All rights reserved. Reproduction, adaptation or
translation without prior written permission is
prohibited, except as allowed under the copyright laws.
Publication number
5967-2149
User’s Manual, First Edition,
Februrary 1998
Applicable Products:
J3276A, J3277A, J3278A
Trademark Credits
Microsoft®, MS-DOS®, Windows®, Microsoft
Windows NT® are U.S. registered trademarks
of Microsoft Corporation. UNIX® is a registered
trademark of The Open Group. Netscape Navigator is a U.S. trademark of Netscape Communications Corporation.
Warranty
The information contained in this document is
subject to change without notice.
HEWLETT-PACKARD COMPANY MAKES
NO WARRANTY OF ANY KIND WITH
REGARD TO THIS MATERIAL, INCLUDING,
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
Safety Considerations
Prior to the installation and use of this product,
review all safety markings and instructions.
Instruction Manual Symbol.
!
If the product is marked with
this symbol, refer to product
manuals to protect the product
from damage.
WARNING
Denotes a hazard that can
cause injury
CAUTION
Denotes a hazard that can
damage equipment or data.
Do not proceed beyond a
CAUTION
notice until you have understood the
WARNING
or
hazard and have taken appropriate
precautions.
Use of control, adjustments, or performance
procedures other than those specified herein
may result in hazardous radiation exposure. To
prevent direct exposure to a laser beam, do not
try to disassemble the CD-ROM drives.
Grounding.
This product provides a protective earthing terminal. There must be an
uninterruptible safety earth ground from the
main power source to the product’s input wiring
terminals, power cord, or supplied power cord
set. Whenever it is likely that the protection
has been impaired, disconnect the power cord
until the ground has been restored.
Hewlett-Packard shall not be liable for errors
contained herein or for incidental or consequential damages in connection with the furnishing,
performance or use of this material.
A copy of the specific warranty terms applicable
to your HP product and replacement parts can
be obtained from your HP Sales and Service
Office or Authorized dealer.
For warranty service information, see appendix
B in this guide.
Hewlett-Packard Company
8000 Foothills Boulevard
Roseville, California
95747-6588
If your LAN covers an area served by more than
one power distribution system, be sure their
safety grounds are securely interconnected.
LAN cables may occasionally be subject to
hazardous transient voltages (such as lightning
or disturbances in the electrical utilities power
grid). Handle exposed metal components of the
network with caution.
For more safety information, see the “Safety
Statements” section starting on page D-4.
Servicing.
There are no user-serviceable parts
inside the user-installable modules comprising
the product. Any servicing, adjustment, maintenance, or repair must be performed only by service-trained personnel.
Page 7
Preface
HP SureStore CD-ROM server/towers provide a simple and costeffective way to allow information stored on CD-ROMs and
DVD-ROMs to be shared by the users on an “Ethernet” IEEE
802.3i 10Base-T network or “Fast Ethernet” 802.3u 100Base-TX
network. HP CD-ROM server towers provide multi-protocol support for most network operating systems.
About This Guide
This User’s Guide aids in installation and use of the HP SureStore CD-ROM 10/100 server/towers. These are HP product
numbers J3276A, J3277A, and J3278A, with firmware version
4.21 and later. This guide consists of the following chapters:
1.Introduction. A brief description of the HP CD-ROM server
towers—how they work, where to use them, and their benefits.
2.Installing Your Tower. A description of the towers and drives,
and the steps to install and connect them to your network.
Each of the following four chapters details the procedures for
setting up the server/tower for your network, including getting
access, configuration, and access controls. Each one is for a different network operating environment. If your network has
more than one type of networking on servers and clients, use
each of the relevant chapters in the following order. (For example, TCP/IP with Microsoft Windows involves chapters 3 and 4.)
3.Setup for Internet Protocol (IP, HTTP) networks.
4.Setup for Microsoft and IBM OS/2 networks (SMB).
5.Setup for Novell networks.
6.Setup for UNIX networks (NFS).
The following chapters are useful for all network types:
7.Setup Reference for All Networks. Reference information
8.Upgrading the Firmware.
9.Troubleshooting. Solving problems with the server towers.
The appendices provide supplemental reference information—
technical and regulatory specifications
ranty services.
useful for configuration and access control and management
on all network types. Chapters 3–6 have some references to
information in this chapter.
HP SureStore CD-ROM Server/Tower
HP SureStore CD-ROM Server/Tower 7
HP SureStore CD-ROM Server/Tower 7Plus
The HP SureStore server/towers connect CD-ROM drives to
twisted-pair networks—either IEEE 802.3i 10-Base-T Ethernet
or IEEE 802.3u 100Base-TX Fast Ethernet. All users on the network can share the information on any CD in the tower. The
server module located in the top bay of the 8-bay server/tower is
internally connected to the other 7 bays, into which you may add
and exchange CD-ROM drives, DVD-ROM drives, and CD
changers.
The SCSI bus on the Server/Tower 7Plus is extendable to
another SCSI bus. This product houses seven drives and can be
attached to the seven-bay HP C2988A SureStore CD-ROM
Tower to serve up to 14 drives. Or, it can be attached to a daisy
chain of up to 4 additional SCSI-2 stand-alone drives.
How They Work
HP SureStore CD-ROM server/towers directly connect as nodes
on an Ethernet network. The server/tower acts as a network file
server, so that a network client communicates directly with it.
This results in high performance and reliability. Since all three
server/towers act as servers, this guide will use the term “server”
to refer to any of these server/tower products on the network.
Installation and configuration is simple. In most environments,
the network connection is the only installation required prior to
using the CD-ROM server. There is no software that must be
installed on clients or file servers. Your computer will see the
server simply as another network file server, and you access it
using standard network operating system commands.
Introduction 1-1
Page 12
The server also supports the HTTP protocol. Therefore, you can
access and manage it using a standard web browser, such as
Netscape Navigator or Microsoft Internet Explorer.
For Windows 95 or NT 4.0 (and later) systems, a software utility
is available for use in place of a web browser. This utility, the
HP CD-ROM Server Utility, provides an easy-to-use graphical
interface to manage your HP CD-ROM servers. You can download this software from Hewlett-Packard’s World-Wide Web site
at URL: http://www.hp.com/go/cdrom_server
Note❏At the Web site, you can also download technical support
information, and the latest versions of the CD-ROM server
firmware and software utilities. Check with your HP-authorized dealer for additional assistance.
You can also remotely manage the server as a node in your network using popular network managment applications.
Where to Use Them
Novell NetWare
Networks
HP SureStore CD-ROM server/towers can be used in a variety of
network environments. They support basic messaging and network protocols, including:
•
Novell NCP (NetWare Control Protocol) over IPX
•
Novell NCP over NetWare/IP
•
Microsoft networking—SMB (Server Message Block)
over NetBEUI (NetBIOS Extended User Interface)
•
Microsoft networking—SMB (Server Message Block)
over NetBIOS/TCP/IP
•
NFS (Network File System) over UDP/IP
•
HTTP (HyperText Transfer Protocol) over TCP/IP (Internet
Protocol) for access from a web browser
Network clients that use these networking protocols can access
the server. Refer to appendix C for more information.
The server can emulate Novell file servers running NetWare 3.x
and 4.x and Intranetware 1.x. No NLM is required.
Microsoft and IBM
Networks
UNIX NetworksThe server can be mounted using NFS (Network File System) .
1-2 Introduction
The server is easily shared using the SMB (Server Message
Block) protocol, the default protocol in popular PC systems (such
as Microsoft Windows 95 and NT, and IBM OS/2 systems).
Page 13
Internet/Intranet
Networks
The server is accessible from a web browser in environments
that can use HTTP over TCP/IP (Internet Protocol).
Apple Macintosh
Networks
Complete Solution
for the Task
File Server
Independence
Ease of UseHP CD-ROM server/towers are designed to be easy to install and
The Macintosh requires the NFS protocol (Network File
System).
Features and Benefits
The HP CD-ROM server/tower can be installed on the network
in minutes, versus hours for other solutions (such as towers
attached to file servers).
The server is pre-installed with all the network functionality
required. It does not rely on intermediate communications with
a file server.
use.
Software on disks or tapes is not needed to install the server.
The server uses standard networking protocols (HTTP, NCP,
SMB, and NFS), so there is no need to learn any special software
to access it.
Users find their data by mapping individual CD drives or the
entire server (with a subdirectory for each CD) to be a logical
network drive, or by using their browser to access the built-in
web server.
Location FlexibilityAs a network node, the server/tower can be located anywhere on
the network, such as in the workgroup where users can update
new CD content as it arrives. It can be rack or floor mounted.
Up-to-Date DataSince all users share a common set of CDs, they are assured of
using the correct set of data.
Broad Compatibility
and Flexibility
Now and Later
As a multi-protocol device, the server/tower simultaneously
supports various network operating environments, including
Novell NetWare, Microsoft and IBM network operating systems
(Windows 95/98, Windows NT, OS/2), UNIX, and Internet/intranets. Or it can function with only one protocol enabled. New network operating systems are supportable by downloading new
firmware to Flash memory.
The backplane allows easy installation of CD-ROM or DVDROM drives or CD changers. It automatically assigns SCSI IDs
to HP drives. SCSI-2 drives from vendors others than HewlettPackard Company are easily adapted to the HP server/tower.
Introduction 1-3
Page 14
A server/tower with 7 drives preinstalled is available. Or a
server/tower without drives preinstalled can be loaded with one
or more drives now, and more drives can be added when needed.
Or the Server/Tower 7Plus with its 7 preinstalled drives can be
extended to up to 14 drives when needed.
Either a 10Base-T or a 100Base-TX network can be connected.
Web Server
Functionality
SecurityCD access can be restricted by setting up password protection.
SpeedThese server/towers take advantage of 100-Mbit/s networks. The
UpgradabilityNew firmware can be easily downloaded to the server’s Flash
Remote Management
with Web JetAdmin
and Others
Users can access CDs using a web browser, such as Netscape
Navigator or Microsoft Internet Explorer, and network managers can configure and manage the server using a web browser.
The number of simultaneous users of any CD can be limited to
comply with license agreements. Or, user access can be administered using the network operating system’s authentication provisions, such as Novell’s NDS (NetWare Directory Services) and
Microsoft’s Windows NT 4.0 domains.
32-bit processor and cache memory allow ample throughput for
demanding CD-ROM applications. HP’s CD-ROM drives seek
data quickly. See appendix C for drive speed specifications.
memory over the network.
Hewlett-Packard’s Web JetAdmin automatically locates and
checks the health of multiple CD-ROM servers from a single
console. Other leading management applications that support
the Simple Network Management Protocol, SNMP, can also
manage the HP CD-ROM server/towers.
1-4 Introduction
Page 15
Installing Your Tower
The Products
2
HP J3276A
SureStore CD-ROM
Server/Tower
HP J3277A
SureStore CD-ROM
Server/Tower 7
HP J3278A
SureStore CD-ROM
Server/Tower 7Plus
SCSI Features
This tower has an HP CD-ROM server module in the top bay
and 7 empty drive bays when shipped from Hewlett-Packard.
This product is the same as J3276A above, except that the
7 drive bays have 7 high-speed HP SureStore CD-ROM drives
pre-installed by Hewlett-Packard.
This tower has an HP CD-ROM server module in the top bay,
and 7 high-speed HP SureStore CD-ROM drives pre-installed by
Hewlett-Packard. It has an expansion SCSI connector for
attaching more drives, such as the 7-bay HP C2988A SureStore
CD-ROM Tower and 7 more HP SureStore CD-ROM drives. See
“HP C2988A SureStore CD-ROM Tower” on page 2-3 for attaching a 7-bay tower.
The SCSI bus is terminated at one end by the server module and
at the other end by an internal passive terminator on the backplane.
The SCSI IDs are set automatically on HP CD-ROM drives,
based on the position of the drives installed into the tower. You
need not set jumpers on the drives to select IDs. The topmost
drive in the tower is assigned ID 0 (zero), and the lowest drive is
assigned ID 6.
When installing drives from a vendor other than HewlettPackard, the SCSI IDs for the drives must be manually set.
Universal mounting rails available from HP as the product
HP C2998A Mounting Hardware for Non-HP Drives must be
attached to adapt the drive to the HP server/tower (see page 2-
8).
Installing Your Tower 2-1
Page 16
Unpacking Components
Unpack and inspect all parts for damage. Contact your dealer if
anything is missing.
•
Server/tower (installed modules vary; see page 2-1)
•
User’s Guide (this book)
•
2 front-cover keys
•
(Only for HP J3276A SureStore CD-ROM Server/Tower)
5 snap-on filler panels for empty bays,
in a separate bag or already installed
•
Power cord for your country, one of the following:
Australia and New Zealand8120-6803
China8120-8376
Denmark8120-6806
Europe8120-6802
Israel8120-6799
CAUTION!
