HP J3278B, J3276A, J3277A, J3278A User Manual

Page 1
Page 2
Page 3
Page 4
Copyright © 1998 Hewlett-Packard Company Printed in U.S.A. 02/98
Manual Part Number 5967-2149
*5967-2149*
Page 5
User’s Guide
Page 6
© Copyright 1998 Hewlett-Packard Company.
All rights reserved. Reproduction, adaptation or translation without prior written permission is prohibited, except as allowed under the copy­right laws.
Publication number
5967-2149 User’s Manual, First Edition, Februrary 1998
Applicable Products:
J3276A, J3277A, J3278A
Trademark Credits
Microsoft®, MS-DOS®, Windows®, Microsoft Windows NT® are U.S. registered trademarks of Microsoft Corporation. UNIX® is a registered trademark of The Open Group. Netscape Navi­gator is a U.S. trademark of Netscape Commu­nications Corporation.
Warranty
The information contained in this document is subject to change without notice.
HEWLETT-PACKARD COMPANY MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WAR­RANTIES OF MERCHANTABILITY AND FIT­NESS FOR A PARTICULAR PURPOSE.
Safety Considerations
Prior to the installation and use of this product, review all safety markings and instructions.
Instruction Manual Symbol.
!
If the product is marked with this symbol, refer to product manuals to protect the product from damage.
WARNING
Denotes a hazard that can cause injury
CAUTION
Denotes a hazard that can damage equipment or data.
Do not proceed beyond a
CAUTION
notice until you have understood the
WARNING
or
hazard and have taken appropriate precautions.
Use of control, adjustments, or performance procedures other than those specified herein may result in hazardous radiation exposure. To prevent direct exposure to a laser beam, do not try to disassemble the CD-ROM drives.
Grounding.
This product provides a protec­tive earthing terminal. There must be an uninterruptible safety earth ground from the main power source to the product’s input wiring terminals, power cord, or supplied power cord set. Whenever it is likely that the protection has been impaired, disconnect the power cord until the ground has been restored.
Hewlett-Packard shall not be liable for errors contained herein or for incidental or consequen­tial damages in connection with the furnishing, performance or use of this material.
A copy of the specific warranty terms applicable to your HP product and replacement parts can be obtained from your HP Sales and Service Office or Authorized dealer.
For warranty service information, see appendix B in this guide.
Hewlett-Packard Company 8000 Foothills Boulevard Roseville, California 95747-6588
If your LAN covers an area served by more than one power distribution system, be sure their safety grounds are securely interconnected.
LAN cables may occasionally be subject to hazardous transient voltages (such as lightning or disturbances in the electrical utilities power grid). Handle exposed metal components of the network with caution.
For more safety information, see the “Safety Statements” section starting on page D-4.
Servicing.
There are no user-serviceable parts inside the user-installable modules comprising the product. Any servicing, adjustment, mainte­nance, or repair must be performed only by ser­vice-trained personnel.
Page 7
Preface
HP SureStore CD-ROM server/towers provide a simple and cost­effective way to allow information stored on CD-ROMs and DVD-ROMs to be shared by the users on an “Ethernet” IEEE
802.3i 10Base-T network or “Fast Ethernet” 802.3u 100Base-TX network. HP CD-ROM server towers provide multi-protocol sup­port for most network operating systems.
About This Guide
This User’s Guide aids in installation and use of the HP Sure­Store CD-ROM 10/100 server/towers. These are HP product numbers J3276A, J3277A, and J3278A, with firmware version
4.21 and later. This guide consists of the following chapters:
1. Introduction. A brief description of the HP CD-ROM server towers—how they work, where to use them, and their benefits.
2. Installing Your Tower. A description of the towers and drives, and the steps to install and connect them to your network.
Each of the following four chapters details the procedures for setting up the server/tower for your network, including getting access, configuration, and access controls. Each one is for a dif­ferent network operating environment. If your network has more than one type of networking on servers and clients, use each of the relevant chapters in the following order. (For exam­ple, TCP/IP with Microsoft Windows involves chapters 3 and 4.)
3. Setup for Internet Protocol (IP, HTTP) networks.
4. Setup for Microsoft and IBM OS/2 networks (SMB).
5. Setup for Novell networks.
6. Setup for UNIX networks (NFS).
The following chapters are useful for all network types:
7. Setup Reference for All Networks. Reference information
8. Upgrading the Firmware.
9. Troubleshooting. Solving problems with the server towers.
The appendices provide supplemental reference information— technical and regulatory specifications ranty services.
useful for configuration and access control and management on all network types. Chapters 3–6 have some references to information in this chapter.
,
and support and war-
Preface 3
Page 8
4 Preface
Page 9
Table of Contents
Preface
Table of Contents
1. Introduction
How They Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
Where to Use Them . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
Features and Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3
2. Installing Your Tower
The Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-1
Unpacking Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-2
Customizing Your Tower . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3
Extending HP J3278A Server/Tower 7Plus . . . . . . . . . . . . . . . . . . . . . 2-3
Adding an HP SureStore CD-ROM Drive . . . . . . . . . . . . . . . . . . . . . . . 2-5
Adding an Non-HP CD-ROM Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-8
Steps to Connect the Towers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-10
How to Use HP SureStore CD-ROM Drive . . . . . . . . . . . . . . . . . . . . . 2-12
3. Setup for IP Networks
Set the IP Address for the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-1
Client Access to CDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-8
Configuring the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-10
4. Setup for Microsoft Networks (SMB)
Client Access to CDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2
Configuring the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-11
5. Setup for Novell Networks
Client Access to CDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-2
Configuring the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-9
6. Setup for UNIX Networks (NFS)
Client Access to CDs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-1
Configuring the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-3
5
Page 10
7. Setup Reference for All Networks
File System and Access Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-2
Configuration Tools and Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-8
Configuration Parameter Reference . . . . . . . . . . . . . . . . . . . . . . . . . . 7-13
Remote Network Management Tools . . . . . . . . . . . . . . . . . . . . . . . . . 7-20
8. Upgrading the Firmware
9. Troubleshooting
Check Front-Panel Indicators. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-2
Look Up Your Problem. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-5
Procedures for Resolution and Repair . . . . . . . . . . . . . . . . . . . . . . . . 9-13
A. Getting Support
HP Customer Support Phone Numbers . . . . . . . . . . . . . . . . . . . . . . . A-1
Electronic Support Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-1
B. Warranty
C. Technical Specifications
Server/Tower . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-1
Interface Connectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-2
CD-ROM Drives with J3277A, J3278A . . . . . . . . . . . . . . . . . . . . . . . . C-2
Electrical and Environmental . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-3
Supported Network Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-3
Supported Network Protocols/Standards . . . . . . . . . . . . . . . . . . . . . . C-4
Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-4
D. Regulatory and Safety Information
Regulatory Statements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-1
Safety Statements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . D-4
Index
6
Page 11
Introduction
1
HP SureStore CD-ROM Server/Tower HP SureStore CD-ROM Server/Tower 7 HP SureStore CD-ROM Server/Tower 7Plus
The HP SureStore server/towers connect CD-ROM drives to twisted-pair networks—either IEEE 802.3i 10-Base-T Ethernet or IEEE 802.3u 100Base-TX Fast Ethernet. All users on the net­work can share the information on any CD in the tower. The server module located in the top bay of the 8-bay server/tower is internally connected to the other 7 bays, into which you may add and exchange CD-ROM drives, DVD-ROM drives, and CD changers.
The SCSI bus on the Server/Tower 7Plus is extendable to another SCSI bus. This product houses seven drives and can be attached to the seven-bay HP C2988A SureStore CD-ROM Tower to serve up to 14 drives. Or, it can be attached to a daisy chain of up to 4 additional SCSI-2 stand-alone drives.
How They Work
HP SureStore CD-ROM server/towers directly connect as nodes on an Ethernet network. The server/tower acts as a network file server, so that a network client communicates directly with it. This results in high performance and reliability. Since all three server/towers act as servers, this guide will use the term “server” to refer to any of these server/tower products on the network.
Installation and configuration is simple. In most environments, the network connection is the only installation required prior to using the CD-ROM server. There is no software that must be installed on clients or file servers. Your computer will see the server simply as another network file server, and you access it using standard network operating system commands.
Introduction 1-1
Page 12
The server also supports the HTTP protocol. Therefore, you can access and manage it using a standard web browser, such as Netscape Navigator or Microsoft Internet Explorer.
For Windows 95 or NT 4.0 (and later) systems, a software utility is available for use in place of a web browser. This utility, the HP CD-ROM Server Utility, provides an easy-to-use graphical interface to manage your HP CD-ROM servers. You can down­load this software from Hewlett-Packard’s World-Wide Web site at URL: http://www.hp.com/go/cdrom_server
Note At the Web site, you can also download technical support
information, and the latest versions of the CD-ROM server firmware and software utilities. Check with your HP-autho­rized dealer for additional assistance.
You can also remotely manage the server as a node in your net­work using popular network managment applications.
Where to Use Them
Novell NetWare
Networks
HP SureStore CD-ROM server/towers can be used in a variety of network environments. They support basic messaging and net­work protocols, including:
Novell NCP (NetWare Control Protocol) over IPX
Novell NCP over NetWare/IP
Microsoft networking—SMB (Server Message Block) over NetBEUI (NetBIOS Extended User Interface)
Microsoft networking—SMB (Server Message Block) over NetBIOS/TCP/IP
NFS (Network File System) over UDP/IP
HTTP (HyperText Transfer Protocol) over TCP/IP (Internet Protocol) for access from a web browser
Network clients that use these networking protocols can access the server. Refer to appendix C for more information.
The server can emulate Novell file servers running NetWare 3.x and 4.x and Intranetware 1.x. No NLM is required.
Microsoft and IBM
Networks
UNIX Networks The server can be mounted using NFS (Network File System) .
1-2 Introduction
The server is easily shared using the SMB (Server Message Block) protocol, the default protocol in popular PC systems (such as Microsoft Windows 95 and NT, and IBM OS/2 systems).
Page 13
Internet/Intranet
Networks
The server is accessible from a web browser in environments that can use HTTP over TCP/IP (Internet Protocol).
Apple Macintosh
Networks
Complete Solution
for the Task
File Server
Independence
Ease of Use HP CD-ROM server/towers are designed to be easy to install and
The Macintosh requires the NFS protocol (Network File System).
Features and Benefits
The HP CD-ROM server/tower can be installed on the network in minutes, versus hours for other solutions (such as towers attached to file servers).
The server is pre-installed with all the network functionality required. It does not rely on intermediate communications with a file server.
use.
Software on disks or tapes is not needed to install the server. The server uses standard networking protocols (HTTP, NCP, SMB, and NFS), so there is no need to learn any special software to access it.
Users find their data by mapping individual CD drives or the entire server (with a subdirectory for each CD) to be a logical network drive, or by using their browser to access the built-in web server.
Location Flexibility As a network node, the server/tower can be located anywhere on
the network, such as in the workgroup where users can update new CD content as it arrives. It can be rack or floor mounted.
Up-to-Date Data Since all users share a common set of CDs, they are assured of
using the correct set of data.
Broad Compatibility
and Flexibility
Now and Later
As a multi-protocol device, the server/tower simultaneously supports various network operating environments, including Novell NetWare, Microsoft and IBM network operating systems (Windows 95/98, Windows NT, OS/2), UNIX, and Internet/intra­nets. Or it can function with only one protocol enabled. New net­work operating systems are supportable by downloading new firmware to Flash memory.
The backplane allows easy installation of CD-ROM or DVD­ROM drives or CD changers. It automatically assigns SCSI IDs to HP drives. SCSI-2 drives from vendors others than Hewlett­Packard Company are easily adapted to the HP server/tower.
Introduction 1-3
Page 14
A server/tower with 7 drives preinstalled is available. Or a server/tower without drives preinstalled can be loaded with one or more drives now, and more drives can be added when needed. Or the Server/Tower 7Plus with its 7 preinstalled drives can be extended to up to 14 drives when needed.
Either a 10Base-T or a 100Base-TX network can be connected.
Web Server
Functionality
Security CD access can be restricted by setting up password protection.
Speed These server/towers take advantage of 100-Mbit/s networks. The
Upgradability New firmware can be easily downloaded to the server’s Flash
Remote Management
with Web JetAdmin
and Others
Users can access CDs using a web browser, such as Netscape Navigator or Microsoft Internet Explorer, and network manag­ers can configure and manage the server using a web browser.
The number of simultaneous users of any CD can be limited to comply with license agreements. Or, user access can be adminis­tered using the network operating system’s authentication pro­visions, such as Novell’s NDS (NetWare Directory Services) and Microsoft’s Windows NT 4.0 domains.
32-bit processor and cache memory allow ample throughput for demanding CD-ROM applications. HP’s CD-ROM drives seek data quickly. See appendix C for drive speed specifications.
memory over the network.
Hewlett-Packard’s Web JetAdmin automatically locates and checks the health of multiple CD-ROM servers from a single console. Other leading management applications that support the Simple Network Management Protocol, SNMP, can also manage the HP CD-ROM server/towers.
1-4 Introduction
Page 15
Installing Your Tower
The Products
2
HP J3276A
SureStore CD-ROM
Server/Tower
HP J3277A
SureStore CD-ROM
Server/Tower 7
HP J3278A
SureStore CD-ROM
Server/Tower 7Plus
SCSI Features
This tower has an HP CD-ROM server module in the top bay and 7 empty drive bays when shipped from Hewlett-Packard.
This product is the same as J3276A above, except that the 7 drive bays have 7 high-speed HP SureStore CD-ROM drives pre-installed by Hewlett-Packard.
This tower has an HP CD-ROM server module in the top bay, and 7 high-speed HP SureStore CD-ROM drives pre-installed by Hewlett-Packard. It has an expansion SCSI connector for attaching more drives, such as the 7-bay HP C2988A SureStore CD-ROM Tower and 7 more HP SureStore CD-ROM drives. See “HP C2988A SureStore CD-ROM Tower” on page 2-3 for attach­ing a 7-bay tower.
The SCSI bus is terminated at one end by the server module and at the other end by an internal passive terminator on the back­plane.
The SCSI IDs are set automatically on HP CD-ROM drives, based on the position of the drives installed into the tower. You need not set jumpers on the drives to select IDs. The topmost drive in the tower is assigned ID 0 (zero), and the lowest drive is assigned ID 6.
