are prompted to change the password after logging in
for the rst time.
QNAP strongly recommends changing the password after
rst time login for security reasons.
QSW-M5216-1T User Guide
5. Click Login.
The QSS desktop appears.
Important
After setting up the switch, ensure that you change the IP address of the computer to the
original conguration.
Accessing the Switch Using Qnder Pro
1. Install Qnder Pro on a computer that is connected to the same network as the switch.
Tip
To download Qnder Pro, go to https://www.qnap.com/en/utilities.
2. Open Qnder Pro.
Qnder Pro automatically searches for all QNAP devices on the network.
3. Locate the switch in the list, and then double-click the name or IP address.
The QSS login screen opens in the default web browser.
4. Specify the default username and password.
Default UsernameDefault Password
admin
The MAC address of the switch image omitting any punctuation and
capitalizing any letters.
5. Click Login.
Tip
For example, if the MAC address is 00:0a:0b:0c:00:01, the
default password is 000A0B0C0001.
You can nd the MAC address using Qnder Pro. It is also
printed on a sticker on the device as "MAC".
Installation and Access 11
Page 13
The QSS desktop appears.
QSW-M5216-1T User Guide
Installation and Access 12
Page 14
QSW-M5216-1T User Guide
4. Basic Operations
This chapter describes basic switch operations.
LEDs
LEDs indicate system status and related information when the switch is powered on. The following LED
information applies only when the switch is connected to the network.
For details on the location of the LEDs, see Front Panel LEDs.
LEDStatusDescription
System StatusGreenThe device is ready.
Flashes green• The device is being initialized.
• The rmware is being updated.
Note
When updating the rmware, do not remove
the power cord or USB cable, and do not
force-exit the application.
25 Gigabit
SFP28 link (left)
25 Gigabit
SFP28 link
(right)
10GBASE-T RJ45
link (left)
10GBASE-T RJ45
link (right)
• The device is being reset.
RedA fatal device error occurred.
OThe device is powered o.
GreenThe link speed is operating at 25 Gbps.
Flashes greenData is being transmitted.
OThere is no network connection.
OrangeThe link speed is operating at 10 or 1 Gbps.
Flashes orangeData is being transmitted.
OThere is no network connection.
GreenThe link speed is operating at 10 Gbps.
Flashes greenData is being transmitted.
OThere is no network connection.
OrangeThe link speed is operating at 5 Gbps, 2.5 Gbps, 1Gbps, or
100 Mbps.
Flashes orangeData is being transmitted.
OThere is no network connection.
Basic Operations 13
Page 15
QSW-M5216-1T User Guide
Reset Button
OperationUser ActionResult
Basic system resetPress and hold the button for 5 seconds.The following settings are reset to
default:
• System administrator password: The
default password is the rst MAC
address in uppercase letters without
special characters. For example, if
the rst MAC address is 00-08-9BF6-15-75, then the admin password
would be 00089BF61575.
Note
You can nd the rst MAC
address with Qnder Pro or
attached to a label on the
device listed as MAC1.
Advanced system
reset
• The admin account is automatically
enabled
Press and hold the button for 10 seconds. The default factory settings are restored.
Basic Operations 14
Page 16
5. QSS
About QSS
QSS is a centralized management tool for your managed QNAP switch devices.
Parts of the User Interface
The QSS user interface has three main areas.
QSW-M5216-1T User Guide
LabelAreaDescription
1MenuThe menu has two sections: Conguration and System
Click or to expand or collapse the menu.
2Main panelThe main panel displays the selected screen.
3ToolbarThe toolbar displays the following information:
• The date and time congured in System Settings > Time .
• [USER_NAME]: Click to access the Log out button.
•
: Click to view the following:
• Restart Switch: Restarts the switch
• Language: Opens a list of supported languages and allows
you to change the language of the operating system
• About: Displays the following information:
• Hardware model
• Version number
QSS 15
Page 17
Getting Started
1. Log in to the switch as an administrator.
The default administrator account is admin.
For details, see Switch Access.
2. Congure the system settings.
For details, see System Settings.
3. Congure port settings and other network settings.
For details, see Network Management.
QSW-M5216-1T User Guide
QSS 16
Page 18
QSW-M5216-1T User Guide
6. Network Management
This section describes how to use the QSS network settings to congure the switch. Basic network
conguration of the switch includes port management, VLAN conguration, conguration of variousprotocols, and trac management via Quality of Service (QoS) and Access Control Lists (ACLs).
Dashboard
The dashboard opens to the conguration section of QSS. Click the drop-down menu in the dashboard to
view port status, VLAN status, link aggregation status, and port trac for all ports.
You can also delete user-congured network settings and monitor network settings of the switch.
Conguring Port Settings
1. Log in to QSS.
2. Go to Conguration > Port Management .
3. Go to Port Conguration.
4. Identify a port.
5. Congure the settings.
SettingDescription
StateControls the operation status for a port
SpeedSpecies the maximum speed at which a port can operate.
Flow ControlControls the ow control status for a port
Important
Flow Control is not supported when the port speed is
set to HDX.
6. Click Save.
QSS saves the settings.
Adding a VLAN
A virtual LAN (VLAN) groups multiple network devices together and limits their broadcast domain. Members
of a VLAN are isolated and network trac is only sent between group members
Each VLAN is assigned a specic VLAN identication number. The VLAN screen displays information about
existing VLANs and provides access to VLAN conguration options.
1. Log in to QSS.
2. Go to Conguration > VLAN .
3. Click Add.
The Add VLAN window opens.
4. Specify a VLAN ID.
5. Select ports to include in the VLAN.
Network Management 17
Page 19
QSW-M5216-1T User Guide
Only tagged ports can belong to multiple VLANs.
6. Click Save.
QSS adds the VLAN.
Conguring a Link Aggregation Group
Link Aggregation Control Protocol (LACP) allows you to combine multiple network adapters into a single
logical network interface. This ensures increased throughput and provides redundancy. In case of port
failure, trac continues on the remaining ports.
The Link Aggregation page displays information about existing link aggregation groups and provides
access to conguration options.
1. Log in to QSS.
2. Go to Conguration > Link Aggregation .
3. Identify a group.
4.
Click
The Edit Group window opens.
.
5. Congure the group settings.
SettingDescription
ModeControls the link aggregation mode for the group
Important
Enable Link Aggregation before connecting cables to
the switch to avoid creating a data loop.