South Africa8120-6807
Switzerland8120-6807
United Kingdom8120-6801
U.S.A. and Canada and Mexico8120-6805
❏If your installation requires a different power cord than the
one supplied with the server/tower, be sure to use a power
cord displaying the mark of the safety agency that defines
the regulations for power cords in your country. The mark is
your assurance that the power cord can be used safely with
the server/tower.
2-2 Installing Your Tower
Page 17
Customizing Your Tower
•
If all the drives needed at this time are already installed,
proceed to “Steps to Connect the Towers” on page 2-10.
•
If you will be installing additional drives or extending your
HP J3278A Server/Tower 7Plus, then use the optional sections below as needed, before proceeding to page 2-10.
• “You can now switch on power to the tower.”,
immediately below
• “Adding an HP SureStore CD-ROM Drive” on page 2-5
• “Adding an Non-HP CD-ROM Drive” on page 2-8
Extending HP J3278A Server/Tower 7Plus
HP C2988A
SureStore
CD-ROM Tower
This accessory most conveniently provides the additional bays
for extending beyond the seven drives in the HP J3278A
Server/Tower 7Plus. This tower includes a SCSI cable to connect
the two towers and an external active HP SCSI terminator to be
installed on a rear SCSI connector. SCSI IDs are set automatically on HP CD-ROM drives only (not on CD-ROM drives from
other vendors), based on their position in the tower. The topmost
position on this accessory tower is ID 0 on the second SCSI bus,
and the lowest position is ID 6 on the second SCSI bus. All 14
drives are read by the server module located in the HP J3278A
server/tower.
To add drives to the 7-bay tower, you can use the sections in this
chapter:
• “Adding an HP SureStore CD-ROM Drive” on page 2-5
• “Adding an Non-HP CD-ROM Drive” on page 2-8
Consult the User’s Manual accompanying the 7-bay tower for its
specific installation instructions. Complete the SCSI cable connection to the HP J3278A server/tower, the SCSI termination
connection, and the power cord connection as directed in that
manual. The “Steps to Connect the Towers” on page 2-10 include
the steps needed to start up both towers.
Note❏To install the 7-bay tower after the server/tower has been
installed, you must switch off power to the server/tower
before installing the 7-bay tower. After installing the 7-bay
tower, follow the “Steps to Connect the Towers” on page 2-10
to restart the server/tower.
Installing Your Tower 2-3
Page 18
Other SCSI-2
Devices
As an alternative to the HP 7-bay tower described above, you
can attach a chain of up to four SCSI-2 stand-alone (external)
drives to the HP J3278A server/tower, using its rear SCSI-2
connector. The connector is 50-pin female high-density micro-D.
CAUTION!
SCSI Chain Limits
❏No more than four (4) SCSI devices chained from the server
tower.
❏Cable lengths between devices limited to one (1) meter.
Total external cabling limited to four (4) meters.
Industry-standard SCSI-2 cables and terminators are available
in different lengths and with different connector types; obtain
cables that match the connectors on your drives. The HP SCSI
products in the table below may, or may not, match your drives.
Active Terminator, 50-pin high-density, (thumb
screws)
The server tower will manage the second SCSI bus composed of
the added drives; you must set the SCSI IDs of your drives for
that bus, and terminate the chain.
2-4 Installing Your Tower
Page 19
Adding an HP SureStore CD-ROM Drive
These drives, fully modular and self-configuring, can be installed
in any of the seven drive bays in the HP J3276A, J3277A, and
J3278A server/towers, and in the HP C2988A SureStore CDROM Tower. Drives have attached side rails, used to slide the
drive into the bays in these towers. No cables are needed.
You Need Only a
Front Cover Key
Optional:
Jumpers
If you are installing an additional HP CD-ROM drive module or
you are removing or replacing an existing one, all you need is the
front cover key. No tools are required.
Three of the four jumpers on the back of the drive should never
need changing when installing into an HP server/tower. One
jumper is an option you can set. All are described below:
Prty (Parity).
by the on setting enhances the reliability of the SCSI bus.
Term (Termination).
Termination should not be used in a tower.
Block.
boot a UNIX system from a CD-ROM drive in an HP CD-ROM
server/tower.
Eject (Lock).
Eject button is enabled. If you want to prevent others from
removing the CD inserted in your drive (such as in an open
workgroup setting) you can activate this Eject Lock feature by
setting this jumper to on. Then it is impossible to eject a CD
inserted in the drive by pressing the Eject button. It is possible
to eject the CD only by use of the Emergency Eject button; see
page 2-12.
Leave this off (in 2048-block read mode). You cannot
Leave this set to on. The parity check provided
Leave termination disabled—off.
The factory-default setting is off, that is, the
Changing Jumper Settings
1.Place the drive module flat on a firm surface with the back of
2.Find the four black jumpers on the right side of the attached
the drive and the attached connector card facing you.
connector card, to the left of the four colored power wires.
• To set a jumper to on, install it over both pins assigned to
that jumper.
• To set a jumper to off, install it over one pin only.
(If a jumper is removed, it is set to off.)
Installing Your Tower 2-5
Page 20
Installing the
Drive Module
While doing the procedure in “Installation Steps”, take the precautions listed below:
CAUTION!
❏Make sure that the towers are powered off.
❏Do not attempt to move or carry a tower without hooking the
cover at the bottom and locking the front cover lock.
❏When replacing the front cover of the tower, make sure that
the flange on the bottom of the cover is engaged in the cutout opening of the main body. Locking the cover without
properly aligning the flange can damage the tower case or
cover. The drives can be damaged if moved in this condition.
❏Do not push the drive module in by pushing on the bezel of
the CD-ROM drive itself. This may result in damage to the
drive’s door, or you might snap the plastic bezel of the drive.
Always use the metal handles provided with the drive.
❏Make sure you align the two side rails ofthe CD-ROM drive
module with the grooves in the walls of the tower. If the
drive module is not in the grooves, the tower will not function properly.
❏Do not force the drive module into the tower, or you may
damage the circuit board. Firm pressure should be adequate.
❏Do not use tools of any kind! If the drive module will not
install properly, remove it and call HP for support.
❏Replace the front cover of the tower by hooking it at the
bottom first. Then close the cover at the top. Lock it.
Installation Steps
2-6 Installing Your Tower
Page 21
1.Place the tower on an even surface, like a table or work
bench. Do not use an uneven surface like a carpeted floor.
Make sure the tower is powered off.
2.Use the key to unlock the front cover. The cover is locked when
the key index points to the right. The cover is unlocked when
the key index points up.
3.Place both of your hands on the top two corners of the front
cover and carefully pull it towards you. The cover will still be
attached at the bottom.
4.You can now remove the front cover by lifting it up, making
sure that the flange at the bottom of the cover has cleared the
opening of the tower casing. Set the front cover aside.
5.With the front cover off, you can remove a filler panel covering
the bay. Hook your finger behind the right or left end and
nudge it out slightly. Repeat on the other side. Repeat on each
side alternately until the panel pops off.
With the front cover off, you can remove a CD-ROM drive
module by placing both hands on the two handles on both
sides. Pull the module using even pressure on both handles.
6.You can install a CD-ROM module by aligning the rails with
the two grooves provided in each bay of the tower. Slide the
module in by holding the two handles on both sides and
pushing firmly until it is seated properly. Just before it stops,
you should feel the module inserting into its socket.
You can install a filler panel to cover an empty bay. Align the
studs on back of the filler panel with the grooves on the sides
of the tower. Align the pegs with the holes in the metal at
both sides of the front of the tower. Gently push in the left or
right side of the panel, then push in the other side, until it
pops into place. No screws are needed to secure the panel.
Alignment peg
Hole
Stud
Filler Panel (back view)
7.When you are finished, replace the front cover by first hooking
!
the flange of the cover into the bottom of the tower case. Close
the cover by pushing it towards the main body of the tower. Be
sure to lock the cover using the key.
8.You can now switch on power to the tower.
Installing Your Tower 2-7
Page 22
Adding an Non-HP CD-ROM Drive
You Need
Mounting Rails
Note❏IDE and EIDE CD-ROM drives are not supported.
SCSI-2 compatible CD-ROM drives can be installed into the
towers. You need to add side rails to the drive to fit it into the
tower bays, using HP C2998A Mounting Hardware for Non-HP
Drives. The mounting hardware includes four M3 x 0.5" screws
and four standard screws. The hardware is compatible with
HP J3276A, J3277A, and J3278A server/towers and the 7-bay
HP C2988A CD-ROM tower.
Installation Steps
The drive
is shown
inverted, for
rail installation.
1.Make sure that the towers are powered off.
2.Unpack the mounting hardware.
3.Check to see that your CD-ROM drive is SCSI-2 compatible.
4.Set the SCSI ID jumpers on your CD-ROM drive. (Refer to the
device’s installation manual. Some SCSI drives may contain
special termination instructions.)
Note❏Set the SCSI ID (using jumpers) to the number etched in the
metal at the side of each bay (inside the tower’s front cover),
or choose the bay etched with the number matching the ID.
5.You have received two sets of four screws. You must identify
which set fits with the lowest holes on each side of the drive.
Warning!❏Use only the lowest holes to attach the mounting hardware.
6.Position the mounting hardware along the drive as shown in
the illustration above. Align the holes and insert the four
screws. The power cord and SCSI ribbon cable should be
located toward the bottom of the drive.
2-8 Installing Your Tower
Page 23
7.Plug in the power cord and the SCSI ribbon cable.
8.Perform all the steps in “Installing the Drive Module” section
on pages page 2-6 and page 2-7.
Troubleshooting
•
When plugging in the assembly, the CD-ROM hits one of the
other devices or the tower frame.
• The assembly is upside down.
• The CD-ROM drive above or below is upside down.
• One device does not have standard CD-ROM dimensions.
• The mounting hardware is upside down or attached to
the wrong holes.
•
The assembly does not slide in all the way.
• The assembly is upside down.
• The CD-ROM drive above or below is upside down.
• One device does not have standard CD-ROM dimensions.
• The mounting hardware is upside down or attached to
the wrong holes.
For other problems, see chapter 9, “Troubleshooting”.
Installing Your Tower 2-9
Page 24
Steps to Connect the Towers
Before You Begin
CAUTION!
CAUTION!
bus may be damaged if
disconnect any units
when the power is on.
The SCSI
you connect or
•
Verify with your network administrator that a 10Base-T
(Ethernet) or 100Base-TX (Fast Ethernet) network connection is ready for the server/tower. Locate the twisted-pair
network cable (with an RJ-45 connector).
•
Verify that the tower’s power is off.
•
Verify that the power supply input voltage is set according
to the power standards in the country of use; set the voltage
switch on the rear of the tower (see the illustration below) to
115 volts or 230 volts. Also verify that the power cord is
appropriate for the country of use (see page 2-2).
•
If you are extending the HP J3278A Server/Tower 7Plus
(using its rear SCSI connector illustrated below), you must
complete all cable and termination connections on the towers, and on any stand-alone drives used, before you apply
power to the towers or drives. Apply power to the 7-bay
tower, or other stand-alone drives, before you apply power to
the server/tower. See page 2-3 and page 2-4.
Optional:
Rack Mounting
Input voltage swit ch
Power cord connector
RJ-45 network connector
SCSI connector
(HP J3278A only)
You can mount the tower in a rack using the HP C2982A
CD-ROM Tower Rackmount Kit.
1.Attach the power cord to the rear of the tower and to the
power line source. Do not switch on power yet.
Note❏If you are also installing the 7-bay HP C2988A SureStore
2-10 Installing Your Tower
CD-ROM Tower
(to the HP J3278A server/tower), now
install its power cord and then switch on its power.
Page 25
!
of the tower.
3.On the front of the server/tower, switch on the power. Verify
that:
Status indicator
2.Attach the network cable to the RJ-45 connector on the rear
Power
switch
CD indicator
Network indicator
Power indicator
•The ON/BUSY indicator lights on the HP CD-ROM drives
go on.
• The 4 indicator lights on the server module (illustrated
above) flash during a power-on self-test.
When the Status indicator (yellow) stops flashing and
remains off, the server/tower is ready for use. Depending
on the number of drives in use, this may take a few seconds
to five minutes.
The server auto-negotiates the link speed—10 or 100 megabits per second—and duplex setting—full or half—with
other devices on the network.