When installing drives from a vendor other than Hewlett­Packard, the SCSI IDs for the drives must be manually set. Universal mounting rails available from HP as the product HP C2998A Mounting Hardware for Non-HP Drives must be attached to adapt the drive to the HP server/tower (see page 2-
8).
Installing Your Tower 2-1
Page 16
Unpacking Components
Unpack and inspect all parts for damage. Contact your dealer if anything is missing.
Server/tower (installed modules vary; see page 2-1)
User’s Guide (this book)
2 front-cover keys
(Only for HP J3276A SureStore CD-ROM Server/Tower) 5 snap-on filler panels for empty bays, in a separate bag or already installed
Power cord for your country, one of the following:
Australia and New Zealand 8120-6803 China 8120-8376 Denmark 8120-6806 Europe 8120-6802 Israel 8120-6799
CAUTION!
South Africa 8120-6807 Switzerland 8120-6807 United Kingdom 8120-6801 U.S.A. and Canada and Mexico 8120-6805
If your installation requires a different power cord than the
one supplied with the server/tower, be sure to use a power cord displaying the mark of the safety agency that defines the regulations for power cords in your country. The mark is your assurance that the power cord can be used safely with the server/tower.
2-2 Installing Your Tower
Page 17
Customizing Your Tower
If all the drives needed at this time are already installed, proceed to “Steps to Connect the Towers” on page 2-10.
If you will be installing additional drives or extending your HP J3278A Server/Tower 7Plus, then use the optional sec­tions below as needed, before proceeding to page 2-10.
• “You can now switch on power to the tower.”,
immediately below
• “Adding an HP SureStore CD-ROM Drive” on page 2-5
• “Adding an Non-HP CD-ROM Drive” on page 2-8
Extending HP J3278A Server/Tower 7Plus
HP C2988A
SureStore
CD-ROM Tower
This accessory most conveniently provides the additional bays for extending beyond the seven drives in the HP J3278A Server/Tower 7Plus. This tower includes a SCSI cable to connect the two towers and an external active HP SCSI terminator to be installed on a rear SCSI connector. SCSI IDs are set automati­cally on HP CD-ROM drives only (not on CD-ROM drives from other vendors), based on their position in the tower. The topmost position on this accessory tower is ID 0 on the second SCSI bus, and the lowest position is ID 6 on the second SCSI bus. All 14 drives are read by the server module located in the HP J3278A server/tower.
To add drives to the 7-bay tower, you can use the sections in this chapter:
• “Adding an HP SureStore CD-ROM Drive” on page 2-5
• “Adding an Non-HP CD-ROM Drive” on page 2-8
Consult the User’s Manual accompanying the 7-bay tower for its specific installation instructions. Complete the SCSI cable con­nection to the HP J3278A server/tower, the SCSI termination connection, and the power cord connection as directed in that manual. The “Steps to Connect the Towers” on page 2-10 include the steps needed to start up both towers.
Note To install the 7-bay tower after the server/tower has been
installed, you must switch off power to the server/tower before installing the 7-bay tower. After installing the 7-bay tower, follow the “Steps to Connect the Towers” on page 2-10 to restart the server/tower.
Installing Your Tower 2-3
Page 18
Other SCSI-2
Devices
As an alternative to the HP 7-bay tower described above, you can attach a chain of up to four SCSI-2 stand-alone (external) drives to the HP J3278A server/tower, using its rear SCSI-2 connector. The connector is 50-pin female high-density micro-D.
CAUTION!
SCSI Chain Limits
No more than four (4) SCSI devices chained from the server
tower.
Cable lengths between devices limited to one (1) meter.
Total external cabling limited to four (4) meters.
Industry-standard SCSI-2 cables and terminators are available in different lengths and with different connector types; obtain cables that match the connectors on your drives. The HP SCSI products in the table below may, or may not, match your drives.
HP Product Meters Type of SCSI Connectors
C2955A C2908A
K2286 1.0
K2296 1.0 92222A
92222B K2291 Active Terminator, 50-pin low-density, (bail lock)
C2904A
0.5
1.0
0.5
1.00
50-pin high-density (thumb screws), male/male 50-pin low-density (bail lock) to high-density (latch
clip), male/male 50-pin low-den sity (bail lock) t o high-density (thumb
screws), male/male 50-pin low-density (bail lock), male/male (For drive-to-drive connections only)
Active Terminator, 50-pin high-density, (thumb screws)
The server tower will manage the second SCSI bus composed of the added drives; you must set the SCSI IDs of your drives for that bus, and terminate the chain.
2-4 Installing Your Tower
Page 19
Adding an HP SureStore CD-ROM Drive
These drives, fully modular and self-configuring, can be installed in any of the seven drive bays in the HP J3276A, J3277A, and J3278A server/towers, and in the HP C2988A SureStore CD­ROM Tower. Drives have attached side rails, used to slide the drive into the bays in these towers. No cables are needed.
You Need Only a Front Cover Key
Optional:
Jumpers
If you are installing an additional HP CD-ROM drive module or you are removing or replacing an existing one, all you need is the front cover key. No tools are required.
Three of the four jumpers on the back of the drive should never need changing when installing into an HP server/tower. One jumper is an option you can set. All are described below:
Prty (Parity).
by the on setting enhances the reliability of the SCSI bus.
Term (Termination).
Termination should not be used in a tower.
Block.
boot a UNIX system from a CD-ROM drive in an HP CD-ROM server/tower.
Eject (Lock).
Eject button is enabled. If you want to prevent others from removing the CD inserted in your drive (such as in an open workgroup setting) you can activate this Eject Lock feature by setting this jumper to on. Then it is impossible to eject a CD inserted in the drive by pressing the Eject button. It is possible to eject the CD only by use of the Emergency Eject button; see page 2-12.
Leave this off (in 2048-block read mode). You cannot
Leave this set to on. The parity check provided
Leave termination disabled—off.
The factory-default setting is off, that is, the
Changing Jumper Settings
1. Place the drive module flat on a firm surface with the back of
2. Find the four black jumpers on the right side of the attached
the drive and the attached connector card facing you.
connector card, to the left of the four colored power wires.
• To set a jumper to on, install it over both pins assigned to
that jumper.
• To set a jumper to off, install it over one pin only.
(If a jumper is removed, it is set to off.)
Installing Your Tower 2-5
Page 20
Installing the
Drive Module
While doing the procedure in “Installation Steps”, take the pre­cautions listed below:
CAUTION!
Make sure that the towers are powered off. Do not attempt to move or carry a tower without hooking the
cover at the bottom and locking the front cover lock.
When replacing the front cover of the tower, make sure that
the flange on the bottom of the cover is engaged in the cut­out opening of the main body. Locking the cover without properly aligning the flange can damage the tower case or cover. The drives can be damaged if moved in this condition.
Do not push the drive module in by pushing on the bezel of
the CD-ROM drive itself. This may result in damage to the drive’s door, or you might snap the plastic bezel of the drive. Always use the metal handles provided with the drive.
Make sure you align the two side rails ofthe CD-ROM drive
module with the grooves in the walls of the tower. If the drive module is not in the grooves, the tower will not func­tion properly.
Do not force the drive module into the tower, or you may
damage the circuit board. Firm pressure should be ade­quate.
Do not use tools of any kind! If the drive module will not
install properly, remove it and call HP for support.
Replace the front cover of the tower by hooking it at the
bottom first. Then close the cover at the top. Lock it.
Installation Steps
2-6 Installing Your Tower
Page 21
1. Place the tower on an even surface, like a table or work bench. Do not use an uneven surface like a carpeted floor. Make sure the tower is powered off.
2. Use the key to unlock the front cover. The cover is locked when the key index points to the right. The cover is unlocked when the key index points up.
3. Place both of your hands on the top two corners of the front cover and carefully pull it towards you. The cover will still be attached at the bottom.
4. You can now remove the front cover by lifting it up, making sure that the flange at the bottom of the cover has cleared the opening of the tower casing. Set the front cover aside.
5. With the front cover off, you can remove a filler panel covering the bay. Hook your finger behind the right or left end and nudge it out slightly. Repeat on the other side. Repeat on each side alternately until the panel pops off.
With the front cover off, you can remove a CD-ROM drive module by placing both hands on the two handles on both sides. Pull the module using even pressure on both handles.
6. You can install a CD-ROM module by aligning the rails with the two grooves provided in each bay of the tower. Slide the module in by holding the two handles on both sides and pushing firmly until it is seated properly. Just before it stops, you should feel the module inserting into its socket.
You can install a filler panel to cover an empty bay. Align the studs on back of the filler panel with the grooves on the sides of the tower. Align the pegs with the holes in the metal at both sides of the front of the tower. Gently push in the left or right side of the panel, then push in the other side, until it pops into place. No screws are needed to secure the panel.
Alignment peg
Hole
Stud
Filler Panel (back view)
7. When you are finished, replace the front cover by first hooking
!
the flange of the cover into the bottom of the tower case. Close the cover by pushing it towards the main body of the tower. Be sure to lock the cover using the key.
8. You can now switch on power to the tower.
Installing Your Tower 2-7
Page 22
Adding an Non-HP CD-ROM Drive
You Need
Mounting Rails
Note IDE and EIDE CD-ROM drives are not supported.
SCSI-2 compatible CD-ROM drives can be installed into the towers. You need to add side rails to the drive to fit it into the tower bays, using HP C2998A Mounting Hardware for Non-HP Drives. The mounting hardware includes four M3 x 0.5" screws and four standard screws. The hardware is compatible with HP J3276A, J3277A, and J3278A server/towers and the 7-bay HP C2988A CD-ROM tower.
Installation Steps
The drive is shown inverted, for rail installa­tion.
1. Make sure that the towers are powered off.
2. Unpack the mounting hardware.
3. Check to see that your CD-ROM drive is SCSI-2 compatible.
4. Set the SCSI ID jumpers on your CD-ROM drive. (Refer to the device’s installation manual. Some SCSI drives may contain special termination instructions.)
Note Set the SCSI ID (using jumpers) to the number etched in the
metal at the side of each bay (inside the tower’s front cover), or choose the bay etched with the number matching the ID.
5. You have received two sets of four screws. You must identify which set fits with the lowest holes on each side of the drive.
Warning! Use only the lowest holes to attach the mounting hardware.
6. Position the mounting hardware along the drive as shown in the illustration above. Align the holes and insert the four screws. The power cord and SCSI ribbon cable should be located toward the bottom of the drive.
2-8 Installing Your Tower
Page 23
7. Plug in the power cord and the SCSI ribbon cable.
8. Perform all the steps in “Installing the Drive Module” section on pages page 2-6 and page 2-7.
Troubleshooting
When plugging in the assembly, the CD-ROM hits one of the other devices or the tower frame.
• The assembly is upside down.
• The CD-ROM drive above or below is upside down.
• One device does not have standard CD-ROM dimensions.
• The mounting hardware is upside down or attached to
the wrong holes.
The assembly does not slide in all the way.
• The assembly is upside down.
• The CD-ROM drive above or below is upside down.
• One device does not have standard CD-ROM dimensions.
• The mounting hardware is upside down or attached to
the wrong holes.
For other problems, see chapter 9, “Troubleshooting”.
Installing Your Tower 2-9
Page 24
Steps to Connect the Towers
Before You Begin
CAUTION!
CAUTION!
bus may be damaged if
disconnect any units
when the power is on.
The SCSI
you connect or
Verify with your network administrator that a 10Base-T (Ethernet) or 100Base-TX (Fast Ethernet) network connec­tion is ready for the server/tower. Locate the twisted-pair network cable (with an RJ-45 connector).
Verify that the tower’s power is off.
Verify that the power supply input voltage is set according to the power standards in the country of use; set the voltage switch on the rear of the tower (see the illustration below) to 115 volts or 230 volts. Also verify that the power cord is appropriate for the country of use (see page 2-2).
If you are extending the HP J3278A Server/Tower 7Plus (using its rear SCSI connector illustrated below), you must complete all cable and termination connections on the tow­ers, and on any stand-alone drives used, before you apply power to the towers or drives. Apply power to the 7-bay tower, or other stand-alone drives, before you apply power to the server/tower. See page 2-3 and page 2-4.
Optional:
Rack Mounting
Input voltage swit ch
Power cord connector
RJ-45 network connector
SCSI connector
(HP J3278A only)
You can mount the tower in a rack using the HP C2982A CD-ROM Tower Rackmount Kit.
1. Attach the power cord to the rear of the tower and to the power line source. Do not switch on power yet.
Note If you are also installing the 7-bay HP C2988A SureStore
2-10 Installing Your Tower
CD-ROM Tower
(to the HP J3278A server/tower), now
install its power cord and then switch on its power.
Page 25
!
of the tower.
3. On the front of the server/tower, switch on the power. Verify that:
Status indicator
2. Attach the network cable to the RJ-45 connector on the rear
Power switch
CD indicator Network indicator Power indicator
•The ON/BUSY indicator lights on the HP CD-ROM drives
go on.
• The 4 indicator lights on the server module (illustrated
above) flash during a power-on self-test.
When the Status indicator (yellow) stops flashing and
remains off, the server/tower is ready for use. Depending on the number of drives in use, this may take a few seconds to five minutes.
The server auto-negotiates the link speed—10 or 100 mega­bits per second—and duplex setting—full or half—with other devices on the network.
4. Press the Stop/Eject button (see illustration on page 2-12) to access the tray of the topmost CD-ROM drive, place a compact disc into the tray, and press Stop/Eject again to close it. Verify:
•The drive’s ON/BUSY indicator light turns off and the
DISC light goes on. If either one flashes continuously,
then either the disc is not standard or there is a problem with the drive; refer to chapter 9, “Troubleshooting”.
•The server’s CD indicator light (green) goes on. If it does
not, then verify your connections and cycle power (switch power off and wait 10 seconds and then switch power on
again) to the server/tower. If CD still does not go on, refer
to chapter 9, “Troubleshooting”.
Repeat step 4 for all drives (including the 7-bay tower if used).
Installing Your Tower 2-11
Page 26
Example Drive
How to Use HP SureStore CD-ROM Drive
Tray door Emergency Eject button
Tray Loading and
Operation
DISC indicator
ON/BUSY indicator
Tray door: Press Stop/Eject button to open door. Insert CD into drawer. Press Stop/Eject button to close door.
Stop/Eject button: Push to eject CD.
Emergency Eject button (recessed): If the automatic Stop/Eject button does not work, switch off power. Insert a paper clip or other thin rigid object in this hole to press the recessed button to eject the CD.