Port CongurationSpecies which ports are included in the group
Note
You can add up to four ports in a group.
6. Click Save.
QSS updates the group settings.
Managing Rapid Spanning Tree Protocol (RSTP) Settings
RSTP provides rapid convergence of the spanning tree and builds a loop-free topology for the switch
network. RSTP allows you to enable backup links in case an active link fails.
Note
• RSTP is disabled by default.
• The default bridge priority for the switch is 32768.
Conguring the RSTP Status
1. Log in to QSS.
Network Management 18
Page 20
2. Go to Conguration > RSTP .
3. Change the RSTP control status.
Toggle SettingDescription
Enables the RSTP function
Disables the RSTP function
4. Click Save.
QSS saves the setting.
Setting Bridge Priority
You can congure the RSTP bridge priority of the switch in the RSTP conguration eld.
1. Log in to QSS.
2. Go to Conguration > RSTP > RSTP Conguration .
QSW-M5216-1T User Guide
3. Enable RSTP.
Note
For details, see Conguring the RSTP Status.
4. Select the RSTP bridge priority from the drop-down list.
Note
The default priority is 32768 and it is recommended that you set the bridge priority to zero for
root bridge priority.
5. Click Save.
QSS updates the RSTP bridge priority.
Conguring the LLDP Status
The Link Layer Discovery Protocol (LLDP) uses periodic broadcasts to advertise device information over the
network and discover neighboring devices. This protocol operates by establishing a distributed database
and gathering information from neighboring ports connected by a network link.
The LLDP page displays information about detected devices and allows you to enable and disable LLDP.
1. Log in to QSS.
2. Go to Conguration > LLDP .
3. Change the LLDP control status.
Toggle SettingDescription
Enables the LLDP function
Disables the LLDP function
4. Click Save.
Network Management 19
Page 21
QSW-M5216-1T User Guide
QSS saves the setting.
Adding a Static MAC Address
The MAC address table tracks MAC addresses and forwards associated unicast trac through specic ports.
1. Log in to QSS.
2. Go to Conguration > LLDP > MAC Address Table .
3. Specify the aging time for the MAC table.
Note
You can congure the amount of time that an entry remains in the MAC table.
4. Click Add.
The Add Static MAC Address window opens.
5. Congure the MAC address settings.
a. Specify a VLAN ID.
b. Specify a MAC address.
c. Select at least one port.
6. Click Save.
The Add Static MAC Address window closes.
QSS adds the MAC address.
Conguring IGMP Snooping
The Internet Group Management Protocol (IGMP) manages membership to IP multicast groups. IP hosts and
adjacent multicast routers use IGMP to establish multicast group memberships.
The IGMP Snooping page displays information about detected IGMP groups and provides access to IGMP
snooping conguration options.
1. Log in to QSS.
2. Go to Conguration > IGMP Snooping .
3.
Click .
QSS enables IGMP snooping.
4. Congure the IGMP settings.
SettingDescription
Multicast ood blockingBlocks multicast ooding from unknown sources
Router PortSpecies which ports to use as the router port for the VLAN
After receiving an IGMP packet, QSS forwards the trac through the
selected router ports.
Fast LeaveSpecies the ports that support the IGMP v2 Fast Leave feature
After receiving an IGMP leave message, QSS stops forwarding
multicast trac to the selected Fast Leave ports.
Network Management 20
Page 22
QSW-M5216-1T User Guide
5. Click Save.
QSS saves the IGMP settings.
Managing Access Control List (ACL) Entries
Access control lists allow you to handle network trac in a switch by using controlled rule sets. Each ACL rule
is specic to a user-created set of conditions that a data packet must meet to match the rule. In the instance
that a data packet has no ACL rule match, the switch applies the default rule. Otherwise, the switch matches
the data packet to the rule and permits or denies the packet.
You can use ACLs to control host access to dierent parts of a network or to control trac forwarding or
blocking at the switch level.
Adding an IP Address-based ACL Rule
1. Log in to QSS.
2. Go to Conguration > ACL > By IP Address .
3. Click Add.
The Add ACL - IP Address window opens.
4. Congure the ACL settings.
SettingUser Action
ACL No.Specify a number between 1 and 255
Source
IP AddressSpecify the source IP address
Subnet MaskSpecify the source subnet mask
Destination
IP addressSpecify the destination IP address
Subnet MaskSpecify the destination subnet mask
PortSelect All to select all ports or you can congure the IP address-based
ACL rule on specic ports by clicking the port checkbox.
PermissionSelect one of the following:
• Allow
• Deny
5. Click Save.
QSS adds the IP address-based ACL rule.
Adding a MAC Address-based ACL Rule
1. Log in to QSS.
2. Go to Conguration > ACL > By MAC Address .
3. Click Add.
The Add ACL - MAC Address window opens.
4. Congure the ACL settings.
Network Management 21
Page 23
QSW-M5216-1T User Guide
SettingUser Action
ACL No.Specify a number between 1 and 255
Source
MAC addressSpecify the source MAC address
Destination
MAC addressSpecify the destination MAC address
PortSelect All to select all ports or you can congure the IP address-based
ACL rule on specic ports by clicking the port checkbox.
PermissionSelect one of the following:
• Allow
• Deny
5. Click Save.
QSS adds the MAC address-based ACL rule.
Conguring QoS Settings
Quality of service (QoS) improves network trac shaping by classifying and prioritizing dierent network
devices and packets.
1. Log in to QSS.
2. Go to Conguration > QoS .
3. Select the QoS mode.
ModeDescription
Port-basedPrioritizes trac for each port
VLAN-basedPrioritizes trac for each VLAN
4. Congure the priority.
Note
Larger numbers are given greater priority.
5. Click Save.
QSS updates the QoS settings.
Conguring CoS Priority for QoS
CoS (Class of Service) is a 3-bit eld in a frame Ethernet header. The CoS value determines which queue the
trac is forwarded to, based on CoS value (0-7).
1. Log in to QSS.
2. Go to Conguration > QoS .
3. Identify a port.
4.
Click under CoS Inspection.
Network Management 22
Page 24
QSW-M5216-1T User Guide
QSS enables CoS inspection on the port.
5. Click Edit CoS Inspection.
6. Assign a priority value between 1 and 8 to the CoS value.
7. Click Save.
QSS updates the priority queue of the CoS value.