4.Press the Stop/Eject button (see illustration on page 2-12) to
access the tray of the topmost CD-ROM drive, place a compact
disc into the tray, and press Stop/Eject again to close it. Verify:
•The drive’s ON/BUSY indicator light turns off and the
DISC light goes on. If either one flashes continuously,
then either the disc is not standard or there is a problem
with the drive; refer to chapter 9, “Troubleshooting”.
•The server’s CD indicator light (green) goes on. If it does
not, then verify your connections and cycle power (switch
power off and wait 10 seconds and then switch power on
again) to the server/tower. If CD still does not go on, refer
to chapter 9, “Troubleshooting”.
Repeat step 4 for all drives (including the 7-bay tower if used).
Installing Your Tower 2-11
Page 26
Example Drive
How to Use HP SureStore CD-ROM Drive
Tray doorEmergency Eject button
Tray Loading and
Operation
DISC indicator
ON/BUSY indicator
•
Tray door: Press Stop/Eject button to open door. Insert CD
into drawer. Press Stop/Eject button to close door.
•
Stop/Eject button: Push to eject CD.
•
Emergency Eject button (recessed): If the automatic
Stop/Eject button does not work, switch off power. Insert
a paper clip or other thin rigid object in this hole to press
the recessed button to eject the CD.
•
ON/BUSY indicator: On (yellow) when power is switched on.
Flashing continuously when CD is inserted and being
accessed. Off when CD is inserted and not being accessed.
•
DISC indicator: On (green) when power is on and CD is
inserted. Off if no CD is inserted.
1.While the drive is powered up, push the Stop/Eject button.
The tray drawer will slide out in 2–3 seconds.
Stop/Eject button
2.Lay the bare CD into the depression in the tray, label side up.
3.Press the Stop/Eject button again, and the tray will slide shut
Note
❏We recommend you use the Stop/Eject button to close the
!
2-12 Installing Your Tower
within 2–3 seconds.
tray in a smooth and secure manner. Closing the tray by
pressing the front of the drawer by hand is not recommended.
Page 27
Care of CD-ROM
Discs
!
Check your CDs periodically to determine if they need cleaning.
If the CD is dusty, you can use a commercially available dust
removal spray to blow off dust particles. After removing the dust
particles, you can wipe the CD using a clean, soft cotton cloth.
Use a straight-line motion, wiping from the center out. Do not
wipe the CD in a circular motion.
Correct Procedure for Cleaning a Disc
If a CD becomes dirty or soiled with grease or other contaminants not removable by wiping, you can clean it with a CD-ROM
disc cleaner available at most computer dealers. Follow the
directions packaged with the cleaner.
Note❏Keeping your CD in its original case or in the CD-ROM drive
at all times will prevent it from becoming dirty or damaged.
Installing Your Tower 2-13
Page 28
2-14 Installing Your Tower
Page 29
Setup for IP Networks
If you are running TCP/IP on your network, this chapter 3
describes the basic procedures for getting access to the CDs from
the client workstations, for both required and optional configuration for IP network, and for access control related to IP. Any
workstations running HTTP (HyperText Transfer Protocol) over
TCP/IP can use a web browser to most easily access CDs and to
do any configuration you need for the HP CD-ROM server.
Many workstations are running other client and transport protocols in addition to TCP/IP, such as Microsoft networking (covered in chapter 4), Novell NetWare products (covered in chapter
5), and NFS (covered in chapter 6). We recommend that you
perform the additional protocol-specific procedures, such as
mapping drives (mounting) for easy client usage of CD-ROM
information. This chapter includes some references to those
procedures in the other chapters.
3
Required
Procedure
Novell NetWare/IP, whether used in combination with IPX or
under TCP/IP alone, requires you to follow the configuration
instructions in “Novell NetWare/IP” on page 5-17 also.
Set the IP Address for the Server
Before you can configure and use the CD-ROM server in the
TCP/IP environment, you must cause an available Internet
Protocol (IP) address to be assigned to the server. On some
systems, you also may need a unique host name to associate
with the IP address. This section provides these procedures.
Setup for IP Networks 3-1
Page 30
Before You Begin
Note❏Do not use the factory-default IP address (192.0.0.192) when
Note❏If you intend to use WINS, you must set the EnableWINS
•
Confirm with the network administrator that you may
proceed with network configuration.
•
Obtain an unused IP address from the network
administrator.
installing the server. Do not assign an IP address before
consulting the network administrator.
•
If Using DNS or WINS Host Names:
Obtain the unique host name from the network administrator. Then associate it with the server’s IP address in your
system host table, using the appropriate procedures for your
system. Consult your network administrator or your system
manuals.
parameter to yes by using one of the methods outlined in
“Methods for Configuration” on page 3-13.
•
Note the LAN hardware address (MAC address) printed on
the LAN Address label attached to the server or (top of) the
tower. The address is in the form 0060B0hhhhhh (where h is
a hexadecimal digit).
Methods for
Assigning the
IP Address
•
Verify that the CD-ROM server is powered up and connected
to the network.
•
To use a UNIX system to do one of the procedures in this
section, obtain root privileges.
•
To use Windows NT to do one of the procedures in this
section, obtain administrator privileges.
In this section the methods are summarized, and then each
specific procedure is given. The methods available to you for
assigning the IP address to the server depend on your network
operating system. Descriptions of each method state which operating systems can use the method.
3-2 Setup for IP Networks
Page 31
Choice of Manual Methods
1.Editing and saving the config.ini file for the server is
a universal method usable on any operating system. It
requires precision in editing the text of the file, however.
See page 3-4 for the details.
ARP
2.
(Address Resolution Protocol) is the easiest method to
use on supported systems—Windows NT and UNIX. Details
are found on page 3-4 to page 3-5
.
It requires that the IP
address is sent to each new device individually. ARP is not
routable; the workstation from which the configuration is
made must be located on the same network segment as the
server. If the default subnet mask and default gateway
address, both 0.0.0.0, will not allow access to the server after
setting the IP address, then you must use the method 1 above
for those parameters.
Choice of Automated Methods
RARP
1.
(Reverse Address Resolution Protocol) downloads the
IP address to each device automatically. It requires a rarp
daemon on your system. RARP operates within a single network segment only. RARP can be implemented by using
UNIX; see the details on page 3-6.
BOOTP
2.
(Bootstrap Protocol) is similar to RARP, but operates
on the entire network. It requires a bootp daemon on your
system. BOOTP can be implemented by using UNIX; see the
details on page 3-6.
DHCP
3.
(Dynamic Host Configuration Protocol) allows for the
automatic but temporary assignment of IP addresses from a
predefined pool of addresses. In the absence of either an active
rarp or bootp daemon running on the host, DHCP when
enabled will cause the selected host to automatically allocate
and download a free IP address, a default gateway (router)
address, and a subnet mask to the requesting CD-ROM server.
It also sets how long the IP addresses will remain valid. DHCP
can be implemented by using UNIX (see the details on page 3-
7) or Windows NT (see the details on page 3-7).
Note❏Only one of the RARP, BOOTP, or DHCP methods should be
enabled on a network at the same time. If both a BOOTP
and a DHCP server on the network provide an IP address,
then the BOOTP address is used. If both a RARP and a
BOOTP or DHCP server provides an IP address at the same
time, the results are undefined.
Setup for IP Networks 3-3
Page 32
Editing the
config.ini
File
To assign the IP address—in any environment—by editing the
config.ini file, you must first set up access to the CD-ROM
server from a workstation on the network, using the instructions
for “Client Access to CDs” in this chapter on page 3-8 or in chapter 4, 5, or 6 for your client networking protocol.
Use a text editor to open the config.ini file in the server’s
config folder, and edit the InternetAddress parameter in
the IP section. Go to “Using a Text Editor to Edit Server’s Files”
on page 7-10 for further explanation and for instructions to save
this file.
Windows NT:
Using ARP
Notes❏When you execute the ping command for the first time, the
To asssign the IP address in Windows NT by using the arp
command, access the DOS prompt window. Then perform the
commands shown below. The
<LAN-address>
can be found on
the LAN Address label on the tower (top) or server; each pair of
digits must be separated by a hyphen.
The host will return a message similar to “192.124.138.80 is
alive”, indicating that the address has been set and that com-
munication with the server is established.
Note❏The arp -s command may vary between different systems.
Some BSD-type systems expect the IP address (or host
name) and LAN address in reverse order. IBM AIX systems
require the additional argument ether for Ethernet net-
works, for example:
arp -s ether salesdept 00:60:b0:11:00:86 temp
❏When you execute the ping command for the first time, the
response time may be longer than usual. The ping command enables the server to assign itself the address.
❏Once the server has communicated using its IP address, the
arp and ping commands cannot be used to change the IP
address. This inhibits accidental or unauthorized changes of
the IP address.
Restart the server (cycle its power).
Setup for IP Networks 3-5
Page 34
UNIX:
Using RARP
To assign the IP address in UNIX by using RARP:
1.Append the following entry to your LAN (MAC) address
table, typically: /etc/ethers. The
<LAN-address>
can be
found on the LAN Address label on the server or (top of) the
tower; each pair of digits must be separated by a colon.
<LAN-address><host-name>
Example:
00:60:b0:11:00:86cdserv
2.Make sure the host table and alias name databases are
updated as required by your systems.
3.Start the rarp daemon (if not already running), typically by
using the command: rarpd -a
4.Restart the server (cycle its power).
UNIX:
Using BOOTP
Notes❏The ht and vm fields must be entered exactly as in the exam-
To assign the IP address in UNIX by using BOOTP:
1.Append the following entry to your boot table, typically
use the address found on
the server or (top of) the tower. As in the example, use no
separators between its digits.
:\
❏In the ip field, for
3-6 Setup for IP Networks
<IP-address>
use the IP address
assigned by the network administrator.
Page 35
❏For more explanation of the sm field, subnet mask, and the
gw field, default gateway (router) address, see the “Configu-
ration Parameter Reference” on page 7-13.
2.Make sure the host table and alias name data bases are
updated as described in “If Using DNS or WINS Host Names:”
on page 3-2.
3.Start the bootp daemon (if not already running), typically by
using the command: bootpd -a
4.Restart the server (cycle its power) to download the IP address,
default gateway address, and subnet mask.
UNIX:
Using DHCP
Windows NT:
Using DHCP
To assign the IP address in UNIX by using DHCP:
1.Edit or create a scope in the DHCP manager of the dhcp
daemon. The entries made in this scope should include:
• Subnet mask
• Default router Internet address
• NetBIOS over TCP/IP name server Internet address(es)
• NetBIOS over TCP/IP node type
Node type:
The server can act either as a B Node (WINS
disabled), or as an H Node (WINS enabled).
• NetBIOS over TCP/IP scope ID
• Lease duration
2.Activate the scope.
3.The DHCPEnable configuration parameter must be left set to
the default yes (enabled). See“Configuration Parameter
Reference” on page 7-13.
To assign the IP address in Windows NT by using DHCP:
1.Install the DHCP service on an NT server.
2.Open the DHCP Manager (in Administrative Tools)
3.In the Server menu, use Add DHCP Server to Server List to
4.In the Scope menu for a specific server, select Create. Enter:
enter the IP address of each DHCP server on the network.
• Range of IP addresses in a subnet that can be leased
• Subnet mask for the address range
• IP addresses to be excluded from the scope
• Lease duration (can be defaulted)
• Scope name
Setup for IP Networks 3-7
Page 36
5.Using the DHCP Options, configure the Default Gateway if the
default 0.0.0.0 is not appropriate.
6.Select Activate in the Scope menu.
Client Access to CDs
Methods for
Providing Access
HTTP:
Using a Web
Browser
For TCP/IP networks, two methods for client workstations to
access the server and its CDs are possible.
•
A web browser can be used for access immediately after an
IP address is assigned (see the beginning of this chapter).
•
Clients can map drives to the server, a CD-ROM drive, or a
particular CD.
The HP CD-ROM server supports HTTP over TCP/IP. This
means that the server works as a World-Wide Web server.
To access the CD-ROM server’s web page, you must first configure the server with an IP address as described in the section
that begins this chapter.
After you set up web access to the server according to the procedure in that section, HTTP support can be switched off and on by
setting the server’s configuration parameter HTTPEnable to off
or on (default setting on). See “Methods for Configuration” on
page 3-13.
The server can be accessed using any standard web browser,
such as Netscape Navigator or Microsoft Internet Explorer. This
procedure uses Internet Explorer as an example.
1.Start Internet Explorer.
2.From the File menu, select Open Location... The following
3-8 Setup for IP Networks
dialog is displayed:
Page 37
3.Enter the URL of the server as http://
<IP-address>
Alternatively, use the host name associated with the IP
address and assigned to the server.