ON/BUSY indicator: On (yellow) when power is switched on.
Flashing continuously when CD is inserted and being
accessed. Off when CD is inserted and not being accessed.
DISC indicator: On (green) when power is on and CD is
inserted. Off if no CD is inserted.
1. While the drive is powered up, push the Stop/Eject button. The tray drawer will slide out in 2–3 seconds.
Stop/Eject button
2. Lay the bare CD into the depression in the tray, label side up.
3. Press the Stop/Eject button again, and the tray will slide shut
Note
We recommend you use the Stop/Eject button to close the
!
2-12 Installing Your Tower
within 2–3 seconds.
tray in a smooth and secure manner. Closing the tray by pressing the front of the drawer by hand is not recom­mended.
Page 27
Care of CD-ROM
Discs
!
Check your CDs periodically to determine if they need cleaning.
If the CD is dusty, you can use a commercially available dust removal spray to blow off dust particles. After removing the dust particles, you can wipe the CD using a clean, soft cotton cloth. Use a straight-line motion, wiping from the center out. Do not wipe the CD in a circular motion.
Correct Procedure for Cleaning a Disc
If a CD becomes dirty or soiled with grease or other contami­nants not removable by wiping, you can clean it with a CD-ROM disc cleaner available at most computer dealers. Follow the directions packaged with the cleaner.
Note Keeping your CD in its original case or in the CD-ROM drive
at all times will prevent it from becoming dirty or damaged.
Installing Your Tower 2-13
Page 28
2-14 Installing Your Tower
Page 29
Setup for IP Networks
If you are running TCP/IP on your network, this chapter 3 describes the basic procedures for getting access to the CDs from the client workstations, for both required and optional configu­ration for IP network, and for access control related to IP. Any workstations running HTTP (HyperText Transfer Protocol) over TCP/IP can use a web browser to most easily access CDs and to do any configuration you need for the HP CD-ROM server.
Many workstations are running other client and transport proto­cols in addition to TCP/IP, such as Microsoft networking (cov­ered in chapter 4), Novell NetWare products (covered in chapter
5), and NFS (covered in chapter 6). We recommend that you
perform the additional protocol-specific procedures, such as mapping drives (mounting) for easy client usage of CD-ROM information. This chapter includes some references to those procedures in the other chapters.
3
Required
Procedure
Novell NetWare/IP, whether used in combination with IPX or under TCP/IP alone, requires you to follow the configuration instructions in “Novell NetWare/IP” on page 5-17 also.
Set the IP Address for the Server
Before you can configure and use the CD-ROM server in the TCP/IP environment, you must cause an available Internet Protocol (IP) address to be assigned to the server. On some systems, you also may need a unique host name to associate with the IP address. This section provides these procedures.
Setup for IP Networks 3-1
Page 30
Before You Begin
Note Do not use the factory-default IP address (192.0.0.192) when
Note If you intend to use WINS, you must set the EnableWINS
Confirm with the network administrator that you may proceed with network configuration.
Obtain an unused IP address from the network administrator.
installing the server. Do not assign an IP address before consulting the network administrator.
If Using DNS or WINS Host Names:
Obtain the unique host name from the network administra­tor. Then associate it with the server’s IP address in your system host table, using the appropriate procedures for your system. Consult your network administrator or your system manuals.
parameter to yes by using one of the methods outlined in “Methods for Configuration” on page 3-13.
Note the LAN hardware address (MAC address) printed on the LAN Address label attached to the server or (top of) the tower. The address is in the form 0060B0hhhhhh (where h is a hexadecimal digit).
Methods for
Assigning the
IP Address
Verify that the CD-ROM server is powered up and connected to the network.
To use a UNIX system to do one of the procedures in this section, obtain root privileges.
To use Windows NT to do one of the procedures in this section, obtain administrator privileges.
In this section the methods are summarized, and then each specific procedure is given. The methods available to you for assigning the IP address to the server depend on your network operating system. Descriptions of each method state which oper­ating systems can use the method.
3-2 Setup for IP Networks
Page 31
Choice of Manual Methods
1. Editing and saving the config.ini file for the server is a universal method usable on any operating system. It requires precision in editing the text of the file, however. See page 3-4 for the details.
ARP
2.
(Address Resolution Protocol) is the easiest method to use on supported systems—Windows NT and UNIX. Details are found on page 3-4 to page 3-5
.
It requires that the IP address is sent to each new device individually. ARP is not routable; the workstation from which the configuration is made must be located on the same network segment as the server. If the default subnet mask and default gateway address, both 0.0.0.0, will not allow access to the server after setting the IP address, then you must use the method 1 above for those parameters.
Choice of Automated Methods
RARP
1.
(Reverse Address Resolution Protocol) downloads the IP address to each device automatically. It requires a rarp daemon on your system. RARP operates within a single net­work segment only. RARP can be implemented by using UNIX; see the details on page 3-6.
BOOTP
2.
(Bootstrap Protocol) is similar to RARP, but operates on the entire network. It requires a bootp daemon on your system. BOOTP can be implemented by using UNIX; see the details on page 3-6.
DHCP
3.
(Dynamic Host Configuration Protocol) allows for the automatic but temporary assignment of IP addresses from a predefined pool of addresses. In the absence of either an active rarp or bootp daemon running on the host, DHCP when enabled will cause the selected host to automatically allocate and download a free IP address, a default gateway (router) address, and a subnet mask to the requesting CD-ROM server. It also sets how long the IP addresses will remain valid. DHCP can be implemented by using UNIX (see the details on page 3-
7) or Windows NT (see the details on page 3-7).
Note Only one of the RARP, BOOTP, or DHCP methods should be
enabled on a network at the same time. If both a BOOTP and a DHCP server on the network provide an IP address, then the BOOTP address is used. If both a RARP and a BOOTP or DHCP server provides an IP address at the same time, the results are undefined.
Setup for IP Networks 3-3
Page 32
Editing the
config.ini
File
To assign the IP address—in any environment—by editing the config.ini file, you must first set up access to the CD-ROM server from a workstation on the network, using the instructions for “Client Access to CDs” in this chapter on page 3-8 or in chap­ter 4, 5, or 6 for your client networking protocol.
Use a text editor to open the config.ini file in the server’s config folder, and edit the InternetAddress parameter in the IP section. Go to “Using a Text Editor to Edit Server’s Files” on page 7-10 for further explanation and for instructions to save this file.
Windows NT:
Using ARP
Notes When you execute the ping command for the first time, the
To asssign the IP address in Windows NT by using the arp command, access the DOS prompt window. Then perform the commands shown below. The
<LAN-address>
can be found on the LAN Address label on the tower (top) or server; each pair of digits must be separated by a hyphen.
arp -s ping
<IP-address> <LAN-address>
<IP-address>
Example:
arp -s 192.124.138.80 00-60-b0-11-00-86 ping 192.124.138.80
The host will return a message similar to “Reply from
192.124.138.80…”, indicating that the address has been set
and that communication with the server is established.
response time may be longer than usual. The ping com­mand enables the server to assign itself the address.
Once the server has communicated using its IP address, the
Restart the server (cycle its power).
3-4 Setup for IP Networks
arp and ping commands cannot be used to change the IP address. This inhibits accidental or unauthorized changes of the IP address.
Page 33
UNIX:
Using ARP
To assign the IP address in UNIX by using the arp command, perform the commands shown below. The
<LAN-address>
can be found on the LAN Address label on the server or (top of) the tower; each pair of digits must be separated by a colon.
arp -s ping
<IP-address> <LAN-address>
<IP-address
temp
Example:
arp -s 192.124.138.80 00:60:b0:11:00:86 temp ping 192.124.138.80
The host will return a message similar to “192.124.138.80 is alive”, indicating that the address has been set and that com-
munication with the server is established.
Note The arp -s command may vary between different systems.
Some BSD-type systems expect the IP address (or host name) and LAN address in reverse order. IBM AIX systems require the additional argument ether for Ethernet net-
works, for example:
arp -s ether salesdept 00:60:b0:11:00:86 temp
When you execute the ping command for the first time, the
response time may be longer than usual. The ping com­mand enables the server to assign itself the address.
Once the server has communicated using its IP address, the
arp and ping commands cannot be used to change the IP address. This inhibits accidental or unauthorized changes of the IP address.
Restart the server (cycle its power).
Setup for IP Networks 3-5
Page 34
UNIX:
Using RARP
To assign the IP address in UNIX by using RARP:
1. Append the following entry to your LAN (MAC) address
table, typically: /etc/ethers. The
<LAN-address>
can be found on the LAN Address label on the server or (top of) the tower; each pair of digits must be separated by a colon.
<LAN-address> <host-name>
Example:
00:60:b0:11:00:86 cdserv
2. Make sure the host table and alias name databases are updated as required by your systems.
3. Start the rarp daemon (if not already running), typically by using the command: rarpd -a
4. Restart the server (cycle its power).
UNIX:
Using BOOTP
Notes The ht and vm fields must be entered exactly as in the exam-
To assign the IP address in UNIX by using BOOTP:
1. Append the following entry to your boot table, typically
/etc/bootptab).
<hostname>
:ha=
<LAN-address>
:sm=
<subnetmask>
:ht=
<hardwaretype>
:ip=
:gw=
:vm=
<vendormagic>
<IP-address>
<gatewayfield>
:\
Example:
cdserv:ht=ether:vm=rfc1048:\ :ha=0060b0110086:ip=192.124.138.80:\ :sm=255.255.255.0:gw=192.124.138.254
ple. For Ethernet, ht=ether.
In the ha field, for
<LAN-address>
use the address found on the server or (top of) the tower. As in the example, use no separators between its digits.
:\
In the ip field, for
3-6 Setup for IP Networks
<IP-address>
use the IP address
assigned by the network administrator.
Page 35
For more explanation of the sm field, subnet mask, and the
gw field, default gateway (router) address, see the “Configu-
ration Parameter Reference” on page 7-13.
2. Make sure the host table and alias name data bases are updated as described in “If Using DNS or WINS Host Names:” on page 3-2.
3. Start the bootp daemon (if not already running), typically by using the command: bootpd -a
4. Restart the server (cycle its power) to download the IP address, default gateway address, and subnet mask.
UNIX:
Using DHCP
Windows NT:
Using DHCP
To assign the IP address in UNIX by using DHCP:
1. Edit or create a scope in the DHCP manager of the dhcp daemon. The entries made in this scope should include:
• Subnet mask
• Default router Internet address
• NetBIOS over TCP/IP name server Internet address(es)
• NetBIOS over TCP/IP node type
Node type:
The server can act either as a B Node (WINS
disabled), or as an H Node (WINS enabled).
• NetBIOS over TCP/IP scope ID
• Lease duration
2. Activate the scope.
3. The DHCPEnable configuration parameter must be left set to the default yes (enabled). See“Configuration Parameter Reference” on page 7-13.
To assign the IP address in Windows NT by using DHCP:
1. Install the DHCP service on an NT server.
2. Open the DHCP Manager (in Administrative Tools)
3. In the Server menu, use Add DHCP Server to Server List to
4. In the Scope menu for a specific server, select Create. Enter:
enter the IP address of each DHCP server on the network.
• Range of IP addresses in a subnet that can be leased
• Subnet mask for the address range
• IP addresses to be excluded from the scope
• Lease duration (can be defaulted)
• Scope name
Setup for IP Networks 3-7
Page 36
5. Using the DHCP Options, configure the Default Gateway if the default 0.0.0.0 is not appropriate.
6. Select Activate in the Scope menu.
Client Access to CDs
Methods for
Providing Access
HTTP:
Using a Web
Browser
For TCP/IP networks, two methods for client workstations to access the server and its CDs are possible.
A web browser can be used for access immediately after an IP address is assigned (see the beginning of this chapter).
Clients can map drives to the server, a CD-ROM drive, or a particular CD.
The HP CD-ROM server supports HTTP over TCP/IP. This means that the server works as a World-Wide Web server. To access the CD-ROM server’s web page, you must first config­ure the server with an IP address as described in the section that begins this chapter.
After you set up web access to the server according to the proce­dure in that section, HTTP support can be switched off and on by setting the server’s configuration parameter HTTPEnable to off or on (default setting on). See “Methods for Configuration” on page 3-13.
The server can be accessed using any standard web browser, such as Netscape Navigator or Microsoft Internet Explorer. This procedure uses Internet Explorer as an example.
1. Start Internet Explorer.
2. From the File menu, select Open Location... The following
3-8 Setup for IP Networks
dialog is displayed:
Page 37
3. Enter the URL of the server as http://
<IP-address>
Alternatively, use the host name associated with the IP address and assigned to the server.
4. Click OK. You should see the web page of the server, as shown below.
When the CD Access tab is selected, a list of the server’s CDs and DVD-ROMs is displayed. Click on a CD to view a list of its contents. Thus you can browse the CDs as in any other file man­agement utility.
Some CDs contain an index.htm or index.html file that pro­vides access to the disc contents on a web page you can use with the browser. If you click on such a CD, that web page will appear in place of the simple list. However, you can see the simple list rather than the index page by adding /. after the location address.
For easy access to your server resources, web pages can be saved in your web browser.
Netscape Navigator: Bookmarks, Add Bookmark
Microsoft Internet Explorer: Favorites, Add Favorites
Thereafter you can choose the page from your bookmarks menu.
Note Web browsers may save pages in local cache memory. In this
case, if a CD in a drive is changed; returning to the CD Access tab will not show the changed CD. You must reload the web page.
Setup for IP Networks 3-9
Page 38
Mapping Drives
An additional way to make the CDs available to workstations on the network (clients) is the same as used with file servers: “map­ping” the server to a drive letter on PC systems, or “mounting” on UNIX systems. After the server is mapped or mounted, the client accesses the server, with its CDs (and optionally its config­uration parameters), just like any other attached disk drive or networked file server.
The mapping or mounting procedure depends on the network operating environment and client system. Use the procedures in subsequent chapters as follows:
Microsoft & IBM Networks (SMB). . . . . . . . . . . . . . chapter 4
(Clients: Windows 95, Windows NT, Windows for Work­groups, OS/2, and DOS)
Novell NetWare (NCP) . . . . . . . . . . . . . . . . . . . . . . chapter 5
(Clients: Windows 95, Windows NT, Windows for Work­groups, and DOS)
UNIX (NFS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . chapter 6
Configuration
Tips
Configuring the Server
By making configuration changes, you can customize server operation and can set access rights for security.