8. Click Save.
QSS updates the QoS information.
Conguring DSCP Priority for QoS
DSCP (Dierentiated Services Code Point) is a 6-bit eld in a packet IP header that is used to classify a
packet. The DSCP value determines which queue the packet is forwarded to, based on the priority assigned
to the DSCP value (0-63).
1. Log in to QSS.
2. Go to Conguration > QoS .
3. Identify a port.
4.
Click
QSS enables DSCP inspection on the port.
5. Click Edit DSCP Inspection.
6. Assign a priority value between 1 and 8 to the DSCP value.
7. Click Save.
QSS updates the priority queue of the DSCP value.
8. Click Save.
QSS updates the QoS information.
under DSCP Inspection.
Deleting a Network Setting
1. Log in to QSS.
2. Go to Conguration.
3. Select a network setting.
Note
Deleting network settings is applicable only to ACL rules, link aggregation groups, static MAC
addresses, and VLANs.
4.
Click .
A conrmation message appears.
5. Click Delete.
QSS deletes the network setting.
Network Management 23
Page 25
QSW-M5216-1T User Guide
Monitoring Network Settings
You can monitor the following network settings in the Conguration section. These settings can be used to
monitor and diagnose switch operations.
1. Log in to QSS.
2. Go to Conguration.
3. Select a network setting.
SettingDescription
IGMP Snooping
Statistics
LLP Remote DevicesGo to LLDP > LLDP Remote Devices .
Go to IGMP Snooping > IGMP Snooping Statistics .
Displays statistical information about detected IGMP groups.
Displays information about the LLDP-enabled port including system
capabilities and remote management IP address.
Possible system capabilities include:
• Bridge
• DOCSIS cable device
• Repeater
• Reserved
• Router
• Station only
• Telephone
• WLAN access point
• Other
Port StatusGo to Port Management > Port Status to view the following port status
information:
• Port number
• Port link status
• Port state
• Port speed
• Flow control
Port Statisticsa. Go to Port Management > Port Statistics to view the statistics of the
network ports.
b.
Click to change the viewing option to List View.
Network Management 24
Page 26
QSW-M5216-1T User Guide
7. System Management
The System section provides access to device conguration options.
System Settings
The System Settings menu contains system conguration options such as system information, IP
information, password settings, secure connection settings, and time settings for the switch.
Changing the Switch Name
1. Log in to QSS.
2. Go to System > System Settings > System Information .
3.
Click
4. Specify the device name:
Requirements:
5.
Click
QSS updates the switch name.
.
• Length: 1–14 characters
• Valid characters: A–Z, a–z, 0–9
• Valid special characters: Hyphen (-)
to conrm the device name.
Conguring the Switch IP Information
1. Log in to QSS.
2. Go to System > System Settings > IP .
3. Select a network conguration setting.
SettingDescription
Automatically obtain IP & DNSIf the network supports DHCP, the adapter automatically obtains the IP
address and network settings.
Manually set the IP & DNSManually assign a static IP address. You must specify the following
information:
4. Click Save.
• Fixed IP Address
• Subnet Mask
• Default Gateway
Note
The default gateway IP address for the switch is
optional.
System Management 25
Page 27
A conrmation message appears.
5. Click Yes.
QSS updates the IP information.
Note
Use Qnder Pro to locate the switch and log in to QSS.
Updating the Switch Password
1. Log in to QSS.
2. Go to System > System Settings > Password .
3. Specify a new password.
Tip
Click
to make the password visible.
QSW-M5216-1T User Guide
SettingUser Action
Current passwordSpecify the current password of the device
New passwordSpecify a password that contains 8 to 20 ASCII charactersConrm new passwordReenter the new password
4. Click Save.
QSS logs you out of the switch interface. You can access the switch with the new password.
Conguring Time Settings
Note
You must congure the system time correctly to avoid the following issues.
• When using a web browser to connect to the device or save a le, the displayed time of
the action is incorrect.
• Event logs do not reect the exact time that events occurred.
• Scheduled tasks run at the wrong time.
1. Log in to QSS.
2. Go to System > System Settings > Time .
3. Specify the time zone.
4. Specify the time conguration.
SettingDescription
Manual congurationSpecify the date and time.
Synchronize with internet time
server
Ensure that your device is connected to the Internet, and then specify
the following information:
Server: Name of the Network Time Protocol (NTP) server
Examples: time.nist.gov, time.windows.com
System Management 26
Page 28
QSW-M5216-1T User Guide
5. Click Save.
QSS updates the time settings.
Backing Up System Settings
1. Log in to QSS.
2. Go to System > System Settings > Backup & Restore .
3. Click Backup.
The device exports the system settings as a BIN le and downloads the le to your computer.
Restoring System Settings
Warning
If the selected backup le contains user or user group information that already exists on
the device, the system will overwrite the existing information.
1. Log in to QSS.
2. Go to System > System Settings > Backup & Restore .
A le explorer window opens.
3. Click Browse.
4. Select a valid BIN le that contains the device system settings.
5. Click Restore.
QSS restores the switch settings.
Resetting the Switch Password
1. Log in to QSS.
2. Go to System > System Settings > Backup & Restore .
3. Go to System > System Settings > Backup & Restore .
4. Click Password Reset.
QSS resets the switch password.
Default UsernameDefault Password
admin
The MAC address of the switch image omitting any punctuation and
capitalizing any letters.
Tip
For example, if the MAC address is 00:0a:0b:0c:00:01,
the default password is 000A0B0C0001.
You can nd the MAC address using Qnder Pro. It is
also printed on a sticker on the device as "MAC".
System Management 27
Page 29
QSW-M5216-1T User Guide
Resetting the Switch to Factory Settings
Resetting the switch deletes the data stored on the device and restores the switch to the default factory
settings.
Tip
You can also reset the switch to factory defaults by pressing and holding the physical reset
button for 10 seconds.
1. Log in to QSS.
2. Go to System > System Settings > Backup & Restore .
3. Click Factory Reset.
A conrmation message appears.
4. Click Yes.
QSS resets the switch to the factory default settings.
Default UsernameDefault Password
admin
The MAC address of the switch image omitting any punctuation and
capitalizing any letters.
Tip
For example, if the MAC address is 00:0a:0b:0c:00:01, the
default password is 000A0B0C0001.