4.Click OK. You should see the web page of the server, as shown
below.
When the CD Access tab is selected, a list of the server’s CDs
and DVD-ROMs is displayed. Click on a CD to view a list of its
contents. Thus you can browse the CDs as in any other file management utility.
Some CDs contain an index.htm or index.html file that provides access to the disc contents on a web page you can use with
the browser. If you click on such a CD, that web page will appear
in place of the simple list. However, you can see the simple list
rather than the index page by adding /. after the location
address.
For easy access to your server resources, web pages can be saved
in your web browser.
•
Netscape Navigator: Bookmarks, Add Bookmark
•
Microsoft Internet Explorer: Favorites, Add Favorites
Thereafter you can choose the page from your bookmarks menu.
Note❏Web browsers may save pages in local cache memory. In this
case, if a CD in a drive is changed; returning to the CD
Access tab will not show the changed CD. You must reload
the web page.
Setup for IP Networks 3-9
Page 38
Mapping Drives
An additional way to make the CDs available to workstations on
the network (clients) is the same as used with file servers: “mapping” the server to a drive letter on PC systems, or “mounting”
on UNIX systems. After the server is mapped or mounted, the
client accesses the server, with its CDs (and optionally its configuration parameters), just like any other attached disk drive or
networked file server.
The mapping or mounting procedure depends on the network
operating environment and client system. Use the procedures in
subsequent chapters as follows:
•
Microsoft & IBM Networks (SMB). . . . . . . . . . . . . . chapter 4
(Clients: Windows 95, Windows NT, Windows for Workgroups, OS/2, and DOS)
By making configuration changes, you can customize server
operation and can set access rights for security.
Some server configuration changes you might need are listed
below. Some of these items are detailed in this section:
•
Set up or change the server name for NetWare or for
Microsoft networking clients (SMB), or change the domain
or workgroup name for SMB. (See page 4-12.)
•
Set up a password or other access right restrictions, some of
which are specific to other networking and client protocols.
(see chapters 4, 5, and 6 for other protocols).
•
Disable server protocols, such as NetWare (page 5-10), SMB
on NetBIOS/NetBEUI, SMB on NetBIOS/TCP/IP (page 4-
12), and NFS (page 6-4), to prevent blanket access for protocols for which you have not configured access restrictions.
•
Disable access to the server through other protocols, or
through web browsers.
•
•
3-10 Setup for IP Networks
Set up Internet and SNMP parameters.
Set the server’s time.
Page 39
•
If you have installed CD-ROM disc changers, see page 9-12
to set the JukeBoxLockTime parameter to prevent disc
changer flutter.
Where to Find
Configuration
Information
Server’s Time
Configuration
More extensive information is provided in this section for some
of the configuration options, if they are general needs or relate
specifically to TCP/IP networks. (Setting the IP address, a
required configuration for TCP/IP, however, is described earlier
in this chapter.) Configuration options specific to Microsoft networking, Novell NetWare, or UNIX/NFS are addressed in chapters 4, 5, and 6, respectively.
For configuration options that do not need extensive explanation
here, see the list of configuration parameters on page 7-13 and
the description of the access rights starting on page 7-5. If you
use the web page for configuration, an option described later in
this section, online Help is available to you.
For instructions on using the configuration tools, see “Methods
for Configuration” on page 3-13.
The server’s clock has a volatile memory, so the correct time
must be set whenever the server is restarted.
Manually Configuring Date and Time
One alternative is to manually configure the server’s Date and
Time parameters whenever the server is restarted. Set the con-
figuration parameters as follows.
Parameter NameExample ValueDescription
Date97-06-28
Time14:46:30
yy-mm-dd
hh:mm:ss
Note❏If you are editing the config.ini file as your configuration
method, follow the setting with an exclamation mark.
Setup for IP Networks 3-11
Page 40
Setting Up the Network Time Protocol
An alternative to manual configuration is automatic time synchronization using the Network Time Protocol (NTP, as defined
by RFC 1769). Set these configuration parameters:
Parameter NameExample ValueDescription
Disabling Access
for Other
Protocols
TimeSyncSourceNTP
NTPServer192.4.2.30
Or use NetWare NDS Time Synchronization
(a general server parameter)
to set Network Time Protocol
(an IP parameter) IP address or
Internet domain name of a server
to supply the network time.
(see chapter 5)
For security, you can switch off all access to the server through
other protocols for which you do not set up access restrictions, by
setting configuration parameters in this table. Use the last item
in the table if you ever want to disable all web browser HTTP
access.
AreaParameter NameDescription
SMBEnableNetBEUI
SMBEnableNBT
Disables access to the CD-ROM server
using SMB over NetBIOS/NetBEUI.
Disables access to the CD-ROM server
using SMB over NetBIOS/TCP/IP.
.
Server Password
NetWare NWEnable
NFSNFSEnable
IPHTTPEnable
Disables access to the CD-ROM server
using NetWare.
Disables access to the CD-ROM server
using NFS.
Disables web access to the CD-ROM
server using HTTP.
You can change the following general server configuration
parameter:
Parameter Name
ServerPassword
Example
Value
fy98db
Default:
pass
Description
The Supervisor , Administra tor , or Root
password used for protocols HTTP,
NetWare bindery, SMB user level,
SNMP, and FTP. After the configur ation
is written, the pass word appears as an
asterisk * for each character.
3-12 Setup for IP Networks
Page 41
Server/CD-ROM
Access Rights
The HP CD-ROM server can be configured to restrict user access
to CD-ROM drives, to individual CDs, and to the server configuration. You can limit the number of users simultaneously accessing any CD to comply with user-license restrictions.
Access restrictions are set individually for each protocol (NetWare, SMB, NFS, and HTTP). The default settings in some protocols provide full access rights to all users, so we recommend
that you implement at least two access restrictions:
•
Restrict access to the config and volumes directories.
•
Disable all protocols not being used. If unused protocols are
not disabled, a user accessing the server through such a protocol may be given full access rights, regardless of the security configurations in other protocols. (See page 4-12, page 510, and page 6-4.)
Access restrictions are set individually for each CD-ROM drive,
for the CDs inserted into the drives, and for the server configuration files. The corresponding parameter values are stored in
individual access-control files in the server. Not all parameters
are used in every access file. Refer to the “File System Description” starting on page 7-3.
Methods for
Configuration
If you use Windows NT domains or NetWare NDS, you also can
set up access restrictions for those environments. See page 4-15
and page 5-10.
There are two primary methods on IP networks for configuring
the server and the access rights:
•
A web browser can be used to access the server’s web page,
as long as HTTP is available. Just as you use the CD Access
tab to see the CDs (see page 3-8 above), you can use the
other three tabs—Basic Setup, Advanced Configuration, and
Management and Access Rights—for configuring. This is an
easy way to make changes in the configuration and access
files stored on the server. See the section “Using a Web
Browser and Server Web Page” on page 7-8 for details.
•
A text editor can be used to directly edit and save the configuration and access files stored on the server. Precision in
editing the files is required. (These access rights can be
restricted for other client workstations.) See “Using a Text
Editor to Edit Server’s Files” on page 7-10 for details.
Setup for IP Networks 3-13
Page 42
3-14 Setup for IP Networks
Page 43
Setup for Microsoft Networks (SMB)
This chapter describes the setup for Microsoft and IBM
networks running SMB (Server Message Block). SMB is a
protocol that makes use of NetBIOS. NetBIOS can be transported over different network protocols. The HP SureStore
CD-ROM server supports the following transport methods
automatically:
•SMB over NetBIOS/NetBEUI
(NetBIOS Extended User Interface)
•SMB over NetBIOS/TCP/IP
(also called NBT)
4
Clients using SMB could be running Windows 95 or 98,
Windows NT, Windows for Workgroups, OS/2, or DOS.
This chapter includes examples of procedures for such client
systems. You may need to refer to your network operating
system manuals for assistance with specific procedures.
If you are running TCP/IP on your network as well as SMB,
refer to chapter 3 to assign the IP address to the server (the “Set
the IP Address for the Server” section from page 3-1 to page 3-8)
before granting access to clients.
Following that section of chapter 3 are instructions for
accessing the CDs and configuring the server by using a web
browser (starting on page 3-8). For IP and HTTP installations, we recommend use of those instructions for client
access and configuration in addition to the methods following in this chapter 4.
Setup for Microsoft Networks (SMB) 4-1
Page 44
Client Access to CDs
The procedures for accessing your HP CD-ROM server are
similar to accessing any other workstation or file server. Users
at workstations (clients) on the network use the same procedures to access both types of servers, For easy access to the CDs
from applications, the server should be made available to each
client system—”mapped” to a drive letter on PC systems. After
the server is mapped, the client accesses the server, with its
CD-ROMs (and optionally its configuration parameters) just like
any other attached disk drive or networked file server.
The mapping described in this section can be done on one workstation by one administrator or installer first. Then any configuration tasks for the server setup can be done (described later in
“Configuring the Server” on page 4-11), before setting up all the
network clients according to the procedures in this section.
1. Select Access
Point
2. Map Drives
Notes❏The examples below assume that you have not changed the
Different workstations need different points of access to the
server. The network administrator or installer, for example,
needs access to configure and monitor the server and to configure access rights. Then, the administrator may want to set up all
the clients with access to the CDs, bypassing the configuration
and security files stored on the server. Choices for the latter
setup include mapping all the CDs in the server and mapping
each drive or CD separately.
The procedures for mapping drives require you to select an
access point. We recommend using the description of access
points and the file system used on the server, in the reference
chapter starting on page 7-2, before proceeding.
This section gives you examples of how to set up access to the
server from clients for Windows 95, Windows NT, Windows for
Workgroups, OS/2, and DOS.
server name for SMB: HP
six digits of the server’s LAN hardware (MAC) address. If
you have changed the server name (see page 4-12), that
assigned name appears instead.
hhhhhh
, where
hhhhhh
are the last
❏You can set the configuration parameter ShowAllShares so
4-2 Setup for Microsoft Networks (SMB)
that the only files seen are the CDs. Then folders such as
config and root will not be seen when accessing the
server. However, these folders can still be accessed by manually inserting the path to the folder when mapping the drive.
Page 45
Windows 95 and
Windows NT 4.0
1.Start the Windows Explorer from the Start Programs Menu.
2.Expand the Network Neighborhood icon. The available
resources are displayed.
3.Expand the Entire Network icon to display the server name.
and then open the Workgroup folder. If there is a “Workgroup”
folder, the server will appear within it. If there is no “Workgroup” folder, the server will appear in the (alphabetically)
first workgroup listed.
4.Start the Windows Explorer from the Start menu.
5.Select Map Network Drive... from the Tools menu.
6.Select a drive letter.
7.In the path box, type \\HP
Skip ahead to step 11 if you see the server. However, if you
cannot find a workgroup containing the server name in Network Neighborhood, then continue here with step 4:
hhhhhh
\root, where
hhhhhh
are
the last six digits of the server’s LAN hardware (MAC)
address.
Setup for Microsoft Networks (SMB) 4-3
Page 46
8.This maps the administrative root access to the server. If you
wish to use this root access for the same drive letter the next
time you start your computer, check Reconnect at Logon. (If
you wish to select another level of mapping, see step 10 below.)
9.Click the OK button. The server is now ready for use.
10. Optional: If you have other SMB domains or workgroup names
defined and the server did not appear within them, you now
can use this client to edit your server configuration to change
the parameter Domain/GroupName to the name of your
existing domain or workgroup.
See page 4-12.
If you wish to map the server to a different level than
root level (as described in step 12 below), you can then
return to step 1 of the procedure above to redo the
mapping as desired.
11. Double-click the entry for your new server. The default entry
name is HP
hhhhhh
, where
hhhhhh
are the last six digits of the
server’s LAN hardware (MAC) address.
Note❏The individual CDs are shown as well as the cd folder that
contains them. This is not the normal hierarchical appearance, but it is done this way to give you the choice of mounting either individual CDs or all of them together.
If the SMB configuration parameter ShowAllShares has
been set to no (see chapter 7), the only files you will see are
the CDs.
12. To map a resource to a drive letter, right-click one of the following server resources:
• For root access, right-click root.
•For cd folder access, right-click the cd folder.
• For CD-ROM access, right-click the specific CDROM
folder name.
13. From the pop-up menu, select Map Network Drive.
4-4 Setup for Microsoft Networks (SMB)
Page 47
14. Select a drive letter for your server or use the default drive
letter.
15. Check Reconnect at Logon if you wish to use the server
resource as the same drive letter the next time you start your
computer.