Some server configuration changes you might need are listed below. Some of these items are detailed in this section:
Set up or change the server name for NetWare or for Microsoft networking clients (SMB), or change the domain or workgroup name for SMB. (See page 4-12.)
Set up a password or other access right restrictions, some of which are specific to other networking and client protocols. (see chapters 4, 5, and 6 for other protocols).
Disable server protocols, such as NetWare (page 5-10), SMB on NetBIOS/NetBEUI, SMB on NetBIOS/TCP/IP (page 4-
12), and NFS (page 6-4), to prevent blanket access for proto­cols for which you have not configured access restrictions.
Disable access to the server through other protocols, or through web browsers.
3-10 Setup for IP Networks
Set up Internet and SNMP parameters.
Set the server’s time.
Page 39
If you have installed CD-ROM disc changers, see page 9-12 to set the JukeBoxLockTime parameter to prevent disc changer flutter.
Where to Find Configuration
Information
Server’s Time
Configuration
More extensive information is provided in this section for some of the configuration options, if they are general needs or relate specifically to TCP/IP networks. (Setting the IP address, a required configuration for TCP/IP, however, is described earlier in this chapter.) Configuration options specific to Microsoft net­working, Novell NetWare, or UNIX/NFS are addressed in chap­ters 4, 5, and 6, respectively.
For configuration options that do not need extensive explanation here, see the list of configuration parameters on page 7-13 and the description of the access rights starting on page 7-5. If you use the web page for configuration, an option described later in this section, online Help is available to you.
For instructions on using the configuration tools, see “Methods for Configuration” on page 3-13.
The server’s clock has a volatile memory, so the correct time must be set whenever the server is restarted.
Manually Configuring Date and Time
One alternative is to manually configure the server’s Date and Time parameters whenever the server is restarted. Set the con-
figuration parameters as follows.
Parameter Name Example Value Description
Date 97-06-28 Time 14:46:30
yy-mm-dd hh:mm:ss
Note If you are editing the config.ini file as your configuration
method, follow the setting with an exclamation mark.
Setup for IP Networks 3-11
Page 40
Setting Up the Network Time Protocol
An alternative to manual configuration is automatic time syn­chronization using the Network Time Protocol (NTP, as defined by RFC 1769). Set these configuration parameters:
Parameter Name Example Value Description
Disabling Access
for Other
Protocols
TimeSyncSource NTP
NTPServer 192.4.2.30
Or use NetWare NDS Time Synchronization
(a general server parameter) to set Network Time Protocol
(an IP parameter) IP address or Internet domain name of a server to supply the network time.
(see chapter 5)
For security, you can switch off all access to the server through other protocols for which you do not set up access restrictions, by setting configuration parameters in this table. Use the last item in the table if you ever want to disable all web browser HTTP access.
Area Parameter Name Description
SMB EnableNetBEUI
SMB EnableNBT
Disables access to the CD-ROM server using SMB over NetBIOS/NetBEUI.
Disables access to the CD-ROM server using SMB over NetBIOS/TCP/IP.
.
Server Password
NetWare NWEnable
NFS NFSEnable
IP HTTPEnable
Disables access to the CD-ROM server using NetWare.
Disables access to the CD-ROM server using NFS.
Disables web access to the CD-ROM server using HTTP.
You can change the following general server configuration parameter:
Parameter Name
ServerPassword
Example Value
fy98db
Default:
pass
Description
The Supervisor , Administra tor , or Root password used for protocols HTTP, NetWare bindery, SMB user level, SNMP, and FTP. After the configur ation is written, the pass word appears as an asterisk * for each character.
3-12 Setup for IP Networks
Page 41
Server/CD-ROM
Access Rights
The HP CD-ROM server can be configured to restrict user access to CD-ROM drives, to individual CDs, and to the server configu­ration. You can limit the number of users simultaneously access­ing any CD to comply with user-license restrictions.
Access restrictions are set individually for each protocol (Net­Ware, SMB, NFS, and HTTP). The default settings in some pro­tocols provide full access rights to all users, so we recommend that you implement at least two access restrictions:
Restrict access to the config and volumes directories.
Disable all protocols not being used. If unused protocols are not disabled, a user accessing the server through such a pro­tocol may be given full access rights, regardless of the secu­rity configurations in other protocols. (See page 4-12, page 5­10, and page 6-4.)
Access restrictions are set individually for each CD-ROM drive, for the CDs inserted into the drives, and for the server configu­ration files. The corresponding parameter values are stored in individual access-control files in the server. Not all parameters are used in every access file. Refer to the “File System Descrip­tion” starting on page 7-3.
Methods for
Configuration
If you use Windows NT domains or NetWare NDS, you also can set up access restrictions for those environments. See page 4-15 and page 5-10.
There are two primary methods on IP networks for configuring the server and the access rights:
A web browser can be used to access the server’s web page, as long as HTTP is available. Just as you use the CD Access tab to see the CDs (see page 3-8 above), you can use the other three tabs—Basic Setup, Advanced Configuration, and Management and Access Rights—for configuring. This is an easy way to make changes in the configuration and access files stored on the server. See the section “Using a Web Browser and Server Web Page” on page 7-8 for details.
A text editor can be used to directly edit and save the config­uration and access files stored on the server. Precision in editing the files is required. (These access rights can be restricted for other client workstations.) See “Using a Text Editor to Edit Server’s Files” on page 7-10 for details.
Setup for IP Networks 3-13
Page 42
3-14 Setup for IP Networks
Page 43
Setup for Microsoft Networks (SMB)
This chapter describes the setup for Microsoft and IBM networks running SMB (Server Message Block). SMB is a protocol that makes use of NetBIOS. NetBIOS can be trans­ported over different network protocols. The HP SureStore CD-ROM server supports the following transport methods automatically:
SMB over NetBIOS/NetBEUI (NetBIOS Extended User Interface)
SMB over NetBIOS/TCP/IP (also called NBT)
4
Clients using SMB could be running Windows 95 or 98, Windows NT, Windows for Workgroups, OS/2, or DOS. This chapter includes examples of procedures for such client systems. You may need to refer to your network operating system manuals for assistance with specific procedures.
If you are running TCP/IP on your network as well as SMB, refer to chapter 3 to assign the IP address to the server (the “Set the IP Address for the Server” section from page 3-1 to page 3-8) before granting access to clients.
Following that section of chapter 3 are instructions for accessing the CDs and configuring the server by using a web browser (starting on page 3-8). For IP and HTTP installa­tions, we recommend use of those instructions for client access and configuration in addition to the methods follow­ing in this chapter 4.
Setup for Microsoft Networks (SMB) 4-1
Page 44
Client Access to CDs
The procedures for accessing your HP CD-ROM server are similar to accessing any other workstation or file server. Users at workstations (clients) on the network use the same proce­dures to access both types of servers, For easy access to the CDs from applications, the server should be made available to each client system—”mapped” to a drive letter on PC systems. After the server is mapped, the client accesses the server, with its CD-ROMs (and optionally its configuration parameters) just like any other attached disk drive or networked file server.
The mapping described in this section can be done on one work­station by one administrator or installer first. Then any configu­ration tasks for the server setup can be done (described later in “Configuring the Server” on page 4-11), before setting up all the network clients according to the procedures in this section.
1. Select Access Point
2. Map Drives
Notes The examples below assume that you have not changed the
Different workstations need different points of access to the server. The network administrator or installer, for example, needs access to configure and monitor the server and to config­ure access rights. Then, the administrator may want to set up all the clients with access to the CDs, bypassing the configuration and security files stored on the server. Choices for the latter setup include mapping all the CDs in the server and mapping each drive or CD separately.
The procedures for mapping drives require you to select an access point. We recommend using the description of access points and the file system used on the server, in the reference chapter starting on page 7-2, before proceeding.
This section gives you examples of how to set up access to the server from clients for Windows 95, Windows NT, Windows for Workgroups, OS/2, and DOS.
server name for SMB: HP six digits of the server’s LAN hardware (MAC) address. If you have changed the server name (see page 4-12), that assigned name appears instead.
hhhhhh
, where
hhhhhh
are the last
You can set the configuration parameter ShowAllShares so
4-2 Setup for Microsoft Networks (SMB)
that the only files seen are the CDs. Then folders such as config and root will not be seen when accessing the server. However, these folders can still be accessed by manu­ally inserting the path to the folder when mapping the drive.
Page 45
Windows 95 and Windows NT 4.0
1. Start the Windows Explorer from the Start Programs Menu.
2. Expand the Network Neighborhood icon. The available resources are displayed.
3. Expand the Entire Network icon to display the server name. and then open the Workgroup folder. If there is a “Workgroup” folder, the server will appear within it. If there is no “Work­group” folder, the server will appear in the (alphabetically) first workgroup listed.
4. Start the Windows Explorer from the Start menu.
5. Select Map Network Drive... from the Tools menu.
6. Select a drive letter.
7. In the path box, type \\HP
Skip ahead to step 11 if you see the server. However, if you cannot find a workgroup containing the server name in Net­work Neighborhood, then continue here with step 4:
hhhhhh
\root, where
hhhhhh
are the last six digits of the server’s LAN hardware (MAC) address.
Setup for Microsoft Networks (SMB) 4-3
Page 46
8. This maps the administrative root access to the server. If you wish to use this root access for the same drive letter the next time you start your computer, check Reconnect at Logon. (If you wish to select another level of mapping, see step 10 below.)
9. Click the OK button. The server is now ready for use.
10. Optional: If you have other SMB domains or workgroup names defined and the server did not appear within them, you now can use this client to edit your server configuration to change the parameter Domain/GroupName to the name of your existing domain or workgroup.
See page 4-12.
If you wish to map the server to a different level than root level (as described in step 12 below), you can then return to step 1 of the procedure above to redo the mapping as desired.
11. Double-click the entry for your new server. The default entry name is HP
hhhhhh
, where
hhhhhh
are the last six digits of the
server’s LAN hardware (MAC) address.
Note The individual CDs are shown as well as the cd folder that
contains them. This is not the normal hierarchical appear­ance, but it is done this way to give you the choice of mount­ing either individual CDs or all of them together.
If the SMB configuration parameter ShowAllShares has been set to no (see chapter 7), the only files you will see are the CDs.
12. To map a resource to a drive letter, right-click one of the fol­lowing server resources:
• For root access, right-click root.
•For cd folder access, right-click the cd folder.
• For CD-ROM access, right-click the specific CDROM
folder name.
13. From the pop-up menu, select Map Network Drive.
4-4 Setup for Microsoft Networks (SMB)
Page 47
14. Select a drive letter for your server or use the default drive letter.
15. Check Reconnect at Logon if you wish to use the server resource as the same drive letter the next time you start your computer.
16. Click the OK button. The server is ready for use.
Note In the Microsoft network environment, network resources
are accessed by specifying a server and a resource on that server using the Universal Name Convention (UNC) as:
\\server\resource
The resource is not a file path. You may not replace the resource name with the path to a file or folder on your CD. Therefore, if using the file system as outlined in the “File System Description” on page 7-3, only cd folder access would be possible (see “Access Points” on page 7-2). However, the server also allows you to map the following resources on SMB clients:
root, which includes the complete file system of the
server. Map a network drive to root for root-level access.
cd_
nnnnn
, a folder for each CD (or CD-ROM drive if an
alias name for the SCSI ID has been set). Map a network drive letter to cd_
nnnnn
to map an individual CD.
Setup for Microsoft Networks (SMB) 4-5
Page 48
Windows for
Workgroups
1. Start File Manager.
2. From the Disk menu, select Connect Network Drive. The fol­lowing dialog is displayed.
3. Select a drive letter or accept the default.
4. In the Path field, type an entry for your server:
\\hp
hhhhhh\<path>
hhhhhh
are the last six digits of your server’s LAN hard-
ware (MAC) address.
<path>
is the path of the resource that provides your
selected access point on the server.
• For root access, type root
•For cd folder access, type cd
• For CD-ROM access, type the specific volume name
5. Check Reconnect at Startup if you wish to use the same mapping the next time you start your computer.
6. Click the OK button. The server is ready for use.
The server appears in the workgroup named “Workgroup”, or in the (alphabetically) first workgroup listed. Or, you now can use this client to edit your server configuration to change the parameter Domain/GroupName to the name of your existing domain or workgroup. Seepage 4-12.
4-6 Setup for Microsoft Networks (SMB)
Page 49
Windows NT 3.51 1. Start the File Manager.
2. From the Disk menu, select Connect Network Drive.
3. Select a drive letter or accept the default.
4. In the Path field, type an entry for your server:
\\hp
hhhhhh\<path>
hhhhhh
are the last six digits of your server’s LAN hard-
ware (MAC) address.
<path>
is the path of the resource that provides your
selected access point on the CD-ROM server.
• For root access, type root
•For cd folder access, type cd
• For CD-ROM access, type the specific volume name, for
example, cd_12345
5. Check Reconnect at Startup if you wish to use the same mapping the next time you start your computer.
6. Click the OK button. The server is ready for use.
Setup for Microsoft Networks (SMB) 4-7
Page 50
IBM Peer for OS/2 Make sure you have IBM Peer for OS/2 installed. If not, do the
procedure on page 4-9 instead of the procedure on this page.
1. Double-click the OS/2 Peer icon. The Peer window opens:
2. Double-click the Sharing and Connecting icon to open the following window:
4-8 Setup for Microsoft Networks (SMB)
Active connections will be listed in the window.
Page 51
3. From the Connection menu, select Create. The following dialog is shown:
4. In the Workstation field, enter HP
hhhhhh
, where
hhhhhh
are
the last six digits of the server’s LAN hardware address.
5. In the Share/alias field, enter the name of the server folder or an individual CD-ROM:
• For root access, type root
•For cd folder access, type cd
• For CD-ROM access, type the specific volume name, for
example, cd_12345
6. In the Local device name field, select a drive letter to map.
7. Click Create. The server is ready for use.
Note The server folders will not be visible on the Desktop in OS/2
versions prior to OS/2 WARP Connect. If you wish to use an earlier version of OS/2, we recommend using third-party NFS software to connect to the server.
If you do not have IBM Peer for OS/2
The server can be mapped to a drive letter using the net use command, as follows:
1. Open an OS/2 window.
2. At the OS/2 prompt,enter:
net use
hhhhhh
<drive-letter>
are the last six digits of your server’s LAN hard-
ware (MAC) address.