You can nd the MAC address using Qnder Pro. It is also
printed on a sticker on the device as "MAC".
Enabling Secure Connection (HTTPS)
1. Log in to QSS.
2. Go to System > System Settings > HTTPS .
3. Select Enable Secure Connection.
4. Select a TLS version.
Note
Select the latest version of TLS to maximize system security. Ensure that your system meets the
TLS requirements to avoid compatibility issues.
5. Optional: Select Force secure connections only.
Note
After enabling this setting, you can only access the web administration page via HTTPS.
6. Click Save.
QSS saves the secure connection settings.
Restarting the Switch
1. Log in to QSS.
System Management 28
Page 30
QSW-M5216-1T User Guide
2.
Click located on the upper-right corner of the page.
3. Click Restart Switch.
A conrmation message appears.
4. Click Yes.
QSS restarts the switch.
Viewing the Switch Information
To view the hardware and system information of the switch, go to System > System Information .
The screen provides the following information.
InformationDescription
Switch nameDisplays the default or modied name of the device
Model nameDisplays the model name of the switch
MAC addressDisplays the MAC address of the switch image
IP addressDisplays the DHCP or static IP address of the switch
System uptimeDisplays how long the system has been operational
Current rmware versionDisplays the rmware image version of the switch
Firmware Update
QNAP recommends keeping your device rmware up to date. This ensures that your device can benet from
new QSS software features, security updates, enhancements, and bug xes.
You can update the NAS rmware using one of the following methods:
Update MethodDescription
Using Live UpdateFirmware updates are automatically detected by QSS and installed
onto your device.
For details, see Checking for Live Updates.
Using Firmware UpdateYou can check for latest device rmware updates on the QNAP
website, download the rmware update to a computer, and manually
install the rmware update onto your device.
For details, see Updating the Firmware Manually.
Firmware Requirements
Your device must meet the following requirements to perform a rmware update:
System Management 29
Page 31
QSW-M5216-1T User Guide
SettingsRequirements
Hardware settings• A computer
Note
A computer is required for updating the rmware
manually or through Qnder Pro.
Ethernet cables
Note
QNAP recommends updating the rmware using
wired Ethernet connections to ensure your network
connection is reliable during rmware updates.
Backup system settingsQNAP recommends backing up the system settings to your computer
before updating the rmware.
For details, see Backing Up System Settings.
Administrator privilegesYou must be a switch administrator or have admin privileges to update
the rmware.
Stop switch operationsQNAP recommends stopping all other switch operations before the
rmware update. The switch must be restarted for the rmware
update to take eect and may disrupt ongoing switch services or
operations.
Device model nameEnsure you have the correct switch model name. You can nd the
switch model name using the following methods:
• Locate the model name on a sticker on the bottom or rear of your
device.
• Log on to your device to nd the model name.
Firmware versionIf you are updating the rmware using Firmware Update or Qnder
Pro, ensure the selected rmware version is correct for your device
model.
Checking for Live Updates
Warning
• To prevent data loss, QNAP recommends backing up all data on your device before
updating the rmware. For details about data backup, see Backing Up System
Settings.
• Do not power o your device during the rmware update process.
Important
• Make sure you review through the Firmware Requirements before updating the
rmware.
• The update may require several minutes or longer, depending on your hardware
conguration and network connection.
1. Log in to QSS.
2. Go to System > Firmware Update > Live Update .
System Management 30
Page 32
QSW-M5216-1T User Guide
3. Click Check for update.
QSS checks for available rmware updates. You can choose to update QSS if there is an available
update.
4. Click Update System.
A conrmation message appears.
5. Click Update.
QSS updates the rmware.
Updating the Firmware Manually
Warning
• To prevent data loss, QNAP recommends backing up all data on your device before
updating the rmware. For details about data backup, see Backing Up System
Settings.
• Do not power o your device during the rmware update process.
Important
• Make sure you review through the Firmware Requirements before updating the
rmware.
• The update may require several minutes or longer, depending on your hardware
conguration and network connection.
1. Download the device rmware.
a. Go to http://www.qnap.com/download.
b. Select the product type.
c. Select your device model.
d. Read the release notes and conrm the following:
• The device model matches the rmware version.
• Updating the rmware is necessary.
• Check for any additional rmware update setup instructions.
2. Ensure that the product model and rmware are correct.
3. Select the download server based on your location.
4. Download the rmware package.
5. Click Browse.
6. Select a folder.
7. Save the downloaded rmware package.
8. Extract the rmware image le.
9. Log in to QSS.
System Management 31
Page 33
10. Go to System > Firmware Update > Firmware Update .
11. Click Browse and then select the extracted rmware image le.
12. Click Update System.
A conrmation message window appears.
13. Click Update.
The device is restarted immediately.
QSW-M5216-1T User Guide
System Management 32
Page 34
8. Support and Other Resources
QNAP provides the following resources:
ResourceURL
Documentationhttps://docs.qnap.com
Service Portalhttps://service.qnap.com
Downloadshttps://download.qnap.com
Community Forumhttps://forum.qnap.com
QSW-M5216-1T User Guide
Support and Other Resources 33
Page 35
9. Glossary
myQNAPcloud
Provides various remote access services such as DDNS and myQNAPcloud Link
Qnder Pro
QNAP utility that lets you locate and access QNAP NAS devices in your local area network
QSS
QNAP switch management application
QuNetSwitch
QNAP switch management app that runs on the QTS operating system
QSW-M5216-1T User Guide
Glossary 34
Page 36
QSW-M5216-1T User Guide
10. Notices
This chapter provides information about warranty, disclaimers, licensing, and federal regulations.
Limited Warranty
QNAP oers limited warranty service on our products. Your QNAP-branded hardware product is warranted
against defects in materials and workmanship for a period of one (1) year or more from the date printed on
the invoice. ("Warranty Period"). Please review your statutory rights at www.qnap.com/warranty, which may
be amended from time to time by QNAP in its discretion.
Disclaimer
Information in this document is provided in connection with products of QNAP Systems, Inc. (the "QNAP").
No license, express or implied, by estoppels or otherwise, to any intellectual property rights is granted by
this document. Except as provided in QNAP's terms and conditions of sale for such products, QNAP assumes
no liability whatsoever, and QNAP disclaims any express or implied warranty, relating to sale and/or use of
QNAP products including liability or warranties relating to tness for a particular purpose, merchantability,
or infringement of any patent, copyright or other intellectual property right.