16. Click the OK button. The server is ready for use.
Note❏In the Microsoft network environment, network resources
are accessed by specifying a server and a resource on that
server using the Universal Name Convention (UNC) as:
\\server\resource
The resource is not a file path. You may not replace the
resource name with the path to a file or folder on your CD.
Therefore, if using the file system as outlined in the “File
System Description” on page 7-3, only cd folder access would
be possible (see “Access Points” on page 7-2). However, the
server also allows you to map the following resources on
SMB clients:
• root, which includes the complete file system of the
server. Map a network drive to root for root-level access.
• cd_
nnnnn
, a folder for each CD (or CD-ROM drive if an
alias name for the SCSI ID has been set). Map a network
drive letter to cd_
nnnnn
to map an individual CD.
Setup for Microsoft Networks (SMB) 4-5
Page 48
Windows for
Workgroups
1.Start File Manager.
2.From the Disk menu, select Connect Network Drive. The following dialog is displayed.
3.Select a drive letter or accept the default.
4.In the Path field, type an entry for your server:
\\hp
hhhhhh\<path>
hhhhhh
are the last six digits of your server’s LAN hard-
ware (MAC) address.
<path>
is the path of the resource that provides your
selected access point on the server.
• For root access, type root
•For cd folder access, type cd
• For CD-ROM access, type the specific volume name
5.Check Reconnect at Startup if you wish to use the same
mapping the next time you start your computer.
6.Click the OK button. The server is ready for use.
The server
appears in the workgroup named “Workgroup”, or in the
(alphabetically) first workgroup listed. Or, you now can use
this client to edit your server configuration to change the
parameter Domain/GroupName to the name of your existing
domain or workgroup. Seepage 4-12.
4-6 Setup for Microsoft Networks (SMB)
Page 49
Windows NT 3.511.Start the File Manager.
2.From the Disk menu, select Connect Network Drive.
3.Select a drive letter or accept the default.
4.In the Path field, type an entry for your server:
\\hp
hhhhhh\<path>
hhhhhh
are the last six digits of your server’s LAN hard-
ware (MAC) address.
<path>
is the path of the resource that provides your
selected access point on the CD-ROM server.
• For root access, type root
•For cd folder access, type cd
• For CD-ROM access, type the specific volume name, for
example, cd_12345
5.Check Reconnect at Startup if you wish to use the same
mapping the next time you start your computer.
6.Click the OK button. The server is ready for use.
Setup for Microsoft Networks (SMB) 4-7
Page 50
IBM Peer for OS/2Make sure you have IBM Peer for OS/2 installed. If not, do the
procedure on page 4-9 instead of the procedure on this page.
1.Double-click the OS/2 Peer icon. The Peer window opens:
2.Double-click the Sharing and Connecting icon to open the
following window:
4-8 Setup for Microsoft Networks (SMB)
Active connections will be listed in the window.
Page 51
3.From the Connection menu, select Create. The following
dialog is shown:
4.In the Workstation field, enter HP
hhhhhh
, where
hhhhhh
are
the last six digits of the server’s LAN hardware address.
5.In the Share/alias field, enter the name of the server folder or
an individual CD-ROM:
• For root access, type root
•For cd folder access, type cd
• For CD-ROM access, type the specific volume name, for
example, cd_12345
6.In the Local device name field, select a drive letter to map.
7.Click Create. The server is ready for use.
Note❏The server folders will not be visible on the Desktop in OS/2
versions prior to OS/2 WARP Connect. If you wish to use an
earlier version of OS/2, we recommend using third-party
NFS software to connect to the server.
If you do not have IBM Peer for OS/2
The server can be mapped to a drive letter using the net use
command, as follows:
1.Open an OS/2 window.
2.At the OS/2 prompt,enter:
net use
hhhhhh
<drive-letter>
are the last six digits of your server’s LAN hard-
ware (MAC) address.
<path>
is any server folder.
: \\HP
hhhhhh\<path>
Setup for Microsoft Networks (SMB) 4-9
Page 52
3.To make the connections active each time you boot up, create
or edit the startup.cmd file to include the net use command.
DOSThe CD-ROM server is mounted using the net use command,
provided that the appropriate network support is installed.
1.At the DOS prompt, enter the following:
net use
hhhhhh
<drive-letter>
: \\HP
hhhhhh\<path>
are the last six digits of the server’s LAN hardware (MAC) address. In the examples below, the example
full LAN hardware address used is 0060B0CD000B.
<path>
is the path of the folder that provides your selected
access point on the server.
Example of root access:
net use E: \\HPcd000b\root
Example of cd folder access:
net use F: \\HPcd000b\cd
Example of CD-ROM access:
net use G: \\HPcd000b\cd_12345
2.To make the connection permanent, edit your autoexec.bat
file to include your net use command.
Notes❏If you are using DOS within Windows 95/98 or Windows NT
❏If you are using DOS within Windows NT , you may use the
4-10 Setup for Microsoft Networks (SMB)
4.0, and you wish to access file or directory names longer
than 8 characters, you will need to precede these long names
with a quote mark (
“).
An example of changing to the directory named Product
Information:
G:\HPcd000b\CD\>cd ”PRODUCT INFORMATION
* wildcard.
An example of quickly changing to that directory:
G:\HPcd000b\CD\>cd ”PRODUCT*
Page 53
Configuring the Server
By making configuration changes, you can customize server
operation and can set access rights for security.
Configuration
Tips
Where to Find
Configuration
Information
Some server configuration changes you might need:
•
Disable access to the server using protocols other than SMB.
•
Set up a password for the server.
•
Set up CD access rights using using share-level security, or
using user-level security with NT domain authentication.
•
Set the server’s time.
•
If you have installed CD-ROM disc changers, see page 9-12
to set the JukeBoxLockTime parameter to prevent disc
changer flutter.
More extensive information is provided in this section for some
of the configuration options, if they are general needs or relate
specifically to SMB networks. If you are also using TCP/IP on
your network, see chapter 3 for additional features. If you are
also using Novell NetWare, see chapter 5 for additional features.
For configuration options that do not need extensive explanation
here, see the list of configuration parameters on page 7-13 and
the description of the access rights starting on page 7-5. If you
use a web browser for configuration, one of the options described
later in this section, online Help is available to you for explanation.
Your procedures for performing the configuration of the server
are described below the configuration explanations, in the section “Methods for Configuration” on page 4-17.
Setup for Microsoft Networks (SMB) 4-11
Page 54
Disabling Access
for Other
Protocols
For security, you can switch off all access to the server through
other protocols for which you do not set up access restrictions, by
setting configuration parameters in this table. Use the last two
parameters in the table if you ever want to disable access
through SMB.
AreaParameter NameDescription
Server’s Time
Configuration
IPHTTPEnable
NetWare NWEnable
NFSNFSEnable
SMBEnableNetBEUI
SMBEnableNBT
Disables web access to the CD-ROM
server using HTTP.
Disables access to the CD-ROM server
using NetWare.
Disables access to the CD-ROM server
using NFS.
Disables access to the CD-ROM server
using SMB over NetBIOS/NetBEUI.
Disables access to the CD-ROM server
using SMB over NetBIOS/TCP/IP.
The CD-ROM server’s clock has a volatile memory, so the correct
time must be set whenever the server is restarted.
Set Date and Time
To manually configure the server’s Date and Time parameters
whenever the server is restarted, set the following general
server parameters.
Note❏If you are editing the config.ini file as your configuration
How and Where
Server Appears
Parameter NameExample ValueDescription
Date97-06-28
Time14:46:30
yy-mm-dd
hh:mm:ss
method, follow the setting with an exclamation mark.
To change the server name to text that is easy for your clients to
identify, set the following SMB parameter:.
Parameter NameExample Value Description
Name of the server in the Microsoft
network environment. The default
is
HP
ServerNamegrafxcd
hhhhhh
are the last 6 digits of the server’s
LAN hardware (MAC) addre ss .
, where
hhhhhh
4-12 Setup for Microsoft Networks (SMB)
Page 55
So that the server will appear in your SMB domains or workgroups, change the following SMB parameter:.
Parameter NameExample ValueDescription
Server/CD-ROM
Access Rights
Domain/GroupNameFinance
Existing SMB domain or
workgroup name.
The HP CD-ROM server can be configured to restrict user access
to CD-ROM drives, to individual CDs, and to the server configuration. A password can be configured for SMB user-level access
control. You can limit the number of users simultaneously
accessing any CD to comply with user-license restrictions. And
we recommend that you restrict access to the config and
volumes directories on the server.
Access restrictions are set individually for each protocol. If you
use other network protocols in addition to SMB, consult the
other chapters for setup of those protocols. (The default settings
in some protocols provide full access rights to all users, so we
recommend that you disable all protocols not being used. If you
do not, a user accessing the server through such a protocol may
be given full access rights, regardless of the security configurations in other protocols.)
Server Password
One access restriction that is set for access to the server generally is the server password. You can change the following general parameter:
Parameter Name
ServerPassword
Example
Value
fy98db
Default:
pass
Description
The Supervisor , Administra tor , or Root
password used for protocols HTTP,
NetWare bindery, SMB user level,
SNMP, and FTP. After the configur ation
is written, the pass word appears as an
asterisk * for each character.
Setup for Microsoft Networks (SMB) 4-13
Page 56
Share-Level Access Control
A password can be assigned to any CD-ROM server folder or any
CD inserted in a connected drive. The user will automatically be
prompted for the password when trying to access the shared
folder. Access will then be granted to the folder and all subfolders.
To set this access control, set the following SMB (Windows)
parameter (stored in the config.ini file in the config folder):
Parameter NameValueDescription
SecurityModeuserLevel
This setting implements userlevel access control.
Use the SMBPassword access control parameter (in the relevant
files stored in the volumes folder). The following values are
valid:
SMBPassword
*
<password>
Description
No passw ord required to ac cess the f older with
Microsoft networking
A valid password (15 characters maximum)
(blank) No access with Microsoft networking
To assign a password to a server folder or to a CD, or to change
an old password:
Example 1: Restrict access by prompting the user to enter a
password, for example, “pass”:
SMBPassword = PASS
4-14 Setup for Microsoft Networks (SMB)
Example 2: Grant access to all Microsoft networking users:
SMBPassword = *
Page 57
User-Level Access Control
You can implement user-level security authenticated by an NT
domain controller. A user logging in to the server must provide
her identity (name and domain) and password. The server uses
this information to validate her identity against the primary
domain controller (PDC). It actually logs in to the PDC, reads
the user's group membership, and then logs out. If its login is
successful, the user is allowed access to the server.
For SMB, the server maintains an administrator account that is
never authenticated against the primary domain controller,
because some method of access must be maintained in case the
PDC becomes unavailable.
For this access control, set the following SMB (Windows) parameters (stored in the config.ini file in the config folder):
Parameter NameValueDescription
Implements user-level access con-
SecurityModeuserLevel
trol (authentication against PDC),
rather than share-level control.
AuthenticationDomain
AdministratorPassword
Logging in.
<15-byte
string>
<15-byte
string>
Then, to log in as the local administrator on the
Name of the domain that all user's
identities are verified against.
User's account must res ide within.
Passw ord of the
of the server (not the same as an
administra tor with an acco unt in the
domain).
local
administrato r
server, you will need to specify:
•
Domain: the name of the server
•
User: the administrator
•
Password: the contents of AdministratorPassword
parameter (see above)
Controlling Rights.
Under user-level SMB access control,
security rights can be set individually or by group membership.
The SMBUser/Group access-control parameter is used to create
entries for the user and group rights (in the relevant files stored
in the volumes folder). There can be as many of these entries as
needed in a particular file.
Setup for Microsoft Networks (SMB) 4-15
Page 58
Default Example: (Your entry may already have changes.)
SMBUser/Group = <DOMAIN>/Domain Users(RX)(RX)
<DOMAIN>/ remains in the entry. When the file is used, the
value for the AuthenticationDomain parameter (shown
above, and stored in the config.ini file) will be used for
<domain>.
/ appears in the file.
Domain Users must be replaced by a user or group name
on the PDC for which you will specify the rights.
RX —in the first pair of parentheses—must be replaced by
directory rights for that name. "RX", for example, assigns
read and execute rights to the user or group specified.
RX —in the second pair of parentheses—must be replaced
by file rights for that name. "RX", for example, assigns read
and execute rights to the user or group specified.
RX allowable values (for both cases) are listed below. These
rights values are cumulative, making the user's effective
rights the sum of all rights gained from direct trustee
assignments and from group memberships:
NONEspecifies no rights
Rspecifies read rights
Xspecifies execute right
Allspecifies all rights
Repeat the line of text for further user or group specifications.