<path>
is any server folder.
: \\HP
hhhhhh\<path>
Setup for Microsoft Networks (SMB) 4-9
Page 52
3. To make the connections active each time you boot up, create or edit the startup.cmd file to include the net use command.
DOS The CD-ROM server is mounted using the net use command,
provided that the appropriate network support is installed.
1. At the DOS prompt, enter the following:
net use
hhhhhh
<drive-letter>
: \\HP
hhhhhh\<path>
are the last six digits of the server’s LAN hard­ware (MAC) address. In the examples below, the example full LAN hardware address used is 0060B0CD000B.
<path>
is the path of the folder that provides your selected access point on the server.
Example of root access:
net use E: \\HPcd000b\root
Example of cd folder access:
net use F: \\HPcd000b\cd
Example of CD-ROM access:
net use G: \\HPcd000b\cd_12345
2. To make the connection permanent, edit your autoexec.bat file to include your net use command.
Notes If you are using DOS within Windows 95/98 or Windows NT
If you are using DOS within Windows NT , you may use the
4-10 Setup for Microsoft Networks (SMB)
4.0, and you wish to access file or directory names longer than 8 characters, you will need to precede these long names with a quote mark (
“).
An example of changing to the directory named Product Information:
G:\HPcd000b\CD\>cd ”PRODUCT INFORMATION
* wildcard.
An example of quickly changing to that directory:
G:\HPcd000b\CD\>cd ”PRODUCT*
Page 53
Configuring the Server
By making configuration changes, you can customize server operation and can set access rights for security.
Configuration
Tips
Where to Find Configuration
Information
Some server configuration changes you might need:
Disable access to the server using protocols other than SMB.
Set up a password for the server.
Set up CD access rights using using share-level security, or using user-level security with NT domain authentication.
Set the server’s time.
If you have installed CD-ROM disc changers, see page 9-12 to set the JukeBoxLockTime parameter to prevent disc changer flutter.
More extensive information is provided in this section for some of the configuration options, if they are general needs or relate specifically to SMB networks. If you are also using TCP/IP on your network, see chapter 3 for additional features. If you are also using Novell NetWare, see chapter 5 for additional features.
For configuration options that do not need extensive explanation here, see the list of configuration parameters on page 7-13 and the description of the access rights starting on page 7-5. If you use a web browser for configuration, one of the options described later in this section, online Help is available to you for explana­tion.
Your procedures for performing the configuration of the server are described below the configuration explanations, in the sec­tion “Methods for Configuration” on page 4-17.
Setup for Microsoft Networks (SMB) 4-11
Page 54
Disabling Access
for Other
Protocols
For security, you can switch off all access to the server through other protocols for which you do not set up access restrictions, by setting configuration parameters in this table. Use the last two parameters in the table if you ever want to disable access through SMB.
Area Parameter Name Description
Server’s Time
Configuration
IP HTTPEnable
NetWare NWEnable
NFS NFSEnable
SMB EnableNetBEUI
SMB EnableNBT
Disables web access to the CD-ROM server using HTTP.
Disables access to the CD-ROM server using NetWare.
Disables access to the CD-ROM server using NFS.
Disables access to the CD-ROM server using SMB over NetBIOS/NetBEUI.
Disables access to the CD-ROM server using SMB over NetBIOS/TCP/IP.
The CD-ROM server’s clock has a volatile memory, so the correct time must be set whenever the server is restarted.
Set Date and Time
To manually configure the server’s Date and Time parameters whenever the server is restarted, set the following general server parameters.
Note If you are editing the config.ini file as your configuration
How and Where
Server Appears
Parameter Name Example Value Description
Date 97-06-28 Time 14:46:30
yy-mm-dd hh:mm:ss
method, follow the setting with an exclamation mark.
To change the server name to text that is easy for your clients to identify, set the following SMB parameter:.
Parameter Name Example Value Description
Name of the server in the Microsoft network environment. The default is
HP
ServerName grafxcd
hhhhhh
are the last 6 digits of the server’s LAN hardware (MAC) addre ss .
, where
hhhhhh
4-12 Setup for Microsoft Networks (SMB)
Page 55
So that the server will appear in your SMB domains or work­groups, change the following SMB parameter:.
Parameter Name Example Value Description
Server/CD-ROM
Access Rights
Domain/GroupName Finance
Existing SMB domain or workgroup name.
The HP CD-ROM server can be configured to restrict user access to CD-ROM drives, to individual CDs, and to the server configu­ration. A password can be configured for SMB user-level access control. You can limit the number of users simultaneously accessing any CD to comply with user-license restrictions. And we recommend that you restrict access to the config and volumes directories on the server.
Access restrictions are set individually for each protocol. If you use other network protocols in addition to SMB, consult the other chapters for setup of those protocols. (The default settings in some protocols provide full access rights to all users, so we recommend that you disable all protocols not being used. If you do not, a user accessing the server through such a protocol may be given full access rights, regardless of the security configura­tions in other protocols.)
Server Password
One access restriction that is set for access to the server gener­ally is the server password. You can change the following gen­eral parameter:
Parameter Name
ServerPassword
Example Value
fy98db
Default:
pass
Description
The Supervisor , Administra tor , or Root password used for protocols HTTP, NetWare bindery, SMB user level, SNMP, and FTP. After the configur ation is written, the pass word appears as an asterisk * for each character.
Setup for Microsoft Networks (SMB) 4-13
Page 56
Share-Level Access Control
A password can be assigned to any CD-ROM server folder or any CD inserted in a connected drive. The user will automatically be prompted for the password when trying to access the shared folder. Access will then be granted to the folder and all subfold­ers.
To set this access control, set the following SMB (Windows) parameter (stored in the config.ini file in the config folder):
Parameter Name Value Description
SecurityMode userLevel
This setting implements user­level access control.
Use the SMBPassword access control parameter (in the relevant files stored in the volumes folder). The following values are valid:
SMBPassword
*
<password>
Description
No passw ord required to ac cess the f older with Microsoft networking
A valid password (15 characters maximum) (blank) No access with Microsoft networking
To assign a password to a server folder or to a CD, or to change an old password:
Example 1: Restrict access by prompting the user to enter a password, for example, “pass”:
SMBPassword = PASS
4-14 Setup for Microsoft Networks (SMB)
Example 2: Grant access to all Microsoft networking users:
SMBPassword = *
Page 57
User-Level Access Control
You can implement user-level security authenticated by an NT domain controller. A user logging in to the server must provide her identity (name and domain) and password. The server uses this information to validate her identity against the primary domain controller (PDC). It actually logs in to the PDC, reads the user's group membership, and then logs out. If its login is successful, the user is allowed access to the server.
For SMB, the server maintains an administrator account that is never authenticated against the primary domain controller, because some method of access must be maintained in case the PDC becomes unavailable.
For this access control, set the following SMB (Windows) para­meters (stored in the config.ini file in the config folder):
Parameter Name Value Description
Implements user-level access con-
SecurityMode userLevel
trol (authentication against PDC), rather than share-level control.
Authentica­tionDomain
Administra­torPassword
Logging in.
<15-byte string>
<15-byte string>
Then, to log in as the local administrator on the
Name of the domain that all user's identities are verified against. User's account must res ide within.
Passw ord of the of the server (not the same as an administra tor with an acco unt in the domain).
local
administrato r
server, you will need to specify:
Domain: the name of the server
User: the administrator
Password: the contents of AdministratorPassword parameter (see above)
Controlling Rights.
Under user-level SMB access control,
security rights can be set individually or by group membership. The SMBUser/Group access-control parameter is used to create entries for the user and group rights (in the relevant files stored in the volumes folder). There can be as many of these entries as needed in a particular file.
Setup for Microsoft Networks (SMB) 4-15
Page 58
Default Example: (Your entry may already have changes.)
SMBUser/Group = <DOMAIN>/Domain Users(RX)(RX)
<DOMAIN>/ remains in the entry. When the file is used, the
value for the AuthenticationDomain parameter (shown above, and stored in the config.ini file) will be used for
<domain>. / appears in the file. Domain Users must be replaced by a user or group name
on the PDC for which you will specify the rights. RX —in the first pair of parentheses—must be replaced by
directory rights for that name. "RX", for example, assigns read and execute rights to the user or group specified.
RX —in the second pair of parentheses—must be replaced by file rights for that name. "RX", for example, assigns read and execute rights to the user or group specified.
RX allowable values (for both cases) are listed below. These rights values are cumulative, making the user's effective rights the sum of all rights gained from direct trustee assignments and from group memberships:
NONEspecifies no rights Rspecifies read rights Xspecifies execute right Allspecifies all rights
Repeat the line of text for further user or group specifications.
Complete Example:
User/Group = <DOMAIN>/Domain Admins(All)(All)
SMB
4-16 Setup for Microsoft Networks (SMB)
Page 59
Methods for
Configuration
Methods used on Windows and IBM OS/2 systems for configur­ing the server and the access rights include the following. The parameters and settings described above can be set with any method:
Any text editor can be used to directly edit and save the con­figuration and access files stored on the server. Precision in editing the files is required. (These access rights can be restricted for other client workstations.) See “Using a Text Editor to Edit Server’s Files” on page 7-10 for details.
For Windows 95/98 and NT 4.0 systems, the HP CD-ROM Server Utility software can be downloaded from HP’s elec­tronic distribution sites. For details see “Electronic Support Services” on page A-1. This software utility provides an easy-to-use graphical interface; using it makes changes in the configuration and access files stored on the server.
If TCP/IP and HTTP are available, then a web browser can be used to access the server’s web page. This is an easy way to make changes in the configuration and access files stored on the server. See the section “Using a Web Browser and Server Web Page” on page 7-8 for details.
Setup for Microsoft Networks (SMB) 4-17
Page 60
4-18 Setup for Microsoft Networks (SMB)
Page 61
Setup for Novell Networks
This chapter describes the setup for Novell networks running NCP (NetWare Control Protocol). The HP SureStore CD-ROM server supports NCP transported over IPX and/or NetWare/IP. The Novell network products could be NetWare 3.x, 4.x, or Intranetware. Clients using NCP could be running Windows 95 or 98, Windows NT, Windows for Workgroups, OS/2, or DOS. This chapter includes examples of procedures for many such installations. You may need to refer to your network operating system manuals for assistance with specific procedures for some client systems.
5
If you are running TCP/IP on your network as well as Novell products, refer to chapter 3 to assign the IP address to the server (the “Set the IP Address for the Server” section from page 3-1 to page 3-8) before granting access to clients.
Following that section of chapter 3 are instructions for accessing the CDs and configuring the server by using a web browser. For IP and HTTP installations, we recommend use of those instructions for client access and configuration in addition to the methods following in this chapter 5.
Setup for Novell Networks 5-1
Page 62
Client Access to CDs
The procedures for accessing your HP CD-ROM server are similar to accessing any other NetWare file server. Users at workstations (clients) on the network use the same procedures to access both types of servers, For easy access to the CDs from applications, the server should be made available to each client system—”mapped” to a drive letter on PC systems. After the server is mapped, the client accesses the server, with its CD-ROMs (and optionally its configuration parameters) just like any other attached disk drive or networked file server.
The mapping described in this section can be done on one work­station by one administrator or installer first. Then any configu­ration tasks for the server setup can be done (described later “Configuring the Server” on page 5-9), before setting up all the network clients according to the procedures in this section.
1. Select Access Point
2. Map Drives
Note The examples below assume a default CD-ROM server name
Different workstations need different points of access to the server. The network administrator or installer, for example, needs access to configure and monitor the server and to config­ure access rights. Then, the administrator may want to set up all the clients with access to the CDs, bypassing the configuration and security files stored on the server. Choices for the latter setup include mapping all the CDs in the server and mapping each drive or CD separately.
The procedures for mapping drives require you to select an access point. We recommend using the description of access points and the file system used on the server, in the reference chapter starting on page 7-2, before proceeding.
The examples in this section are for Microsoft client software on Windows 95/98, Windows NT, Windows for Workgroups, and DOS. For use of Client 32, you may need to make substitutions in these procedures.
for NetWare: HP digits of the server’s LAN hardware (MAC) address. Your server name will be different if you have changed the server name or if you are using NetWare/IP.
hhhhhh
_NW, where
hhhhhh
are the last six
5-2 Setup for Novell Networks
Page 63
Windows 95 and Windows NT 4.0
1. Start the Windows Explorer from the Start Programs Menu.
2. Expand the Network Neighborhood icon. The available resources are displayed.
3. Expand the Entire Network icon and open the NetWare networking folder.
4. Start the Windows Explorer from the Start menu.
5. Select Map Network Drive... from the Tools menu.
6. Select a drive letter.
7. In the path box, type \\HP
Skip ahead to step 10 if you see the server. However, if you cannot find the server name in NetWare, then continue here with step 4:
hhhhhh
\root, where
hhhhhh
are the last six digits of the server’s LAN hardware (MAC) address.
Setup for Novell Networks 5-3
Page 64
8. This maps the administrative root access to the server. If you wish to use this root access for the same drive letter the next time you start your computer, check Reconnect at Logon. (If you wish to select another level of mapping, see step 13 below.)
9. Click the OK button. The server is now ready for use.
10. Double-click the entry for your new server. The default entry name is HP
hhhhhh
, where
hhhhhh
are the last six digits of the server’s LAN hardware (MAC) address. The name can be changed later during configuration.
11. If you are using bindery mode, you will be prompted to enter your user name and password, unless you are already logged in. (Before the server has been set up, all users have full access to it.)
12. Once you are logged in to the server, you should see the avail­able CDs by their volume names, as well as the sys folder. Expand sys to see the cd folder (which also contains all the volumes).
5-4 Setup for Novell Networks
Page 65
13. To map the server to a drive letter, right-click one of the following server resources:
• For root access, right-click the sys folder.
•For cd folder access, right-click the cd folder.
• For CD-ROM access, right-click the specific CD-ROM vol-
ume folder.
If you do not wish to map the server to a drive letter, just continue to explore the server until the file you need is found.
14. From the pop-up menu, select Map Network Drive...
15. Select a drive letter for your server.
16. Check Reconnect at Logon if you wish to use the server resource as the same drive letter the next time you start your computer.
17. Click the OK button. The server is ready for use.
Setup for Novell Networks 5-5
Page 66
Windows for
Workgroups
1. Start File Manager.
2. From the Disk menu, select Connect Network Drive… The following dialog is displayed. If you also have Microsoft Network installed, you may have to click the NetWare button to display the dialog.