QNAP products are not intended for use in medical, life saving, life sustaining, critical control or safety
systems, or in nuclear facility applications.
In no event shall QNAP’s liability exceed the price paid for the product from direct, indirect, special,
incidental, or consequential damages resulting from the use of the product, its accompanying software,
or its documentation. QNAP makes no warranty or representation, expressed, implied, or statutory, with
respect to its products or the contents or use of this documentation and all accompanying software, and
specically disclaims its quality, performance, merchantability, or tness for any particular purpose. QNAP
reserves the right to revise or update its products, software, or documentation without obligation to notify
any individual or entity.
Back up the system periodically to avoid any potential data loss is recommended. QNAP disclaims any
responsibility of all sorts of data loss or recovery.
Should you return any components of the package of QNAP products such as NAS (Network Attached
Storage) for refund or maintenance, make sure they are carefully packed for shipping. Any form of damages
due to improper packaging will not be compensated.
All the features, functionality, and other product specications are subject to change without prior notice or
obligation. Information contained herein is subject to change without notice.
Further, the ® or ™ symbols are not used in the text.
GNU Public License
Version 3, 29 June 2007
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not
allowed.
Preamble
The GNU General Public License is a free, copy left license for software and other kinds of works.
The licenses for most software and other practical works are designed to take away your freedom to share
and change the works. By contrast, the GNU General Public License is intended to guarantee your freedom
to share and change all versions of a program--to make sure it remains free software for all its users. We,
Notices 35
Page 37
QSW-M5216-1T User Guide
the Free Software Foundation, use the GNU General Public License for most of our software; it applies also
to any other work released this way by its authors. You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are
designed to make sure that you have the freedom to distribute copies of free software (and charge for them
if you wish), that you receive source code or can get it if you want it, that you can change the software or use
pieces of it in new free programs, and that you know you can do these things.
To protect your rights, we need to prevent others from denying you these rights or asking you to surrender
the rights. Therefore, you have certain responsibilities if you distribute copies of the software, or if you
modify it: responsibilities to respect the freedom of others.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must pass on to the
recipients the same freedoms that you received. You must make sure that they, too, receive or can get the
source code. And you must show them these terms so they know their rights.
Developers that use the GNU GPL protect your rights with two steps: (1) assert copyright on the software,
and (2) oer you this License giving you legal permission to copy, distribute and/or modify it.
For the developers' and authors' protection, the GPL clearly explains that there is no warranty for this free
software. For both users' and authors' sake, the GPL requires that modied versions be marked as changed,
so that their problems will not be attributed erroneously to authors of previous versions.
Some devices are designed to deny users access to install or run modied versions of the software inside
them, although the manufacturer can do so. This is fundamentally incompatible with the aim of protecting
users' freedom to change the software. The systematic pattern of such abuse occurs in the area of products
for individuals to use, which is precisely where it is most unacceptable. Therefore, we have designed this
version of the GPL to prohibit the practice for those products. If such problems arise substantially in other
domains, we stand ready to extend this provision to those domains in future versions of the GPL, as needed
to protect the freedom of users.
Finally, every program is threatened constantly by software patents. States should not allow patents to
restrict development and use of software on general-purpose computers, but in those that do, we wish to
avoid the special danger that patents applied to a free program could make it eectively proprietary. To
prevent this, the GPL assures that patents cannot be used to render the program non-free.
The precise terms and conditions for copying, distribution and modication follow.
Terms and Conditions
1. Denitions.
“This License” refers to version 3 of the GNU General Public License.
“Copyright” also means copyright-like laws that apply to other kinds of works, such as semiconductor
masks.
“The Program” refers to any copyrightable work licensed under this License. Each licensee is addressed
as “you”. “Licensees” and “recipients” may be individuals or organizations.
To “modify” a work means to copy from or adapt all or part of the work in a fashion requiring copyright
permission, other than the making of an exact copy. The resulting work is called a “modied version” of
the earlier work or a work “based on” the earlier work.
A “covered work” means either the unmodied Program or a work based on the Program.
To “propagate” a work means to do anything with it that, without permission, would make you
directly or secondarily liable for infringement under applicable copyright law, except executing it on
a computer or modifying a private copy. Propagation includes copying, distribution (with or without
modication), making available to the public, and in some countries other activities as well.
To “convey” a work means any kind of propagation that enables other parties to make or receive
copies. Mere interaction with a user through a computer network, with no transfer of a copy, is not
conveying.
An interactive user interface displays “Appropriate Legal Notices” to the extent that it includes a
convenient and prominently visible feature that (1) displays an appropriate copyright notice, and (2)
Notices 36
Page 38
QSW-M5216-1T User Guide
tells the user that there is no warranty for the work (except to the extent that warranties are provided),
that licensees may convey the work under this License, and how to view a copy of this License. If the
interface presents a list of user commands or options, such as a menu, a prominent item in the list
meets this criterion.
2. Source Code.
The “source code” for a work means the preferred form of the work for making modications to it.
“Object code” means any non-source form of a work.
A “Standard Interface” means an interface that either is an ocial standard dened by a recognized
standards body, or, in the case of interfaces specied for a particular programming language, one that
is widely used among developers working in that language.
The “System Libraries” of an executable work include anything, other than the work as a whole, that (a)
is included in the normal form of packaging a Major Component, but which is not part of that Major
Component, and (b) serves only to enable use of the work with that Major Component, or to implement
a Standard Interface for which an implementation is available to the public in source code form. A
“Major Component”, in this context, means a major essential component (kernel, window system, and
so on) of the specic operating system (if any) on which the executable work runs, or a compiler used
to produce the work, or an object code interpreter used to run it.
The “Corresponding Source” for a work in object code form means all the source code needed to
generate, install, and (for an executable work) run the object code and to modify the work, including
scripts to control those activities. However, it does not include the work's System Libraries, or generalpurpose tools or generally available free programs which are used unmodied in performing those
activities but which are not part of the work. For example, Corresponding Source includes interface
denitionles associated with source les for the work, and the source code for shared libraries and
dynamically linked subprograms that the work is specically designed to require, such as by intimate
data communication or control ow between those subprograms and other parts of the work.
The Corresponding Source need not include anything that users can regenerate automatically from
other parts of the Corresponding Source.