Complete Example:
User/Group = <DOMAIN>/Domain Admins(All)(All)
SMB
4-16 Setup for Microsoft Networks (SMB)
Page 59
Methods for
Configuration
Methods used on Windows and IBM OS/2 systems for configuring the server and the access rights include the following. The
parameters and settings described above can be set with any
method:
•
Any text editor can be used to directly edit and save the configuration and access files stored on the server. Precision in
editing the files is required. (These access rights can be
restricted for other client workstations.) See “Using a Text
Editor to Edit Server’s Files” on page 7-10 for details.
•
For Windows 95/98 and NT 4.0 systems, the HP CD-ROM
Server Utility software can be downloaded from HP’s electronic distribution sites. For details see “Electronic Support
Services” on page A-1. This software utility provides an
easy-to-use graphical interface; using it makes changes in
the configuration and access files stored on the server.
•
If TCP/IP and HTTP are available, then a web browser can
be used to access the server’s web page. This is an easy way
to make changes in the configuration and access files stored
on the server. See the section “Using a Web Browser and
Server Web Page” on page 7-8 for details.
Setup for Microsoft Networks (SMB) 4-17
Page 60
4-18 Setup for Microsoft Networks (SMB)
Page 61
Setup for Novell Networks
This chapter describes the setup for Novell networks running
NCP (NetWare Control Protocol). The HP SureStore CD-ROM
server supports NCP transported over IPX and/or NetWare/IP.
The Novell network products could be NetWare 3.x, 4.x, or
Intranetware. Clients using NCP could be running Windows 95
or 98, Windows NT, Windows for Workgroups, OS/2, or DOS.
This chapter includes examples of procedures for many such
installations. You may need to refer to your network operating
system manuals for assistance with specific procedures for some
client systems.
5
If you are running TCP/IP on your network as well as Novell
products, refer to chapter 3 to assign the IP address to the server
(the “Set the IP Address for the Server” section from page 3-1 to
page 3-8) before granting access to clients.
Following that section of chapter 3 are instructions for
accessing the CDs and configuring the server by using a web
browser. For IP and HTTP installations, we recommend use
of those instructions for client access and configuration in
addition to the methods following in this chapter 5.
Setup for Novell Networks 5-1
Page 62
Client Access to CDs
The procedures for accessing your HP CD-ROM server are
similar to accessing any other NetWare file server. Users at
workstations (clients) on the network use the same procedures
to access both types of servers, For easy access to the CDs from
applications, the server should be made available to each client
system—”mapped” to a drive letter on PC systems. After the
server is mapped, the client accesses the server, with its
CD-ROMs (and optionally its configuration parameters) just like
any other attached disk drive or networked file server.
The mapping described in this section can be done on one workstation by one administrator or installer first. Then any configuration tasks for the server setup can be done (described later
“Configuring the Server” on page 5-9), before setting up all the
network clients according to the procedures in this section.
1. Select Access
Point
2. Map Drives
Note❏The examples below assume a default CD-ROM server name
Different workstations need different points of access to the
server. The network administrator or installer, for example,
needs access to configure and monitor the server and to configure access rights. Then, the administrator may want to set up all
the clients with access to the CDs, bypassing the configuration
and security files stored on the server. Choices for the latter
setup include mapping all the CDs in the server and mapping
each drive or CD separately.
The procedures for mapping drives require you to select an
access point. We recommend using the description of access
points and the file system used on the server, in the reference
chapter starting on page 7-2, before proceeding.
The examples in this section are for Microsoft client software on
Windows 95/98, Windows NT, Windows for Workgroups, and
DOS. For use of Client 32, you may need to make substitutions
in these procedures.
for NetWare: HP
digits of the server’s LAN hardware (MAC) address. Your
server name will be different if you have changed the server
name or if you are using NetWare/IP.
hhhhhh
_NW, where
hhhhhh
are the last six
5-2 Setup for Novell Networks
Page 63
Windows 95 and
Windows NT 4.0
1.Start the Windows Explorer from the Start Programs Menu.
2.Expand the Network Neighborhood icon. The available
resources are displayed.
3.Expand the Entire Network icon and open the NetWare
networking folder.
4.Start the Windows Explorer from the Start menu.
5.Select Map Network Drive... from the Tools menu.
6.Select a drive letter.
7.In the path box, type \\HP
Skip ahead to step 10 if you see the server. However, if you
cannot find the server name in NetWare, then continue here
with step 4:
hhhhhh
\root, where
hhhhhh
are
the last six digits of the server’s LAN hardware (MAC)
address.
Setup for Novell Networks 5-3
Page 64
8.This maps the administrative root access to the server. If you
wish to use this root access for the same drive letter the next
time you start your computer, check Reconnect at Logon. (If
you wish to select another level of mapping, see step 13 below.)
9.Click the OK button. The server is now ready for use.
10. Double-click the entry for your new server. The default entry
name is HP
hhhhhh
, where
hhhhhh
are the last six digits of the
server’s LAN hardware (MAC) address. The name can be
changed later during configuration.
11. If you are using bindery mode, you will be prompted to enter
your user name and password, unless you are already logged
in. (Before the server has been set up, all users have full access
to it.)
12. Once you are logged in to the server, you should see the available CDs by their volume names, as well as the sys folder.
Expand sys to see the cd folder (which also contains all the
volumes).
5-4 Setup for Novell Networks
Page 65
13. To map the server to a drive letter, right-click one of the
following server resources:
• For root access, right-click the sys folder.
•For cd folder access, right-click the cd folder.
• For CD-ROM access, right-click the specific CD-ROM vol-
ume folder.
If you do not wish to map the server to a drive letter, just
continue to explore the server until the file you need is
found.
14. From the pop-up menu, select Map Network Drive...
15. Select a drive letter for your server.
16. Check Reconnect at Logon if you wish to use the server
resource as the same drive letter the next time you start your
computer.
17. Click the OK button. The server is ready for use.
Setup for Novell Networks 5-5
Page 66
Windows for
Workgroups
1.Start File Manager.
2.From the Disk menu, select Connect Network Drive…
The following dialog is displayed. If you also have Microsoft
Network installed, you may have to click the NetWare button
to display the dialog.
3.Click the Select NetWare Connection button on the toolbar.
4.Select the entry for your new server. The default entry name
is HP
hhhhhh
_NW, where
hhhhhh
are the last six digits of the
server’s LAN hardware (MAC) address. The name can be
changed later during configuration.
5.Click the Login button.
6.If you are using bindery mode, you will be prompted to enter
your user name and password, unless you are already logged
in. (Before the server has been set up, all users have full
access.)
5-6 Setup for Novell Networks
Page 67
7.Once you are logged in to the server, click the Drive Connections button on the toolbar. The following dialog is displayed.
8.Double-click HP
hhhhhh
_NW\SYS (where
hhhhhh
are the last
six digits of the server’s LAN hardware (MAC) address). Then
double-click the CD folder to display the following dialog.
Setup for Novell Networks 5-7
Page 68
9.Select a drive letter in the Drives listing and then:
• For root access, select HP
hhhhhh
_NW_SYS in the
Resources list.
•For cd folder access, select the CD folder in the Resources
list.
• For CD-ROM access, select the specific CD-ROM folder
name (inside the CD folder) in the Resources list.
If you are using bindery mode, the CDs will appear at the
same level as the sys volume.
10. Click Map to map the server to the selected drive letter.
11. Click Permanent if you wish to use the server as the same drive
letter the next time you start your computer.
12. Click the Exit button on the toolbar. The server is ready for use.
DOSThe server is mounted using the map command.
1.On a NetWare file server, at the DOS prompt enter the
following:
map root <
hhhhhh
drive-letter>
:=hp
hhhhhh
_NW/
<path>
are the last six digits of your server’s LAN hardware (MAC) address. In the examples below, the full LAN
hardware address assumed is 0060B0CD000B.
<path>
is the path of the folder that provides your selected
access point on the server.
Example of root access:
map root E:=HPcd000b_NW/SYS:
Example of cd folder access:
map root F:=HPcd000b_NW/SYS:/CD
Example of CD-ROM access:
map root G:=HPcd000b_NW/SYS:/CD/cd_18881
2.To make the connection permanent, edit your autoexec.bat
file to include your map command.
5-8 Setup for Novell Networks
Page 69
Login Scripts
Alternative
As an alternative to setting up clients individually as described
above, login scripts can be used to automate and distribute
access to the CDs. To map the networked CDs, the attach/map
(in NetWare 3.x) or login/map (in NetWare 4.x) commands are
normally used.
Configuring the Server
By making configuration changes, you can customize server
operation and can set access rights for security.
Configuration
Tips
Some Novell environments require some configuration of the
server itself before setting up the client access, including the
following. The configuration is included in this section.
•
Novell NetWare 4.x NDS (Novell Directory) Server
•
Novell NetWare/IP
Novell NetWare 3.x bindery server networks allow some access
configuration options to be configured, which can be done either
before or after giving access to all the clients.
Some other server configuration changes you might need:
•
Disable access to the server using protocols other than
NetWare.
•
Set up or change the server name for Novell clients.
•
Set up a password to be used with the bindery server.
•
Set the server’s time.
•
If you have installed CD-ROM disc changers, see page 9-12
to set the JukeBoxLockTime parameter to preventdisc
changer flutter.
Where to Find
Configuration
Information
More extensive information is provided in this section for some
of the configuration options, if they are general needs or relate
specifically to Novell networks. If you are also using Microsoft
networking, see chapter 4 for additional features.
For configuration options that do not need extensive explanation
here, see configuration parameters list on page 7-13 and the
description of the access rights starting on page 7-5. If you use a
web browser for configuration, one of the options described later
in this section, online Help is available to you for explanation.
Your procedures for performing the configuration of the server
are oulined after the configuration explanations, on page 5-20.
Setup for Novell Networks 5-9
Page 70
Disabling Access
for Other
Protocols
For security, you can switch off all access to the server through
other protocols for which you do not set up access restrictions, by
setting configuration parameters in this table. Use the last
parameter in the table if you ever want to disable access through
NetWare.
AreaParameter NameDescription
NDS Server
SMBEnableNetBEUI
SMBEnableNBT
IPHTTPEnable
NFSNFSEnable
NetWare NWEnable
Disables access to the CD-ROM server
using SMB over NetBIOS/NetBEUI.
Disables access to the CD-ROM server
using SMB over NetBIOS/TCP/IP.
Disables web access to the CD-ROM
server using HTTP.
Disables access to the CD-ROM server
using NFS.
Disables access to the CD-ROM server
using NetWare.
If the CD-ROM server is used as an NDS-compatible server, you
may store the access rights in the NDS tree, or you may store
the access rights in a file on a Novell file server. We recommend
the first option, storing them in the tree.
Store NDS Rights in NDS Tree
If this is the first HP CD-ROM server being installed in your
NDS tree, the server will try to extend the NDS Schema with a
new attribute to the “NCP server” class. This new attribute will
not affect the operation of your NetWare servers. This schema
extension has been approved by Novell.
For this first server, you must use the account of the Admin
object that has supervisor rights to the Root object of the NDS
tree. This means that the user in the NDSAdminName parameter
(see the table on page 5-11) must have supervisor access rights
to that root object.
Once this first server has been successfully installed, the schema
is extended. In future installations of other HP CD-ROM servers
into this tree, as well as any re-installation of this server, you
can use the account of the Admin object for the tree in which the
server will reside.
After you set up your own access to the server from a workstation on the network using the instructions in the previous
section, “Client Access to CDs” starting on page 5-2, you can configure the server as shown in table below.
5-10 Setup for Novell Networks
Page 71
Notes❏You must use either Relative Distinguished Typefull or Rel-
ative Distinguished Typeless notation for the parameters.
Examples for the NDSAdminName parameter:
Relative Distinguished Typefull notation:
CN=ADMIN.OU=DCO.O=HP
Relative Distinguished Typeless notation:
ADMIN.OU.DCO.HP
This is used in the examples in the table
❏You can not use Distinguished Typeless or Distinguished
Several minutes after the configuration changes take effect, the
server should be installed in the NDS tree, and users will be able
to access the server using NDS mode.
You must log out and then log in again to have all the necessary
rights on the server object and the associated volume.
Enable the NDS login.
Name of the tree into which to install the server.
Context into which to install the server.
Distinguished na me of a user or administrator , with
Supervisor or Create rights in the context (with
Supervisor rights to
The password of the administrator entered in
NDSAdminName
written, password appears as ******.
Change to
change to
server is already install ed .
Store NDS access rights in tree.
yes
Forced
Root
for first ins tallation).
above. After configuration is
when ready to install the se rver , or
, which doesn’t check whether
Verify proper installation by running NetWare Administrator
(NWADMIN). The server should appear as a NetWare NDS File
server. Examine the properties in NWADMIN. The server status
should be “UP”.