3. Click the Select NetWare Connection button on the toolbar.
4. Select the entry for your new server. The default entry name is HP
hhhhhh
_NW, where
hhhhhh
are the last six digits of the server’s LAN hardware (MAC) address. The name can be changed later during configuration.
5. Click the Login button.
6. If you are using bindery mode, you will be prompted to enter your user name and password, unless you are already logged in. (Before the server has been set up, all users have full access.)
5-6 Setup for Novell Networks
Page 67
7. Once you are logged in to the server, click the Drive Connec­tions button on the toolbar. The following dialog is displayed.
8. Double-click HP
hhhhhh
_NW\SYS (where
hhhhhh
are the last
six digits of the server’s LAN hardware (MAC) address). Then double-click the CD folder to display the following dialog.
Setup for Novell Networks 5-7
Page 68
9. Select a drive letter in the Drives listing and then:
• For root access, select HP
hhhhhh
_NW_SYS in the
Resources list.
•For cd folder access, select the CD folder in the Resources
list.
• For CD-ROM access, select the specific CD-ROM folder
name (inside the CD folder) in the Resources list.
If you are using bindery mode, the CDs will appear at the same level as the sys volume.
10. Click Map to map the server to the selected drive letter.
11. Click Permanent if you wish to use the server as the same drive letter the next time you start your computer.
12. Click the Exit button on the toolbar. The server is ready for use.
DOS The server is mounted using the map command.
1. On a NetWare file server, at the DOS prompt enter the following:
map root <
hhhhhh
drive-letter>
:=hp
hhhhhh
_NW/
<path>
are the last six digits of your server’s LAN hard­ware (MAC) address. In the examples below, the full LAN hardware address assumed is 0060B0CD000B.
<path>
is the path of the folder that provides your selected access point on the server.
Example of root access:
map root E:=HPcd000b_NW/SYS:
Example of cd folder access:
map root F:=HPcd000b_NW/SYS:/CD
Example of CD-ROM access:
map root G:=HPcd000b_NW/SYS:/CD/cd_18881
2. To make the connection permanent, edit your autoexec.bat file to include your map command.
5-8 Setup for Novell Networks
Page 69
Login Scripts
Alternative
As an alternative to setting up clients individually as described above, login scripts can be used to automate and distribute access to the CDs. To map the networked CDs, the attach/map (in NetWare 3.x) or login/map (in NetWare 4.x) commands are normally used.
Configuring the Server
By making configuration changes, you can customize server operation and can set access rights for security.
Configuration
Tips
Some Novell environments require some configuration of the server itself before setting up the client access, including the following. The configuration is included in this section.
Novell NetWare 4.x NDS (Novell Directory) Server
Novell NetWare/IP
Novell NetWare 3.x bindery server networks allow some access configuration options to be configured, which can be done either before or after giving access to all the clients.
Some other server configuration changes you might need:
Disable access to the server using protocols other than NetWare.
Set up or change the server name for Novell clients.
Set up a password to be used with the bindery server.
Set the server’s time.
If you have installed CD-ROM disc changers, see page 9-12 to set the JukeBoxLockTime parameter to preventdisc changer flutter.
Where to Find Configuration
Information
More extensive information is provided in this section for some of the configuration options, if they are general needs or relate specifically to Novell networks. If you are also using Microsoft networking, see chapter 4 for additional features.
For configuration options that do not need extensive explanation here, see configuration parameters list on page 7-13 and the description of the access rights starting on page 7-5. If you use a web browser for configuration, one of the options described later in this section, online Help is available to you for explanation.
Your procedures for performing the configuration of the server are oulined after the configuration explanations, on page 5-20.
Setup for Novell Networks 5-9
Page 70
Disabling Access
for Other
Protocols
For security, you can switch off all access to the server through other protocols for which you do not set up access restrictions, by setting configuration parameters in this table. Use the last parameter in the table if you ever want to disable access through NetWare.
Area Parameter Name Description
NDS Server
SMB EnableNetBEUI
SMB EnableNBT
IP HTTPEnable
NFS NFSEnable
NetWare NWEnable
Disables access to the CD-ROM server using SMB over NetBIOS/NetBEUI.
Disables access to the CD-ROM server using SMB over NetBIOS/TCP/IP.
Disables web access to the CD-ROM server using HTTP.
Disables access to the CD-ROM server using NFS.
Disables access to the CD-ROM server using NetWare.
If the CD-ROM server is used as an NDS-compatible server, you may store the access rights in the NDS tree, or you may store the access rights in a file on a Novell file server. We recommend the first option, storing them in the tree.
Store NDS Rights in NDS Tree
If this is the first HP CD-ROM server being installed in your NDS tree, the server will try to extend the NDS Schema with a new attribute to the “NCP server” class. This new attribute will not affect the operation of your NetWare servers. This schema extension has been approved by Novell.
For this first server, you must use the account of the Admin object that has supervisor rights to the Root object of the NDS tree. This means that the user in the NDSAdminName parameter (see the table on page 5-11) must have supervisor access rights to that root object.
Once this first server has been successfully installed, the schema is extended. In future installations of other HP CD-ROM servers into this tree, as well as any re-installation of this server, you can use the account of the Admin object for the tree in which the server will reside.
After you set up your own access to the server from a work­station on the network using the instructions in the previous section, “Client Access to CDs” starting on page 5-2, you can con­figure the server as shown in table below.
5-10 Setup for Novell Networks
Page 71
Notes You must use either Relative Distinguished Typefull or Rel-
ative Distinguished Typeless notation for the parameters. Examples for the NDSAdminName parameter:
Relative Distinguished Typefull notation:
CN=ADMIN.OU=DCO.O=HP
Relative Distinguished Typeless notation:
ADMIN.OU.DCO.HP
This is used in the examples in the table
You can not use Distinguished Typeless or Distinguished
Typefull notation.
Parameter Name Example Value Description
on page 5-11.
NDSEnable yes NDSTreeName DCO NDSServerContext OU.DCO.HP
NDSAdminName ADMIN.OU.DCO.HP
NDSAdminPassword example
NDSInstall yes
NDSRightsStorage NDS
Several minutes after the configuration changes take effect, the server should be installed in the NDS tree, and users will be able to access the server using NDS mode.
You must log out and then log in again to have all the necessary rights on the server object and the associated volume.
Enable the NDS login. Name of the tree into which to install the server. Context into which to install the server. Distinguished na me of a user or administrator , with
Supervisor or Create rights in the context (with Supervisor rights to
The password of the administrator entered in
NDSAdminName
written, password appears as ******. Change to
change to server is already install ed .
Store NDS access rights in tree.
yes
Forced
Root
for first ins tallation).
above. After configuration is
when ready to install the se rver , or
, which doesn’t check whether
Verify proper installation by running NetWare Administrator (NWADMIN). The server should appear as a NetWare NDS File server. Examine the properties in NWADMIN. The server status should be “UP”.
If the server does not appear in the NDS tree, or if it appears but the status is down or unknown, check for error messages in the logfile.txt file in same directory as the server’s config.ini file. Refer to “NetWare NDS Installation Errors” on page 9-11 for corrective action for each error message.
Setup for Novell Networks 5-11
Page 72
We recommend that you disable bindery mode, setting the configuration parameter BinderyEnable to no, after you have successfully installed the server in NDS, then allow users to logon in NDS mode only.
Note If NDS mode is not functioning, you can always access the
CD-ROM server in bindery mode by logging in as supervisor, even if the parameter BinderyEnable is set to no.
Store NDS Rights in File
First identify or create a directory on an existing Novell file server to contain the NDS access rights file.
After you set up your own access to the server from a work­station on the network using the instructions in the previous section, “Client Access to CDs” starting on page 5-2, you can con­figure the server as shown in table below. Use the account of the Admin object for the tree in which the server will reside.
Notes You must use either Relative Distinguished Typefull or Rel-
ative Distinguished Typeless notation for the parameters. Examples for the NDSAdminName parameter:
Relative Distinguished Typefull notation:
CN=ADMIN.OU=DCO.O=HP
Relative Distinguished Typeless notation:
ADMIN.OU.DCO.HP
This is used in the examples in the table
on page 5-11.
5-12 Setup for Novell Networks
Page 73
You can not use Distinguished Typeless or Distinguished
Typefull notation.
Parameter Name Example Value Description
NDSEnable yes NDSTreeName DCO NDSServerContext OU.DCO.HP
NDSAdminName ADMIN.OU.DCO.HP
NDSAdminPassword example
NDSInstall yes
NDSRightsStorage File
SERVER/
NDSRightsFile
SYS:CDS/ CDS1.DAT
Enable the NDS login. Name of the tree into which to install the server. Context into which to install the server. Distinguished na me of a user or administrator , with
Supervisor or Create rights in the context (with Supervisor rights to
The password of the administrator entered in
NDSAdminName
ten, password appears as ******. Change to
change to server is already install ed .
Store NDS access rights in a text file on NetWare server as defined f or
The file on a NetWare file server to store NDS access rights, with case-sensitve syntax:
SERVER/VOLUME:DIR/.../FILE.
The
DIR
ate the file when rights are first changed on the server’s
yes
Forced
must exist; the CD-ROM server will cre-
vol um e.
SYS
Root
for first ins tallation).
above. After configuration is writ-
when ready to install the se rver , or
, which doesn’t check whether
NDSRightsFile
.
DAT
After the configuration changes take effect, assign the server NDS object (newly created by the above procedure) as a trustee to the directory for the access rights file. The rights to assign are Read, Write, Create, Erase, Modify, and FileScan.
Then you may change any rights on the CD-ROM server’s SYS volume, using NDS Admin. If you do so, the CD-ROM server will create the access rights file you defined on the other Novell file server.
You must log out and then log in again to have all the necessary rights on the server object and the associated volume.
Verify proper installation by running NetWare Administrator (NWADMIN). The server should appear as a NetWare NDS File server. Examine the properties in NWADMIN. The server status should be “UP”.
If the server does not appear in the NDS tree, or if it appears but the status is down or unknown, check for error messages in the logfile.txt file in same directory as the server’s config.ini file. Refer to “NetWare NDS Installation
Setup for Novell Networks 5-13
Page 74
Errors” on page 9-11 for corrective action for each error message.
We recommend that you disable bindery mode, setting the configuration parameter BinderyEnable to no, after you have successfully installed the server in NDS, then allow users to logon in NDS mode only.
Note If NDS mode is not functioning, you can always access the
CD-ROM server in bindery mode by logging in as supervisor, even if the parameter BinderyEnable is set to no.
Default Settings in NetWare NDS
After installing the HP CD-ROM server as an NDS server, the default security rights will protect all the configuration files. Only the CDs will be displayed to users. The user rights to the server and its files and directories are set up as follows:
Supervisor rights to the SYS volume is inherited from the Supervisor rights to the NDS Server object.
Read and File Scan rights are inherited from the Browse rights to the NDS Server object.
•By default, the config and volumes directories are setup with an inherited-rights filter that filters all rights except the Supervisor right. This protects all the configuration files.
Because the CD-ROM server acts as a normal NDS file server, its NDS Security rights can be set using standard procedures.
The server’s file system security rights are set up by the NetWare Administrator, as detailed below:
1. Login as Admin, and start the NetWare Administrator.
2. Browse the SYS: volume by double clicking it. You will see all the directories available in the server.
3. Select the directory or file for which you wish to set the access rights to, and right-click it.
4. Choose Details, and make the required changes.
The NetWare NDS access rights for the CD-ROM server can be set using Security Equivalence, Group, Container, Organization role, and User Objects as with any other NDS file server. There is no difference between how you use NetWare Administrator to set these access rights for a CD-ROM server, and how you would set the access rights on an NDS file server.
5-14 Setup for Novell Networks
Page 75
Bindery Server
With Authentication.
If user access control is desired, you
must configure the BindAuthentication parameter. The CD­ROM server must log onto the authentication server briefly to authenticate the user and identify the groups the user belongs to. In this case, the authentication server must have a standby license for the CD-ROM server, but several CD-ROM servers can share this license. If a license is not available, the user may still be authenticated but group information cannot be read.
Authorized users have configurable rights to the volumes of the CD-ROM servers. Authorization of users is done using an exist­ing NetWare server, referred to as the Authentication Server in the configuration.
The authentication process reduces Network Administrator overhead. The Administrator does not have to maintain a sepa­rate user database for CD-ROM servers. If the user is defined in the file server that the CD-ROM server uses for authentication, the Administrator will not have to do anything to give the user access to the CD-ROM server.
For access to the CD-ROM server connected to a NetWare 3.x Server, authentication is validated through a user list in the bindery of the NetWare server:
If on the list, a user’s password will be verified and the user will be granted access.
If the password is incorrect, login will fail.
If not on the list, the user will not be granted access to the CD-ROM server. However, the user could login as “guest” and get access to volumes that are not protected.
To control the access, create or edit the NetWareUser/Group entries in the access control files as follows:
NetWareUser/Group
*
<any user or group>
<entry not present>
Description
Any user has access Users with this name or in this group have
access No access from NetWare
You may add as many NetWareUser/Group entries as you require. See the following examples.
Setup for Novell Networks 5-15
Page 76
Example 1: Grant all NetWare users access:
NetWareUser/Group = *
Example 2: Grant access to all users in the group “salesdep” and to the user “Daryl” who is not a member of “salesdep”:
NetWareUser/Group = salesdep NetWareUser/Group = Daryl
Note You can always access the CD-ROM server using the user
name supervisor and the password specified by the parameter ServerPassword. The factory-default password is pass.
With No Authentication.
When accessing the CD-ROM server, if user authentication is not required, then NetWare server licenses are also not required because the server does not logon to the file server. In this case, you do not have to specify the CD-ROM server’s BindAuthentication configuration parameter. All users (except supervisor) will be given guest access rights.
To restrict access to the CD-ROM server’s configuration and security files when no Authentication Server is used, use the NetWareUser/Group access-control parameter. Replace * with the text “Supervisor”. This changes the access rights from “no restrictions” to “supervisor only”.
Also set the configuration parameter ServerPassword to the password you wish to use.
Access to the configuration files and the access rights files will then be limited to the Supervisor and will be password pro­tected. Users will not have access to those files, but will have guest access to CDs.