The Corresponding Source for a work in source code form is that same work.
3. Basic Permissions.
All rights granted under this License are granted for the term of copyright on the Program, and
are irrevocable provided the stated conditions are met. This License explicitly arms your unlimited
permission to run the unmodied Program. The output from running a covered work is covered by this
License only if the output, given its content, constitutes a covered work. This License acknowledges
your rights of fair use or other equivalent, as provided by copyright law.
You may make, run and propagate covered works that you do not convey, without conditions so
long as your license otherwise remains in force. You may convey covered works to others for the
sole purpose of having them make modications exclusively for you, or provide you with facilities for
running those works, provided that you comply with the terms of this License in conveying all material
for which you do not control copyright. Those thus making or running the covered works for you must
do so exclusively on your behalf, under your direction and control, on terms that prohibit them from
making any copies of your copyrighted material outside their relationship with you.
Conveying under any other circumstances is permitted solely under the conditions stated below.
Sublicensing is not allowed; section 10 makes it unnecessary.
4. Protecting Users' Legal Rights From Anti-Circumvention Law.
No covered work shall be deemed part of an eective technological measure under any applicable law
fullling obligations under article 11 of the WIPO copyright treaty adopted on 20 December 1996, or
similar laws prohibiting or restricting circumvention of such measures.
When you convey a covered work, you waive any legal power to forbid circumvention of technological
measures to the extent such circumvention is eected by exercising rights under this License with
respect to the covered work, and you disclaim any intention to limit operation or modication of the
work as a means of enforcing, against the work's users, your or third parties' legal rights to forbid
circumvention of technological measures.
5. Conveying Verbatim Copies.
Notices 37
Page 39
QSW-M5216-1T User Guide
You may convey verbatim copies of the Program's source code as you receive it, in any medium,
provided that you conspicuously and appropriately publish on each copy an appropriate copyright
notice; keep intact all notices stating that this License and any non-permissive terms added in accord
with section 7 apply to the code; keep intact all notices of the absence of any warranty; and give all
recipients a copy of this License along with the Program.
You may charge any price or no price for each copy that you convey, and you may oer support or
warranty protection for a fee.
6. Conveying Modied Source Versions.
You may convey a work based on the Program, or the modications to produce it from the Program,
in the form of source code under the terms of section 4, provided that you also meet all of these
conditions:
a. The work must carry prominent notices stating that you modied it, and giving a relevant date.
b. The work must carry prominent notices stating that it is released under this License and any
conditions added under section 7. This requirement modies the requirement in section 4 to
“keep intact all notices”.
c. You must license the entire work, as a whole, under this License to anyone who comes into
possession of a copy. This License will therefore apply, along with any applicable section 7
additional terms, to the whole of the work, and all its parts, regardless of how they are packaged.
This License gives no permission to license the work in any other way, but it does not invalidate
such permission if you have separately received it.
d. If the work has interactive user interfaces, each must display Appropriate Legal Notices; however,
if the Program has interactive interfaces that do not display Appropriate Legal Notices, your work
need not make them do so.
A compilation of a covered work with other separate and independent works, which are not by
their nature extensions of the covered work, and which are not combined with it such as to form
a larger program, in or on a volume of a storage or distribution medium, is called an “aggregate”
if the compilation and its resulting copyright are not used to limit the access or legal rights of the
compilation's users beyond what the individual works permit. Inclusion of a covered work in an
aggregate does not cause this License to apply to the other parts of the aggregate.
7. Conveying Non-Source Forms.
You may convey a covered work in object code form under the terms of sections 4 and 5, provided that
you also convey the machine-readable Corresponding Source under the terms of this License, in one of
these ways:
a. Convey the object code in, or embodied in, a physical product (including a physical distribution
medium), accompanied by the Corresponding Source xed on a durable physical medium
customarily used for software interchange.
b. Convey the object code in, or embodied in, a physical product (including a physical distribution
medium), accompanied by a written oer, valid for at least three years and valid for as long
as you oer spare parts or customer support for that product model, to give anyone who
possesses the object code either (1) a copy of the Corresponding Source for all the software in
the product that is covered by this License, on a durable physical medium customarily used for
software interchange, for a price no more than your reasonable cost of physically performing this
conveying of source, or (2) access to copy the Corresponding Source from a network server at no
charge.
c. Convey individual copies of the object code with a copy of the written oer to provide the
Corresponding Source. This alternative is allowed only occasionally and noncommercially, and
only if you received the object code with such an oer, in accord with subsection 6b.
d. Convey the object code by oering access from a designated place (gratis or for a charge), and
oer equivalent access to the Corresponding Source in the same way through the same place
Notices 38
Page 40
QSW-M5216-1T User Guide
at no further charge. You need not require recipients to copy the Corresponding Source along
with the object code. If the place to copy the object code is a network server, the Corresponding
Source may be on a dierent server (operated by you or a third party) that supports equivalent
copying facilities, provided you maintain clear directions next to the object code saying where to
nd the Corresponding Source. Regardless of what server hosts the Corresponding Source, you
remain obligated to ensure that it is available for as long as needed to satisfy these requirements.
e. Convey the object code using peer-to-peer transmission, provided you inform other peers where
the object code and Corresponding Source of the work are being oered to the general public at
no charge under subsection 6d.
A separable portion of the object code, whose source code is excluded from the Corresponding
Source as a System Library, need not be included in conveying the object code work.
A “User Product” is either (1) a “consumer product”, which means any tangible personal property
which is normally used for personal, family, or household purposes, or (2) anything designed or
sold for incorporation into a dwelling. In determining whether a product is a consumer product,
doubtful cases shall be resolved in favor of coverage. For a particular product received by a
particular user, “normally used” refers to a typical or common use of that class of product,
regardless of the status of the particular user or of the way in which the particular user actually
uses, or expects or is expected to use, the product. A product is a consumer product regardless
of whether the product has substantial commercial, industrial or non-consumer uses, unless such
uses represent the only signicant mode of use of the product.
“Installation Information” for a User Product means any methods, procedures, authorization keys,
or other information required to install and execute modied versions of a covered work in that
User Product from a modied version of its Corresponding Source. The information must suce
to ensure that the continued functioning of the modied object code is in no case prevented or
interfered with solely because modication has been made.