If the server does not appear in the NDS tree, or if it appears
but the status is down or unknown, check for error messages
in the logfile.txt file in same directory as the server’s config.ini file. Refer to “NetWare NDS Installation
Errors” on page 9-11 for corrective action for each error
message.
Setup for Novell Networks 5-11
Page 72
We recommend that you disable bindery mode, setting the
configuration parameter BinderyEnable to no, after you have
successfully installed the server in NDS, then allow users to
logon in NDS mode only.
Note❏If NDS mode is not functioning, you can always access the
CD-ROM server in bindery mode by logging in as supervisor,
even if the parameter BinderyEnable is set to no.
Store NDS Rights in File
First identify or create a directory on an existing Novell file
server to contain the NDS access rights file.
After you set up your own access to the server from a workstation on the network using the instructions in the previous
section, “Client Access to CDs” starting on page 5-2, you can configure the server as shown in table below. Use the account of the
Admin object for the tree in which the server will reside.
Notes❏You must use either Relative Distinguished Typefull or Rel-
ative Distinguished Typeless notation for the parameters.
Examples for the NDSAdminName parameter:
Relative Distinguished Typefull notation:
CN=ADMIN.OU=DCO.O=HP
Relative Distinguished Typeless notation:
ADMIN.OU.DCO.HP
This is used in the examples in the table
on page 5-11.
5-12 Setup for Novell Networks
Page 73
❏You can not use Distinguished Typeless or Distinguished
Enable the NDS login.
Name of the tree into which to install the server.
Context into which to install the server.
Distinguished na me of a user or administrator , with
Supervisor or Create rights in the context (with
Supervisor rights to
The password of the administrator entered in
NDSAdminName
ten, password appears as ******.
Change to
change to
server is already install ed .
Store NDS access rights in a text file on NetWare
server as defined f or
The file on a NetWare file server to store NDS
access rights, with case-sensitve syntax:
SERVER/VOLUME:DIR/.../FILE.
The
DIR
ate the file when rights are first changed on the
server’s
yes
Forced
must exist; the CD-ROM server will cre-
vol um e.
SYS
Root
for first ins tallation).
above. After configuration is writ-
when ready to install the se rver , or
, which doesn’t check whether
NDSRightsFile
.
DAT
After the configuration changes take effect, assign the server
NDS object (newly created by the above procedure) as a trustee
to the directory for the access rights file. The rights to assign are
Read, Write, Create, Erase, Modify, and FileScan.
Then you may change any rights on the CD-ROM server’s SYS
volume, using NDS Admin. If you do so, the CD-ROM server will
create the access rights file you defined on the other Novell file
server.
You must log out and then log in again to have all the necessary
rights on the server object and the associated volume.
Verify proper installation by running NetWare Administrator
(NWADMIN). The server should appear as a NetWare NDS File
server. Examine the properties in NWADMIN. The server status
should be “UP”.
If the server does not appear in the NDS tree, or if it appears
but the status is down or unknown, check for error messages
in the logfile.txt file in same directory as the server’s config.ini file. Refer to “NetWare NDS Installation
Setup for Novell Networks 5-13
Page 74
Errors” on page 9-11 for corrective action for each error
message.
We recommend that you disable bindery mode, setting the
configuration parameter BinderyEnable to no, after you have
successfully installed the server in NDS, then allow users to
logon in NDS mode only.
Note❏If NDS mode is not functioning, you can always access the
CD-ROM server in bindery mode by logging in as supervisor,
even if the parameter BinderyEnable is set to no.
Default Settings in NetWare NDS
After installing the HP CD-ROM server as an NDS server, the
default security rights will protect all the configuration files.
Only the CDs will be displayed to users. The user rights to the
server and its files and directories are set up as follows:
•Supervisor rights to the SYS volume is inherited from the
Supervisor rights to the NDS Server object.
•Read and File Scan rights are inherited from the Browse
rights to the NDS Server object.
•By default, the config and volumes directories are setup
with an inherited-rights filter that filters all rights except
the Supervisor right. This protects all the configuration files.
Because the CD-ROM server acts as a normal NDS file server,
its NDS Security rights can be set using standard procedures.
The server’s file system security rights are set up by the
NetWare Administrator, as detailed below:
1.Login as Admin, and start the NetWare Administrator.
2.Browse the SYS: volume by double clicking it. You will see all
the directories available in the server.
3.Select the directory or file for which you wish to set the access
rights to, and right-click it.
4.Choose Details, and make the required changes.
The NetWare NDS access rights for the CD-ROM server can be
set using Security Equivalence, Group, Container, Organization
role, and User Objects as with any other NDS file server. There
is no difference between how you use NetWare Administrator to
set these access rights for a CD-ROM server, and how you would
set the access rights on an NDS file server.
5-14 Setup for Novell Networks
Page 75
Bindery Server
With Authentication.
If user access control is desired, you
must configure the BindAuthentication parameter. The CDROM server must log onto the authentication server briefly to
authenticate the user and identify the groups the user belongs
to. In this case, the authentication server must have a standby
license for the CD-ROM server, but several CD-ROM servers can
share this license. If a license is not available, the user may still
be authenticated but group information cannot be read.
Authorized users have configurable rights to the volumes of the
CD-ROM servers. Authorization of users is done using an existing NetWare server, referred to as the Authentication Server in
the configuration.
The authentication process reduces Network Administrator
overhead. The Administrator does not have to maintain a separate user database for CD-ROM servers. If the user is defined in
the file server that the CD-ROM server uses for authentication,
the Administrator will not have to do anything to give the user
access to the CD-ROM server.
For access to the CD-ROM server connected to a NetWare 3.x
Server, authentication is validated through a user list in the
bindery of the NetWare server:
•
If on the list, a user’s password will be verified and the user
will be granted access.
•
If the password is incorrect, login will fail.
•
If not on the list, the user will not be granted access to the
CD-ROM server. However, the user could login as “guest”
and get access to volumes that are not protected.
To control the access, create or edit the NetWareUser/Group
entries in the access control files as follows:
NetWareUser/Group
*
<any user or group>
<entry not present>
Description
Any user has access
Users with this name or in this group have
access
No access from NetWare
You may add as many NetWareUser/Group entries as you
require. See the following examples.
Setup for Novell Networks 5-15
Page 76
Example 1: Grant all NetWare users access:
NetWareUser/Group = *
Example 2: Grant access to all users in the group “salesdep” and
to the user “Daryl” who is not a member of “salesdep”:
Note❏You can always access the CD-ROM server using the user
name supervisor and the password specified by the
parameter ServerPassword. The factory-default password
is pass.
With No Authentication.
When accessing the CD-ROM
server, if user authentication is not required, then NetWare
server licenses are also not required because the server does not
logon to the file server. In this case, you do not have to specify
the CD-ROM server’s BindAuthentication configuration
parameter. All users (except supervisor) will be given guest
access rights.
To restrict access to the CD-ROM server’s configuration and
security files when no Authentication Server is used, use the
NetWareUser/Group access-control parameter. Replace * with
the text “Supervisor”. This changes the access rights from “no
restrictions” to “supervisor only”.
Also set the configuration parameter ServerPassword to the
password you wish to use.
Access to the configuration files and the access rights files will
then be limited to the Supervisor and will be password protected. Users will not have access to those files, but will have
guest access to CDs.
5-16 Setup for Novell Networks
Page 77
Novell
NetWare/IP
You can use the CD-ROM server in a NetWare environment that
uses only the TCP/IP protocol. Use Novell’s documentation to
make sure that the NetWare TCP/IP environment is fully implemented first.
To use the IP protocol in NetWare the standard IP parameters,
the IP address, subnet mask, default gateway (router) address,
and DNS server must be configured, along with the specific IP
enable and IP DSS server parameters.
Assign an IP address to the server; refer to “Set the IP Address
for the Server” on page 3-1.
Set the following IP configuration parameters.
Parameter NameDescription
InternetAddress
DefaultRouter
NetMask
PrimaryDNS
SecondaryDNS
The server’s IP address.
The default gateware (router) address.
The subnet mask.
The IP address of the primary DNS server.
Used for identifying computers by name
instead of IP address.
The IP address of the secondary DNS
server, in case the primary DNS server is
unavailable or disconnected.
Set the following NetWare configuration parameters.
Parameter NameDescription
NetWareIP_Enable
NetWareIP_DSS_Server
Enables NetWare over the IP protocol.
The IP address of the DSS server.
After the server is restarted and a delay of about 5 minutes, clients that support the NetWare/IP protocol will connect directly
to the server peer-to-peer. Clients without NetWare/IP support
will be routed through a Novell server with an IPX/IP gateway.
Setup for Novell Networks 5-17
Page 78
To Use NetWare/IP Only.
You can disable the IPX protocol on the server:
1.Set the following CD-ROM server configuration parameter
for NetWare:
Parameter NameValue
NWEnableno
2.After restarting the server, set the following CD-ROM server
configuration parameters for NetWare:
Parameter NameValue
InternalNetAddress
ServerName
Internal network address
Hexadecimal string that is unique on
the network, following Novell guidelines.
3.Restart the server again, and wait 5 minutes.
The server will then be accessible to the clients that support
the NetWare/IP protocol.
Note❏If the clients cannot then access the server, then do the
following:
a.Switch off the power to the server.
b.Wait 20 minutes for the SAP table to be flushed.
c.Switch on power to the server.
d.Wait 5 minutes for the server to be visible. All NetWare/IP
clients should now be able to access the server.
5-18 Setup for Novell Networks
Page 79
Server’s Time
Configuration
The CD-ROM server’s clock has a volatile memory, so the correct
time must be set whenever the server is restarted.
Manually Configuring Date and Time
To manually configure the server’s Date and Time parameters
whenever the server is restarted, set the following general
server parameters.
Parameter NameExample ValueDescription
Date97-06-28
Time14:46:30
yy-mm-dd
hh:mm:ss
Note❏If you are editing the config.ini file as your configuration
method, follow the setting with an exclamation mark.
Setting Up the Network Time Protocol
An alternative to manual configuration is automatic time synchronization using the Network Time Protocol (NTP, as defined
by RFC 1769). Set these configuration parameters.
Parameter NameValueDescription
TimeSyncSourceNTP
NTPServer
For example:
192.4.2.30
(a general server parameter) to set
Network Time Protocol
(an IP parameter) IP address or
Internet domain name of a server
to supply the network time.
Setting Up NDS Time Synchronization
If you are using NetWare NDS, another alternative is to set
automatic time synchronization from a NetWare Time Server.
Set the following general server configuration parameters:
Parameter NameValueDescription
TimeSyncSourceNDS
TimeZone
NDS time synchronization is normally obtains using the SAP
method. Or, if you have a Time Provider Group on your system
you can provide a list of servers for the CD-ROM server to contact to obtain its time synchronization. The list can also contain
For example:
-8
Set
NetWare network.
Time zone in which the server is
operating. See the TimeZone
value list on page 7-19.
to get the time from the
NDS
Setup for Novell Networks 5-19
Page 80
Secondary Time Servers. Set the following server configuration
parameter for NetWare:
Parameter NameValueDescription
Server Password
TimeSyncSources
SAP
or
srv1,srv2
Default
find the primary time servers. Or,
enter the server names to be contacted for time synchronization as
server1,server2,
commas).
means automatically
SAP
... (using
You can change the following general server parameter:
Parameter Name
ServerPassword
Example
Value
fy98db
Default:
pass
Description
The Supervisor , Administra tor , or Root
password used for protocols HTTP,
NetWare bindery, SMB user level,
SNMP, and FTP. After the configur ation
is written, the pass word appears as an
asterisk * for each character.
Methods for
Configuration
Methods for configuring the server and the access rights
described above include the following:
•
Any text editor can be used to directly edit and save the configuration and access files stored on the server. Precision in
editing the files is required. (These access rights can be
restricted for other client workstations.) See “Using a Text
Editor to Edit Server’s Files” on page 7-10 for details.
•
For Windows 95/98 and NT 4.0 systems, the HP CD-ROM
Server Utility software can be downloaded from HP’s electronic distribution sites. For details see “Electronic Support
Services” on page A-1. This software utility provides an
easy-to-use graphical interface; using it makes changes in
the configuration and access files stored on the server.
•
If TCP/IP and HTTP are available, then a web browser can
be used to access the server’s web page. This is an easy way
to make changes in the configuration and access files stored
on the server. See the section “Using a Web Browser and
Server Web Page” on page 7-8 for details.