5-16 Setup for Novell Networks
Page 77
Novell
NetWare/IP
You can use the CD-ROM server in a NetWare environment that uses only the TCP/IP protocol. Use Novell’s documentation to make sure that the NetWare TCP/IP environment is fully imple­mented first.
To use the IP protocol in NetWare the standard IP parameters, the IP address, subnet mask, default gateway (router) address, and DNS server must be configured, along with the specific IP enable and IP DSS server parameters.
Assign an IP address to the server; refer to “Set the IP Address for the Server” on page 3-1.
Set the following IP configuration parameters.
Parameter Name Description
InternetAddress DefaultRouter NetMask
PrimaryDNS
SecondaryDNS
The server’s IP address. The default gateware (router) address. The subnet mask. The IP address of the primary DNS server.
Used for identifying computers by name instead of IP address.
The IP address of the secondary DNS server, in case the primary DNS server is unavailable or disconnected.
Set the following NetWare configuration parameters.
Parameter Name Description
NetWareIP_Enable NetWareIP_DSS_Server
Enables NetWare over the IP protocol. The IP address of the DSS server.
After the server is restarted and a delay of about 5 minutes, cli­ents that support the NetWare/IP protocol will connect directly to the server peer-to-peer. Clients without NetWare/IP support will be routed through a Novell server with an IPX/IP gateway.
Setup for Novell Networks 5-17
Page 78
To Use NetWare/IP Only.
You can disable the IPX protocol on the server:
1. Set the following CD-ROM server configuration parameter
for NetWare:
Parameter Name Value
NWEnable no
2. After restarting the server, set the following CD-ROM server
configuration parameters for NetWare:
Parameter Name Value
InternalNetAddress
ServerName
Internal network address Hexadecimal string that is unique on
the network, following Novell guide­lines.
3. Restart the server again, and wait 5 minutes.
The server will then be accessible to the clients that support the NetWare/IP protocol.
Note If the clients cannot then access the server, then do the
following:
a. Switch off the power to the server.
b. Wait 20 minutes for the SAP table to be flushed.
c. Switch on power to the server.
d. Wait 5 minutes for the server to be visible. All NetWare/IP
clients should now be able to access the server.
5-18 Setup for Novell Networks
Page 79
Server’s Time
Configuration
The CD-ROM server’s clock has a volatile memory, so the correct time must be set whenever the server is restarted.
Manually Configuring Date and Time
To manually configure the server’s Date and Time parameters whenever the server is restarted, set the following general server parameters.
Parameter Name Example Value Description
Date 97-06-28 Time 14:46:30
yy-mm-dd hh:mm:ss
Note If you are editing the config.ini file as your configuration
method, follow the setting with an exclamation mark.
Setting Up the Network Time Protocol
An alternative to manual configuration is automatic time syn­chronization using the Network Time Protocol (NTP, as defined by RFC 1769). Set these configuration parameters.
Parameter Name Value Description
TimeSyncSource NTP
NTPServer
For example:
192.4.2.30
(a general server parameter) to set Network Time Protocol
(an IP parameter) IP address or Internet domain name of a server to supply the network time.
Setting Up NDS Time Synchronization
If you are using NetWare NDS, another alternative is to set automatic time synchronization from a NetWare Time Server. Set the following general server configuration parameters:
Parameter Name Value Description
TimeSyncSource NDS
TimeZone
NDS time synchronization is normally obtains using the SAP method. Or, if you have a Time Provider Group on your system you can provide a list of servers for the CD-ROM server to con­tact to obtain its time synchronization. The list can also contain
For example:
-8
Set NetWare network.
Time zone in which the server is operating. See the TimeZone value list on page 7-19.
to get the time from the
NDS
Setup for Novell Networks 5-19
Page 80
Secondary Time Servers. Set the following server configuration parameter for NetWare:
Parameter Name Value Description
Server Password
TimeSyncSources
SAP
or
srv1,srv2
Default find the primary time servers. Or, enter the server names to be con­tacted for time synchronization as
server1,server2,
commas).
means automatically
SAP
... (using
You can change the following general server parameter:
Parameter Name
ServerPassword
Example Value
fy98db
Default:
pass
Description
The Supervisor , Administra tor , or Root password used for protocols HTTP, NetWare bindery, SMB user level, SNMP, and FTP. After the configur ation is written, the pass word appears as an asterisk * for each character.
Methods for
Configuration
Methods for configuring the server and the access rights described above include the following:
Any text editor can be used to directly edit and save the con­figuration and access files stored on the server. Precision in editing the files is required. (These access rights can be restricted for other client workstations.) See “Using a Text Editor to Edit Server’s Files” on page 7-10 for details.
For Windows 95/98 and NT 4.0 systems, the HP CD-ROM Server Utility software can be downloaded from HP’s elec­tronic distribution sites. For details see “Electronic Support Services” on page A-1. This software utility provides an easy-to-use graphical interface; using it makes changes in the configuration and access files stored on the server.
If TCP/IP and HTTP are available, then a web browser can be used to access the server’s web page. This is an easy way to make changes in the configuration and access files stored on the server. See the section “Using a Web Browser and Server Web Page” on page 7-8 for details.
5-20 Setup for Novell Networks
Page 81
Setup for UNIX Networks (NFS)
This chapter describes the setup for UNIX systems on networks using NFS (Network File System) transported over UDP/IP. Examples of procedures for UNIX systems are included. You may need to refer to your system manuals for assistance with specific procedures.
Use the instructions in chapter 3 to assign an IP address to the server (the “Set the IP Address for the Server” section from page 3-1 to page 3-8) before doing any of the procedures in this chap­ter.
6
Following that section of chapter 3 are instructions for accessing the CDs and configuring the server by using a web browser (starting on page 3-8). For installations with IP and HTTP, we recommend use of those instructions for client access and configuration in addition to the methods follow­ing in this chapter 6.
Client Access to CDs
The procedures for accessing your HP CD-ROM server are similar to accessing any other workstation or file server. Users at workstations on the network use the same procedures to access both types of servers, For easy access to the CDs from applications, the server should be “mounted” for each client sys­tem. After the server is mounted, the client accesses the server, with its CD-ROMs (and optionally its configuration parameters) just like any other attached disk drive or networked file server.
The mapping described in this section can be done on one work­station by one administrator or installer first. Then any configu­ration tasks for the server setup can be done (described later in “Configuring the Server” on page 6-3, before setting up all the network clients according to the procedures in this section.
Setup for UNIX Networks (NFS) 6-1
Page 82
Reference on
Server File
System
Different workstations need different points of access to the server. The network administrator or installer, for example, needs access to configure and monitor the server and to config­ure access rights. Then, the administrator may want to set up all the clients with access to the CDs, bypassing the configuration and security files stored on the server. Please refer to the description of access points and the file system used on the server, in the reference chapter, starting on page 7-2.
Mount Drives
Note You will need root privileges to mount the CD-ROM server.
On UNIX systems, the CD-ROM server is accessed using NFS. Mount the server by using the following procedure:
1. Create a directory for the CD-ROM server:
mkdir
<directory>
Example:
mkdir /hpcd
2. Mount the CD-ROM server:
mount
<IP-address-or-hostname>
<IP-address-or-hostname>
is the IP address or host
:/
<directory>
name assigned to the CD-ROM server during TCP/IP configuration; see “Set the IP Address for the Server” on page 3-1.
NFS for PC or
Apple Macintosh
The CD-ROM server can also be accessed through third-party NFS software for PC or Apple Macintosh computers. If you run a TCP/IP network, this provides an alternative to Microsoft net­working (SMB). Please see the NFS software documentation for instructions on how to mount the CD-ROM server.
6-2 Setup for UNIX Networks (NFS)
Example:
mount cdserv:/ /hpcd
Page 83
Configuring the Server
By making configuration changes, you can customize server operation and can set access rights for security.
Configuration
Tips
Where to Find Configuration
Information
Some server configuration changes you might need:
Disable workstation access to the server using protocols other than NFS.
Restrict user access.
Set the server’s time.
If you have installed CD-ROM disc changers, see page 9-12 to set the JukeBoxLockTime parameter to prevent disc changer flutter.
More extensive information is provided in this section for some of the configuration options, if they are common needs or relate specifically to UNIX networks. If you are also using TCP/IP on your network, see chapter 3 for additional features.
For configuration options that do not need extensive explanation here, see the list of configuration parameters on page 7-13 and the description of the access rights starting on page 7-5. If you use a web browser for configuration, one of the options described later in this section, online Help is available to you for explana­tion.
Your procedures for performing the configuration of the server are described below the configuration explanations, in the sec­tion “Methods for Configuration” on page 6-8.
Setup for UNIX Networks (NFS) 6-3
Page 84
Disabling Access
for Other
Protocols
For security, you can switch off all access to the server through other protocols for which you do not set up access restrictions, by setting configuration parameters in this table. Use the last parameter in the table if you ever want to disable access through NFS.
Area Parameter Name Description
Server’s Time
Configuration
IP HTTPEnable
SMB EnableNetBEUI
SMB EnableNBT
NetWare NWEnable
NFS NFSEnable
Disables web access to the CD-ROM server using HTTP.
Disables access to the CD-ROM server using SMB over NetBIOS/NetBEUI.
Disables access to the CD-ROM server using SMB over NetBIOS/TCP/IP.
Disables access to the CD-ROM server using NetWare.
Disables access to the CD-ROM server using NFS.
The CD-ROM server’s clock has a volatile memory, so the correct time must be set whenever the server is restarted.
Manually Configuring Date and Time
To manually configure the server’s Date and Time parameters whenever the server is restarted, set the following general server parameters.
Parameter Name Example Value Description
Date 97-06-28 Time 14:46:30
yy-mm-dd hh:mm:ss
Note If you are editing the config.ini file as your configuration
method, follow the setting with an exclamation mark.
6-4 Setup for UNIX Networks (NFS)
Page 85
Setting Up the Network Time Protocol
An alternative to manual configuration is automatic time syn­chronization using the Network Time Protocol (NTP, as defined by RFC 1769). Set these configuration parameters:
Parameter Name Value Description
Server/CD-ROM
Access Rights
TimeSyncSource NTP
NTPServer
For example:
192.4.2.30
(a general server parameter) to set Network Time Protocol
(an IP parameter) IP address or Internet domain name of a server to supply the network time.
Access restrictions are set individually for each protocol. If you use other network protocols in addition to NFS, consult the other chapters for setup of those protocols. (The default settings in some protocols provide full access rights to all users, so we rec­ommend that you disable all protocols not being used. If you do not, a user accessing the server through such a protocol may be given full access rights, regardless of the security configurations in other protocols.)
The HP CD-ROM server can be configured to restrict user access to CD-ROM drives, to individual CDs, and to the server configu­ration. You can limit the number of users simultaneously access­ing any CD to comply with user-license restrictions. And we recommend that you restrict access to the config and volumes directories on the server.
For general access-control options not explained here, see the description of the access rights starting on page 7-5. If you use a web browser for configuration, one of the options described later in this section, online Help is available to you for explanation.
Setup for UNIX Networks (NFS) 6-5
Page 86
NFS-Specific Access Controls
You may restrict access by means of NFS to users with a certain IP Address, Group ID (GID) or User ID (UID).
Access is controlled by creating or editing the NFSIPAddress,
NFSGroup, and NFSUser entries in the access-control files in the volumes folder on the CD-ROM server. The following values can
be used:
NFSIPAddress
*
<any IP address>
<entry not present>
NFSGroup
*
<group ID> <entry not present>
NFSUser
*
<user ID> <entry not present>
Description
Any user with any IP address has access. Only users with the specified IP addresses
have access. IP address is not used to grant access.
Description
Any user with any GID ha s access to the f older or CD.
Only users with the specified GID have access. GID is not used to grant access.
Description
Any user with an yU ID has ac cess to the folder or CD.
Only users with the spec ified U ID ha v e access . UID is not used to grant access.
Note There is an or relation between NFS access-control parame-
ters. A user fulfilling any one of the NFS access criteria you have specified will be granted access. If you set an asterisk (*) to any of the parameters, all users will have access regardless of the settings of the other parameters.
You may add as many NFSIPAddress, NFSGroup and NFSUser parameters as you require. See the following examples.
Example 1: Give access to users with UID 100 and 101 and to all users with GID 4:
NFSUser = 100 NFSUser = 101 NFSGroup = 4
6-6 Setup for UNIX Networks (NFS)
Page 87
Example 2: Give access to users with IP address 192.124.138.60 and 192.124.138.65:
NFSIPAddress = 192.124.138.60 NFSIPAddress = 192.124.138.65
Authentication of a PC in an NFS Environment
PC workstations on a UNIX network can also be authenticated. This requires an authentication server to be specified by the NFS configuration parameter PCNFSDAuthentServer. That parameter is combined with the DefaultUid parameter, in 4 different ways, to obtain the following behavior:
Default­Uid
Example:
-2
Example:-2Example:
0
0 0.0.0.0
PCNFSD AuthentServer
0.0.0.0
192.124.138.99
Example:
192.124.138.99
Result for PCNFSD clients
Clients with user ID and group ID = -2 can be authenticated, but there is no authent ication server.
Clients authentic ated by the server get their real user ID and group ID. Clients not authenticated default to
DefaultUid
Clients authentic ated by the server get their real user ID and group ID. Clients not authe nticate d will fail.
All clients will fail.
.
Setup for UNIX Networks (NFS) 6-7
Page 88
Methods for
Configuration
Methods used on UNIX systems for configuring the server and the access rights include the following. The parameters and set­tings described above can be set with either method:
Any text editor can be used to directly edit and save the con­figuration and access files stored on the server. Precision in editing the files is required. (These access rights can be restricted for other client workstations.) See “Using a Text Editor to Edit Server’s Files” on page 7-10 for details.
If TCP/IP and HTTP are available, then a web browser can be used to access the server’s web page. This method is described in “Using a Web Browser and Server Web Page” on page 7-8. Doing this makes changes in the configuration and access files stored on the server.
6-8 Setup for UNIX Networks (NFS)
Page 89
Setup Reference for All Networks
This chapter is a collection of reference information helpful for setting up the HP CD-ROM server. Information needed for spe­cific network operating systems is contained in chapters 3, 4, 5, and 6. Topics in this chapter include:
Understanding the server’s file system . . . . . . . . . . . page 7-3
Consult this section, especially when you first use an HP CD-ROM server, for an explanation of the file system contained on the server. It includes the structure of CD-ROM drives and individual CDs and of files determining the server configuration and access controls.