If you convey an object code work under this section in, or with, or specically for use in, a User
Product, and the conveying occurs as part of a transaction in which the right of possession and
use of the User Product is transferred to the recipient in perpetuity or for a xed term (regardless
of how the transaction is characterized), the Corresponding Source conveyed under this section
must be accompanied by the Installation Information. But this requirement does not apply if
neither you nor any third party retains the ability to install modied object code on the User
Product (for example, the work has been installed in ROM).
The requirement to provide Installation Information does not include a requirement to continue
to provide support service, warranty, or updates for a work that has been modied or installed
by the recipient, or for the User Product in which it has been modied or installed. Access
to a network may be denied when the modication itself materially and adversely aects the
operation of the network or violates the rules and protocols for communication across the
network.
Corresponding Source conveyed, and Installation Information provided, in accord with this
section must be in a format that is publicly documented (and with an implementation available
to the public in source code form), and must require no special password or key for unpacking,
reading or copying.
8. Additional Terms.
“Additional permissions” are terms that supplement the terms of this License by making exceptions
from one or more of its conditions. Additional permissions that are applicable to the entire Program
shall be treated as though they were included in this License, to the extent that they are valid under
applicable law. If additional permissions apply only to part of the Program, that part may be used
separately under those permissions, but the entire Program remains governed by this License without
regard to the additional permissions.
When you convey a copy of a covered work, you may at your option remove any additional permissions
from that copy, or from any part of it. (Additional permissions may be written to require their own
removal in certain cases when you modify the work.) You may place additional permissions on
material, added by you to a covered work, for which you have or can give appropriate copyright
permission.
Notices 39
Page 41
QSW-M5216-1T User Guide
Notwithstanding any other provision of this License, for material you add to a covered work, you may
(if authorized by the copyright holders of that material) supplement the terms of this License with
terms:
a. Disclaiming warranty or limiting liability dierently from the terms of sections 15 and 16 of this
License; or
b. Requiring preservation of specied reasonable legal notices or author attributions in that
material or in the Appropriate Legal Notices displayed by works containing it; or
c. Prohibiting misrepresentation of the origin of that material, or requiring that modied versions of
such material be marked in reasonable ways as dierent from the original version; or
d. Limiting the use for publicity purposes of names of licensors or authors of the material; or
e. Declining to grant rights under trademark law for use of some trade names, trademarks, or
service marks; or
f. Requiring indemnication of licensors and authors of that material by anyone who conveys the
material (or modied versions of it) with contractual assumptions of liability to the recipient, for
any liability that these contractual assumptions directly impose on those licensors and authors.
All other non-permissive additional terms are considered “further restrictions” within the
meaning of section 10. If the Program as you received it, or any part of it, contains a notice
stating that it is governed by this License along with a term that is a further restriction, you may
remove that term. If a license document contains a further restriction but permits relicensing or
conveying under this License, you may add to a covered work material governed by the terms of
that license document, provided that the further restriction does not survive such relicensing or
conveying.
If you add terms to a covered work in accord with this section, you must place, in the relevant
source les, a statement of the additional terms that apply to those les, or a notice indicating
where to nd the applicable terms.
Additional terms, permissive or non-permissive, may be stated in the form of a separately written
license, or stated as exceptions; the above requirements apply either way.
9. Termination.
You may not propagate or modify a covered work except as expressly provided under this License. Any
attempt otherwise to propagate or modify it is void, and will automatically terminate your rights under
this License (including any patent licenses granted under the third paragraph of section 11).
However, if you cease all violation of this License, then your license from a particular copyright holder
is reinstated (a) provisionally, unless and until the copyright holder explicitly and nally terminates
your license, and (b) permanently, if the copyright holder fails to notify you of the violation by some
reasonable means prior to 60 days after the cessation.
Moreover, your license from a particular copyright holder is reinstated permanently if the copyright
holder noties you of the violation by some reasonable means, this is the rst time you have received
notice of violation of this License (for any work) from that copyright holder, and you cure the violation
prior to 30 days after your receipt of the notice.
Termination of your rights under this section does not terminate the licenses of parties who have
received copies or rights from you under this License. If your rights have been terminated and not
permanently reinstated, you do not qualify to receive new licenses for the same material under section
10.
10. Acceptance Not Required for Having Copies.
You are not required to accept this License in order to receive or run a copy of the Program. Ancillary
propagation of a covered work occurring solely as a consequence of using peer-to-peer transmission to
receive a copy likewise does not require acceptance. However, nothing other than this License grants
you permission to propagate or modify any covered work. These actions infringe copyright if you do
not accept this License. Therefore, by modifying or propagating a covered work, you indicate your
acceptance of this License to do so.
Notices 40
Page 42
QSW-M5216-1T User Guide
11. Automatic Licensing of Downstream Recipients.
Each time you convey a covered work, the recipient automatically receives a license from the original
licensors, to run, modify and propagate that work, subject to this License. You are not responsible for
enforcing compliance by third parties with this License.
An “entity transaction” is a transaction transferring control of an organization, or substantially all assets
of one, or subdividing an organization, or merging organizations. If propagation of a covered work
results from an entity transaction, each party to that transaction who receives a copy of the work also
receives whatever licenses to the work the party's predecessor in interest had or could give under
the previous paragraph, plus a right to possession of the Corresponding Source of the work from the
predecessor in interest, if the predecessor has it or can get it with reasonable eorts.
You may not impose any further restrictions on the exercise of the rights granted or armed under
this License. For example, you may not impose a license fee, royalty, or other charge for exercise
of rights granted under this License, and you may not initiate litigation (including a cross-claim or
counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, oering
for sale, or importing the Program or any portion of it.
12. Patents.
A “contributor” is a copyright holder who authorizes use under this License of the Program or a work
on which the Program is based. The work thus licensed is called the contributor's “contributor version”.
A contributor's “essential patent claims” are all patent claims owned or controlled by the contributor,
whether already acquired or hereafter acquired, that would be infringed by some manner, permitted
by this License, of making, using, or selling its contributor version, but do not include claims that would
be infringed only as a consequence of further modication of the contributor version. For purposes of
this denition, “control” includes the right to grant patent sublicenses in a manner consistent with the
requirements of this License.
Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the
contributor's essential patent claims, to make, use, sell, oer for sale, import and otherwise run,
modify and propagate the contents of its contributor version.
In the following three paragraphs, a “patent license” is any express agreement or commitment,
however denominated, not to enforce a patent (such as an express permission to practice a patent
or covenant not to sue for patent infringement). To “grant” such a patent license to a party means to
make such an agreement or commitment not to enforce a patent against the party.
If you convey a covered work, knowingly relying on a patent license, and the Corresponding Source
of the work is not available for anyone to copy, free of charge and under the terms of this License,
through a publicly available network server or other readily accessible means, then you must either (1)
cause the Corresponding Source to be so available, or (2) arrange to deprive yourself of the benet of
the patent license for this particular work, or (3) arrange, in a manner consistent with the requirements
of this License, to extend the patent license to downstream recipients. “Knowingly relying” means you
have actual knowledge that, but for the patent license, your conveying the covered work in a country,
or your recipient's use of the covered work in a country, would infringe one or more identiable
patents in that country that you have reason to believe are valid.
If, pursuant to or in connection with a single transaction or arrangement, you convey, or propagate by
procuring conveyance of, a covered work, and grant a patent license to some of the parties receiving
the covered work authorizing them to use, propagate, modify or convey a specic copy of the covered
work, then the patent license you grant is automatically extended to all recipients of the covered work
and works based on it.
A patent license is “discriminatory” if it does not include within the scope of its coverage, prohibits
the exercise of, or is conditioned on the non-exercise of one or more of the rights that are specically
granted under this License. You may not convey a covered work if you are a party to an arrangement
with a third party that is in the business of distributing software, under which you make payment to
the third party based on the extent of your activity of conveying the work, and under which the third
party grants, to any of the parties who would receive the covered work from you, a discriminatory
patent license (a) in connection with copies of the covered work conveyed by you (or copies made from
those copies), or (b) primarily for and in connection with specic products or compilations that contain
the covered work, unless you entered into that arrangement, or that patent license was granted, prior
to 28 March 2007.
Notices 41
Page 43
QSW-M5216-1T User Guide
Nothing in this License shall be construed as excluding or limiting any implied license or other
defenses to infringement that may otherwise be available to you under applicable patent law.
13. No Surrender of Others' Freedom.
If conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the
conditions of this License, they do not excuse you from the conditions of this License. If you cannot
convey a covered work so as to satisfy simultaneously your obligations under this License and any
other pertinent obligations, then as a consequence you may not convey it at all. For example, if you
agree to terms that obligate you to collect a royalty for further conveying from those to whom you
convey the Program, the only way you could satisfy both those terms and this License would be to
refrain entirely from conveying the Program.
14. Use with the GNU Aero General Public License.
Notwithstanding any other provision of this License, you have permission to link or combine any
covered work with a work licensed under version 3 of the GNU Aero General Public License into a
single combined work, and to convey the resulting work. The terms of this License will continue to
apply to the part which is the covered work, but the special requirements of the GNU Aero General
Public License, section 13, concerning interaction through a network will apply to the combination as
such.
15. Revised Versions of this License.
The Free Software Foundation may publish revised and/or new versions of the GNU General Public
License from time to time. Such new versions will be similar in spirit to the present version, but may
dier in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program species that a certain
numbered version of the GNU General Public License “or any later version” applies to it, you have
the option of following the terms and conditions either of that numbered version or of any later
version published by the Free Software Foundation. If the Program does not specify a version number
of the GNU General Public License, you may choose any version ever published by the Free Software
Foundation.
If the Program species that a proxy can decide which future versions of the GNU General Public
License can be used, that proxy's public statement of acceptance of a version permanently authorizes
you to choose that version for the Program.
Later license versions may give you additional or dierent permissions. However, no additional
obligations are imposed on any author or copyright holder as a result of your choosing to follow a
later version.
16. Disclaimer of Warranty.
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW.
EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL
NECESSARY SERVICING, REPAIR OR CORRECTION.
17. Limitation of Liability.
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY
COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM
AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL,
INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE
PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE
OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE
WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES.
18. Interpretation of Sections 16 and 17.
Notices 42
Page 44
QSW-M5216-1T User Guide
If the disclaimer of warranty and limitation of liability provided above cannot be given local legal eect
according to their terms, reviewing courts shall apply local law that most closely approximates an
absolute waiver of all civil liability in connection with the Program, unless a warranty or assumption of
liability accompanies a copy of the Program in return for a fee.
END OF TERMS AND CONDITIONS
CE Notice
This device complies with CE Compliance Class A.
FCC Notice
FCC Class A Notice
This device complies with Part 15 of the FCC Rules. Operation is subject to the
following two conditions:
1. This device may not cause harmful interference.
2. This device must accept any interference received, including interference that may cause undesired
operation.
Note
This equipment has been tested and found to comply with the limits for a Class A
digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference when the equipment is operated
in a commercial environment. This equipment generates, uses, and can radiate radio
frequency energy, and if not installed and used in accordance with the instruction manual,
may cause harmful interference to radio communications. Operation of this equipment in
a residential area is likely to cause harmful interference, in which case the user will be
required to correct the interference at his own expense.
Important
Any modications made to this device that are not approved by QNAP Systems, Inc. may
void the authority granted to the user by the FCC to operate this equipment.
Notices 43
Page 45
QSW-M5216-1T User Guide
EU Directive 2002/96/EC Waste Electronic and Electrical Equipment (WEEE)
According to the requirement of the WEEE legislation the following user information is provided to
customers for all branded QNAP Electronics products subject to the WEEE directive.
This symbol on the product or on its packaging indicates that this product must not be disposed of
with your other household waste. Instead, it is your responsibility to dispose of your waste equipment
by handing it over to a designated collection point for the recycling of waste electrical and electronic
equipment. The separate collection and recycling of your waste equipment at the time of disposal will help
to conserve natural resources and ensure that it is recycled in a manner that protects human health and
the environment. For more information about where you can drop o your waste equipment for recycling,
please contact your local city oce, your household waste disposal service or the shop where you purchased
the product.
EU RoHS Statement
This equipment complies with the European Union RoHS Directive 2011/65/EU on the restriction of the use
of certain hazardous substances in electrical and electronic equipment. The directive applies to the use
of lead, mercury, cadmium, hexavalent chromium, polybrominated biphenyls (PBB), and polybrominated
diphenyl ethers (PBDE) in electrical and electronic equipment.
UKCA Notice
This device complies with the UKCA requirements for products sold in Great Britain.
Notices 44
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.