7
Selecting an access point for server clients . . . . . . . . page 7-2
When accessing the server and its CDs, and when mapping or mounting drives, you have a choice of access points, based on the server’s file system. Also, different access points are intended for administrator/installers and for the clients using the CDs.
Using a web browser and server web page . . . . . . . . page 7-8
This is the easiest configuration method and is supported by on-line help. However, it requires that you configure the server with an Internet (IP) address on a TCP/IP network.
Using a text editor to edit the server’s files . . . . . . page 7-10
You can use your favorite text editor in any operating environment.
Looking up configuration parameters . . . . . . . . . . . page 7-13
These reference tables describe the server configuration parameters, used with the web browser or with file editing.
HP Web JetAdmin and remote management . . . . . page 7-20
Setup Reference for All Networks 7-1
Page 90
File System and Access Points
Access Points
Consult the “File System Description” on page 7-3.
Administrative: Root Folder Access
With the top level of the server directory structure as the access point, the user can access all files, folders, and CDs on the server, including the config and volumes folders. Network administrators, who configure and monitor the server, normally use this access.
All CDs in CD-ROM Server: CD Folder Access
With the cd folder as the access point, the user can access all CDs inserted into the drives in the CD-ROM server. On PCs, this makes it possible to use only one drive letter to access all drives connected to the server. This is the normal access for most users.
Each CD: CD-ROM Access
Two alternatives:
Specific CD
An inserted CD (or DVD-ROM) disc can be used as the access point. On PCs, this makes it possible to map a drive letter to a single CD. This may be necessary to run CD soft­ware that expects to find its data at the root level.
Aliased Drive
A connected CD-ROM or DVD-ROM drive (and any disc in the drive) can be used as the access point—if the SCSI ID has been given an alias name. In other words, a SCSI Alias is used as the access point; only the files of discs in that drive can be accessed. This means that access restrictions can be defined only once, and users do not have to re-map each time a new disc is inserted into the drive. This is useful for administering periodically updated CDs. The name of the CD as advertised to the network is unchanged.
7-2 Setup Reference for All Networks
Page 91
File System
Description
The server appears to each system as a file server. Like any other file server, it has a directory structure in which files are stored. The server directory structure is outlined below. The purpose of each folder is more fully explained below.
These folders contain each CD-ROM’s files and data.
The index file is used for web browsing.
The config folder holds configuration file s used by the CD-ROM server.
These folders contain
Same as folders at upper right.
the files that control access rights.
(Generic) Folder
root
This folder (which is named sys or / in different operating systems) includes everything—the cd folder (with all of the CDs beneath) and the config and volumes folders. Use this folder as the access point for the administrator.
Folder
cd
Use this folder as the access point for all CDs in the server.
When a CD is inserted into a drive, a folder for it is created in the server’s cd folder. All the files on that CD can be accessed through this folder. Use this folder, subordinate to the the cd folder, as the access point for the individual CD. Its name will comply with the following rules:
The volume name held on the CD is used if alias names have not been set (see below).
If the volume name is not detected (for example, if it is spec­ified in upper-case letters) and there are no alias names set, then the server automatically sets the name cd_ where
nnnnn
is a unique five-digit number.
nnnnn
,
Setup Reference for All Networks 7-3
Page 92
If an administrator has set a CD-ROM alias, it will be used instead of the volume name. Since a volume name may not be an easily recognizable representation of the CD contents, assigning a CD-ROM alias is a convenient way of setting a more significant or recognizable name.
Note If you run an application from a CD, or look for an applica-
tion’s associated files on the CD, the application may not rec­ognize it by the CD-ROM alias. In that case, you will not be able to use a CD-ROM alias.
If the system administrator has set a SCSI alias, it will be used in place of any of the above names. The SCSI alias is also known as the drive alias or the SCSI Alias. A SCSI alias is useful for the following reasons:
• When a SCSI alias is set, any CD inserted into the drive will be seen as having this name. Thus you could use the same drive for a series of discs, such as a monthly issue, and you will not have to enter a new name each time you change the disc.
• When a SCSI alias is set, the volume rights for any CD inserted in the drive are determined by the drive access rights. This is convenient because the access rights need setting only once, while the disc can be changed.
config
Folder
The config folder contains CD-ROM server configuration files:
html
and
public
Folders.
These contain HTML files and
images used when accessing the server from web browsers.
stat.txt
File.
config.ini
This contains CD-ROM server statistics.
File.
This is used to set the CD-ROM server
parameters as shown in the table starting on page 7-13.
scsi.txt
File.
This is used as a single point of viewing all the
CD-ROM drives and what is inserted in each of them.
index.htm
File.
This is used when accessing the server from
web browsers.
7-4 Setup Reference for All Networks
Page 93
volumes
Folder
The volumes folder contains all files used for controlling the access of the CD-ROM server, to the connected CD-ROM drives, and to the CD-ROMs inserted. See the access information in chapters 3, 4, 5, and 6.
In configuring access, you will access these files directly if you use the option of manually editing and saving the server’s con­figuration files to set security rights. On the other hand, if you use a web browser or another configuration tool (such as the HP CD-ROM Server Utility), you will access these files indi­rectly through that configuration tool.
Three folders are contained in the volumes folder:
cdrom
Folder.
A text file is automatically created in the cdrom
folder when a CD is inserted into the CD-ROM server. It is iden­tified by its volume name. The file controls the user access to the CD. Settings for up to 56 discs can be stored in the server at any time. The settings will remain even if the disc is ejected. When the limit is reached, the oldest settings are discarded when a new disc is inserted.
Folder.
scsi
Each file is named id address and
The scsi folder contains a file for each SCSI ID.
<x>
lun
<y>
.txt (where
<y>
is the LUN address), and will be created auto-
<x>
is the SCSI
matically. If the SCSI alias name is configured in this file, this file will control access to the CD inserted in the drive.
An HP J3278A SureStore CD-ROM Server/Tower 7Plus that is extended with drives beyond its internal bays will show two SCSI buses.
server
Folder.
In this folder, the files cd.txt, config.txt,
root.txt, and volumes.txt control access to the file system of
the CD-ROM server itself. The file default.txt contains the default settings to be used when either a new CD is inserted or a new CD-ROM drive is connected.
Setup Reference for All Networks 7-5
Page 94
The files in the volumes folder are used for the following functions:
To set access rights to: Select the following:
The CD-ROM se rver The configuration files
The access-rights files All of the connected drives and CDs Any of the individual drives
Any of the individual CDs Any new drives or CDs that wi ll be
connected in the future
root.txt config.txt volumes.txt
folder
cd.txt
the SCSI drive identity (example:
the CD-ROM name in the folder (example:
default in the
in the
in the
id2lun0.txt
server
in the
server
server
in the
server
music_1.txt
folder
server
folder
)
cdrom
folder
folder
)
General Structure of Access Rights
Access restrictions are set individually for each CD-ROM drive, for the CDs inserted into the drives, and for the server configu­ration files, using files in the folders described above. The follow­ing list describes the parameters stored in the access files. Not all parameters are used in every access file.
Note If you use Windows NT domains or NetWare NDS, you also
can set up access restrictions for those environments. See page 4-15 and page 5-10.
Name.
volume name, it will be assigned a default name cd_ where names will be id and
This volume name cannot be changed. If a CD has no
nnnnn
nnnnn
<y>
is a unique five digit number. CD-ROM drive
<x>
lun
<y>
, where
<x>
is the SCSI address
the LUN (logical unit number) to identify multi-unit
,
drives.
Alias.
The name displayed in the cd folder representing the
CD or CD-ROM drive. By editing this entry, you can select a name that makes sense to the users of the CD. The name must be a unique and valid volume name.
7-6 Setup Reference for All Networks
Page 95
Comment.
the user is selecting CDs.
In SMB, the share-level name must not exceed 12 charac­ters. If this is insufficient, you can use the comment parame­ter to give more information to users when configuring.
In NetWare, the comment is not available. However the 12­character naming limit does not exist, so you can assign a longer name instead of a comment.
Text that is displayed in Windows Explorer when
DriveName.
changed.
InsertedVolume.
be changed.
LockEject.
Note The three items above appear only in the SCSI drive access
files, which are identified as id
UserLimit.
CD. If it is set to 0, any number of users may access the disc.
SessionTimeout.
sidered to be active after the last access to the CD. When the time has expired, another user may access the CD and perhaps lock out the first user, depending on the UserLimit setting.
Note Items in the access control files which have a value of * have
no access restrictions. For example, * for SMBPassword means that no password is required to access the volume.
The manufacturer’s name of the drive; cannot be
The name of the CD that is inserted; cannot
Locks the eject button if set to yes.
<x>
lun
<y>
.
The maximum number of simultaneous users of a
Specifies how many seconds a user is con-
The following notes may help you when managing access rights:
The identity of the drive will appear as: id
<x>
where
If the CD has no volume name, and an alias name has not been assigned, the name of the disc will default to
cd_
nnnnn,
The settings for a CD are stored even if the CD is removed. The settings are immediately available if the CD is re­inserted. Settings are limited to 56 CDs typically; thereafter the oldest setting is discarded when a new CD is inserted.
The access settings for a CD-ROM drive will override the CD settings for CDs in that drive, when an alias name is entered for it; if no alias, the drive access settings are not used.
is the SCSI address and
where
nnnnn
is an unique five digit number.
Setup Reference for All Networks 7-7
<y>
<x>
lun
<y>
the LUN address.
Page 96
Configuration Tools and Methods
Using the HP
CD-ROM Server
Utility
Using a Web
Browser and
Server Web Page
For Windows 95 and NT 4.0 systems, you can configure the server by using the software utility named HP CD-ROM Server Utility. (You can download it from HP’s electronic distribution sites. For more information, see “Electronic Support Services” on page A-1.)
You can do configuration of the CD-ROM server by using a web browser. To access the CD-ROM server’s web page, an IP address must be set on the CD-ROM server (see instructions starting on page 3-1). Also, the HTTPEnable configuration parameter must be set to yes, which is the default setting.
The browser used in this example is Internet Explorer.
1. Start Internet Explorer (asuming an IP address is assigned to the server).
2. From the File menu, select Open Location... The following dialog is displayed:
3. Enter the URL of the server as http://
7-8 Setup Reference for All Networks
<IP-address>
Alternatively, use the host name associated with the IP address and assigned to the server.
Page 97
You are prompted to supply:
username = password = (factory defaults)
root
pass
4. Click OK. You should see the web page of the server, as shown below.
5. Select one of the tabs as follows:
Advanced Configuration: All the server configuration parameters listed in “Configuration Parameter Reference” on page 7-13
Basic Setup: An alternative, easier dialog to make the basic
are found under this tab in several sections.
configuration changes required for features such as access rights, password, and user authentication. All these features are a subset of the parameters also available under Advanced Configuration.
Management and Access Rights: Use buttons here for:
• Drive Rights: To edit the access rights setting for each
CD-ROM drive in the CD-ROM server.
• CD-ROM Rights: To edit the access rights settings for the
CD-ROMs inserted into the drives.
• Server Rights: To edit the access rights settings for
server configuration capabilities.
• General: Functions for management of the server.
6. When accessing the above tabs for the first time during a session, you will be prompted to enter the username (default is
) and password (default is
root
pass
).
7. If you need help, click the ? button to display the on-line help.
Setup Reference for All Networks 7-9
Page 98
8. To return to the settings in place before you made changes on a particular page, click the Reset Settings button on the bottom of the page.
9. To keep any settings you change on a page, click the Submit settings button at the bottom of the page to download the changes to the corresponding file on the CD-ROM server.
10. Repeat the preceding steps for all changes needed at this time.
11. Restart the server to effect the new settings:
Click the Management and Access Rights tab; click the Gen­eral button. Select Restart Server from the menu at left. Click the Restart Server button, and confirm.
The yellow Status indicator light on the front of the server
module will flash during power-on sequence and self-test. When it stops flashing and remains off, the new settings are ready for use.
Using a Text
Editor to Edit
Server’s Files
If you can locate the CD-ROM server on your network, you can configure it using your favorite text editor in any operating envi­ronment. The basic procedure is to view the server’s file struc­ture and open a configuration or access-control files. Then you make changes and save the file. Saving the file sends your con­figuration changes to the server.
The server’s file structure is described in “File System Description” on page 7-3. The file used for most configura­tion changes is con fig.ini in the config folder. Other files are used for changing access features.
Follow the procedure below to access the server’s files using a text editor. The Windows Notepad editor on a Windows 95 work­station is used in this example.
1. Click Start, click Programs, and start Windows Explorer.
2. Locate the CD-ROM server that you want to configure. Refer to chapter 3, 4, 5, or 6 to get access to the server on the network.
7-10 Setup Reference for All Networks
Page 99
3. Locate the server’s folders and file. Open the file using your editor. In a standard Explorer setup, double-clicking an “.ini” or “.txt” file automatically opens the file with the Notepad editor.
The following is an example of the config\config.ini file.
Note The config.ini file illustrated above is for server firm-
ware version 4.11. As firmware is updated, configuration files may change. (See chapter 8, “Upgrading the Firm­ware”.)
Setup Reference for All Networks 7-11
Page 100
The following is an example of the general format of an access-control file. The actual files vary depending on which access file it is (drive, CD, or server file):
Name = cd_12345 ;Cannot be changed Alias = cd_12345 Comment = DriveName = InsertedVolume = LockEject = no UserLimit = 0 SessionTimeout = 0 SMBPassword = * NetWareUser/Group = * NFSIPAddress = * NFSGroup = * NFSUser = *
[END]
CAUTION!
4. Change configuration settings by editing parameters in the file. The parameters in the config.ini file are listed with descriptions in the next section on page 7-13.
When editing the file, be sure that there is a space between
the equal sign and the parameter value. All other spaces between names of parameters or values are ignored. Do not remove the [END] marker from the file.
5. To activate the new settings, it will be necessary to restart the CD-ROM server. This can be done by setting the Restart parameter in the config.ini file to yes and saving the file.
6. Save the file you edited, to send the new settings to the server. If you have set config.ini’s Restart parameter to yes, the server will restart. If you have not set Restart, then switch the server’s power off, wait 10 seconds, and then switch power on.
The four indicator lights on the front of the server module will flash during the power-on sequence and self-test. When
the yellow Status indicator stops flashing and remains off,
the new settings are ready for use.
7-12 Setup Reference for All Networks
Loading...