5-20 Setup for Novell Networks
Page 81
Setup for UNIX Networks (NFS)
This chapter describes the setup for UNIX systems on networks
using NFS (Network File System) transported over UDP/IP.
Examples of procedures for UNIX systems are included. You
may need to refer to your system manuals for assistance with
specific procedures.
Use the instructions in chapter 3 to assign an IP address to the
server (the “Set the IP Address for the Server” section from page
3-1 to page 3-8) before doing any of the procedures in this chapter.
6
Following that section of chapter 3 are instructions for
accessing the CDs and configuring the server by using a web
browser (starting on page 3-8). For installations with IP and
HTTP, we recommend use of those instructions for client
access and configuration in addition to the methods following in this chapter 6.
Client Access to CDs
The procedures for accessing your HP CD-ROM server are
similar to accessing any other workstation or file server. Users
at workstations on the network use the same procedures to
access both types of servers, For easy access to the CDs from
applications, the server should be “mounted” for each client system. After the server is mounted, the client accesses the server,
with its CD-ROMs (and optionally its configuration parameters)
just like any other attached disk drive or networked file server.
The mapping described in this section can be done on one workstation by one administrator or installer first. Then any configuration tasks for the server setup can be done (described later in
“Configuring the Server” on page 6-3, before setting up all the
network clients according to the procedures in this section.
Setup for UNIX Networks (NFS) 6-1
Page 82
Reference on
Server File
System
Different workstations need different points of access to the
server. The network administrator or installer, for example,
needs access to configure and monitor the server and to configure access rights. Then, the administrator may want to set up all
the clients with access to the CDs, bypassing the configuration
and security files stored on the server. Please refer to the
description of access points and the file system used on the
server, in the reference chapter, starting on page 7-2.
Mount Drives
Note❏You will need root privileges to mount the CD-ROM server.
On UNIX systems, the CD-ROM server is accessed using NFS.
Mount the server by using the following procedure:
1.Create a directory for the CD-ROM server:
mkdir
<directory>
Example:
mkdir /hpcd
2.Mount the CD-ROM server:
mount
<IP-address-or-hostname>
<IP-address-or-hostname>
is the IP address or host
:/
<directory>
name assigned to the CD-ROM server during TCP/IP
configuration; see “Set the IP Address for the Server” on
page 3-1.
NFS for PC or
Apple Macintosh
The CD-ROM server can also be accessed through third-party
NFS software for PC or Apple Macintosh computers. If you run a
TCP/IP network, this provides an alternative to Microsoft networking (SMB). Please see the NFS software documentation for
instructions on how to mount the CD-ROM server.
6-2 Setup for UNIX Networks (NFS)
Example:
mount cdserv:/ /hpcd
Page 83
Configuring the Server
By making configuration changes, you can customize server
operation and can set access rights for security.
Configuration
Tips
Where to Find
Configuration
Information
Some server configuration changes you might need:
•
Disable workstation access to the server using protocols
other than NFS.
•
Restrict user access.
•
Set the server’s time.
•
If you have installed CD-ROM disc changers, see page 9-12
to set the JukeBoxLockTime parameter to prevent disc
changer flutter.
More extensive information is provided in this section for some
of the configuration options, if they are common needs or relate
specifically to UNIX networks. If you are also using TCP/IP on
your network, see chapter 3 for additional features.
For configuration options that do not need extensive explanation
here, see the list of configuration parameters on page 7-13 and
the description of the access rights starting on page 7-5. If you
use a web browser for configuration, one of the options described
later in this section, online Help is available to you for explanation.
Your procedures for performing the configuration of the server
are described below the configuration explanations, in the section “Methods for Configuration” on page 6-8.
Setup for UNIX Networks (NFS) 6-3
Page 84
Disabling Access
for Other
Protocols
For security, you can switch off all access to the server through
other protocols for which you do not set up access restrictions, by
setting configuration parameters in this table. Use the last
parameter in the table if you ever want to disable access through
NFS.
AreaParameter NameDescription
Server’s Time
Configuration
IPHTTPEnable
SMBEnableNetBEUI
SMBEnableNBT
NetWare NWEnable
NFSNFSEnable
Disables web access to the CD-ROM
server using HTTP.
Disables access to the CD-ROM server
using SMB over NetBIOS/NetBEUI.
Disables access to the CD-ROM server
using SMB over NetBIOS/TCP/IP.
Disables access to the CD-ROM server
using NetWare.
Disables access to the CD-ROM server
using NFS.
The CD-ROM server’s clock has a volatile memory, so the correct
time must be set whenever the server is restarted.
Manually Configuring Date and Time
To manually configure the server’s Date and Time parameters
whenever the server is restarted, set the following general
server parameters.
Parameter NameExample ValueDescription
Date97-06-28
Time14:46:30
yy-mm-dd
hh:mm:ss
Note❏If you are editing the config.ini file as your configuration
method, follow the setting with an exclamation mark.
6-4 Setup for UNIX Networks (NFS)
Page 85
Setting Up the Network Time Protocol
An alternative to manual configuration is automatic time synchronization using the Network Time Protocol (NTP, as defined
by RFC 1769). Set these configuration parameters:
Parameter NameValueDescription
Server/CD-ROM
Access Rights
TimeSyncSourceNTP
NTPServer
For example:
192.4.2.30
(a general server parameter) to set
Network Time Protocol
(an IP parameter) IP address or
Internet domain name of a server
to supply the network time.
Access restrictions are set individually for each protocol. If you
use other network protocols in addition to NFS, consult the other
chapters for setup of those protocols. (The default settings in
some protocols provide full access rights to all users, so we recommend that you disable all protocols not being used. If you do
not, a user accessing the server through such a protocol may be
given full access rights, regardless of the security configurations
in other protocols.)
The HP CD-ROM server can be configured to restrict user access
to CD-ROM drives, to individual CDs, and to the server configuration. You can limit the number of users simultaneously accessing any CD to comply with user-license restrictions. And we
recommend that you restrict access to the config and volumes
directories on the server.
For general access-control options not explained here, see the
description of the access rights starting on page 7-5. If you use a
web browser for configuration, one of the options described later
in this section, online Help is available to you for explanation.
Setup for UNIX Networks (NFS) 6-5
Page 86
NFS-Specific Access Controls
You may restrict access by means of NFS to users with a certain
IP Address, Group ID (GID) or User ID (UID).
Access is controlled by creating or editing the NFSIPAddress,
NFSGroup, and NFSUser entries in the access-control files in the
volumes folder on the CD-ROM server. The following values can
be used:
NFSIPAddress
*
<any IP address>
<entry not present>
NFSGroup
*
<group ID>
<entry not present>
NFSUser
*
<user ID>
<entry not present>
Description
Any user with any IP address has access.
Only users with the specified IP addresses
have access.
IP address is not used to grant access.
Description
Any user with any GID ha s access to the f older
or CD.
Only users with the specified GID have access.
GID is not used to grant access.
Description
Any user with an yU ID has ac cess to the folder
or CD.
Only users with the spec ified U ID ha v e access .
UID is not used to grant access.
Note❏There is an or relation between NFS access-control parame-
ters. A user fulfilling any one of the NFS access criteria you
have specified will be granted access. If you set an asterisk
(*) to any of the parameters, all users will have access
regardless of the settings of the other parameters.
You may add as many NFSIPAddress, NFSGroup and NFSUser
parameters as you require. See the following examples.
Example 1: Give access to users with UID 100 and 101 and to all
users with GID 4:
NFSUser = 100
NFSUser = 101
NFSGroup = 4
6-6 Setup for UNIX Networks (NFS)
Page 87
Example 2: Give access to users with IP address 192.124.138.60
and 192.124.138.65:
PC workstations on a UNIX network can also be authenticated.
This requires an authentication server to be specified by the
NFS configuration parameter PCNFSDAuthentServer. That
parameter is combined with the DefaultUid parameter, in 4
different ways, to obtain the following behavior:
DefaultUid
Example:
-2
Example:-2Example:
0
00.0.0.0
PCNFSD
AuthentServer
0.0.0.0
192.124.138.99
Example:
192.124.138.99
Result for PCNFSD clients
Clients with user ID and group ID = -2
can be authenticated, but there is no
authent ication server.
Clients authentic ated by the server get
their real user ID and group ID. Clients
not authenticated default to
DefaultUid
Clients authentic ated by the server get
their real user ID and group ID. Clients
not authe nticate d will fail.
All clients will fail.
.
Setup for UNIX Networks (NFS) 6-7
Page 88
Methods for
Configuration
Methods used on UNIX systems for configuring the server and
the access rights include the following. The parameters and settings described above can be set with either method:
•
Any text editor can be used to directly edit and save the configuration and access files stored on the server. Precision in
editing the files is required. (These access rights can be
restricted for other client workstations.) See “Using a Text
Editor to Edit Server’s Files” on page 7-10 for details.
•
If TCP/IP and HTTP are available, then a web browser can
be used to access the server’s web page. This method is
described in “Using a Web Browser and Server Web Page”
on page 7-8. Doing this makes changes in the configuration
and access files stored on the server.
6-8 Setup for UNIX Networks (NFS)
Page 89
Setup Reference for All Networks
This chapter is a collection of reference information helpful for
setting up the HP CD-ROM server. Information needed for specific network operating systems is contained in chapters 3, 4, 5,
and 6. Topics in this chapter include:
•
Understanding the server’s file system . . . . . . . . . . . page 7-3
Consult this section, especially when you first use an
HP CD-ROM server, for an explanation of the file system
contained on the server. It includes the structure of
CD-ROM drives and individual CDs and of files determining
the server configuration and access controls.
7
•
Selecting an access point for server clients . . . . . . . . page 7-2
When accessing the server and its CDs, and when mapping
or mounting drives, you have a choice of access points, based
on the server’s file system. Also, different access points are
intended for administrator/installers and for the clients
using the CDs.
•
Using a web browser and server web page . . . . . . . . page 7-8
This is the easiest configuration method and is supported by
on-line help. However, it requires that you configure the
server with an Internet (IP) address on a TCP/IP network.
•
Using a text editor to edit the server’s files . . . . . . page 7-10
You can use your favorite text editor in any operating
environment.
These reference tables describe the server configuration
parameters, used with the web browser or with file editing.
•
HP Web JetAdmin and remote management . . . . . page 7-20
Setup Reference for All Networks 7-1
Page 90
File System and Access Points
Access Points
Consult the “File System Description” on page 7-3.
Administrative: Root Folder Access
With the top level of the server directory structure as the access
point, the user can access all files, folders, and CDs on the
server, including the config and volumes folders. Network
administrators, who configure and monitor the server, normally
use this access.
All CDs in CD-ROM Server: CD Folder Access
With the cd folder as the access point, the user can access all
CDs inserted into the drives in the CD-ROM server. On PCs,
this makes it possible to use only one drive letter to access all
drives connected to the server. This is the normal access for most
users.
Each CD: CD-ROM Access
Two alternatives:
Specific CD
•
An inserted CD (or DVD-ROM) disc can be used as the
access point. On PCs, this makes it possible to map a drive
letter to a single CD. This may be necessary to run CD software that expects to find its data at the root level.
Aliased Drive
•
A connected CD-ROM or DVD-ROM drive (and any disc in
the drive) can be used as the access point—if the SCSI ID
has been given an alias name. In other words, a SCSI Alias
is used as the access point; only the files of discs in that
drive can be accessed. This means that access restrictions
can be defined only once, and users do not have to re-map
each time a new disc is inserted into the drive. This is useful
for administering periodically updated CDs. The name of the
CD as advertised to the network is unchanged.
7-2 Setup Reference for All Networks
Page 91
File System
Description
The server appears to each system as a file server. Like any
other file server, it has a directory structure in which files are
stored. The server directory structure is outlined below. The
purpose of each folder is more fully explained below.
These folders contain
each CD-ROM’s files
and data.
The index file is used
for web browsing.
The config folder holds
configuration file s used
by the CD-ROM server.
These folders contain
Same as
folders at
upper right.
the files that control
access rights.
(Generic) Folder
root
This folder (which is named sys or / in different operating
systems) includes everything—the cd folder (with all of the CDs
beneath) and the config and volumes folders. Use this folder
as the access point for the administrator.
Folder
cd
Use this folder as the access point for all CDs in the server.
When a CD is inserted into a drive, a folder for it is created in
the server’s cd folder. All the files on that CD can be accessed
through this folder. Use this folder, subordinate to the the cd
folder, as the access point for the individual CD. Its name will
comply with the following rules:
•
The volume name held on the CD is used if alias names have
not been set (see below).
•
If the volume name is not detected (for example, if it is specified in upper-case letters) and there are no alias names set,
then the server automatically sets the name cd_
where
nnnnn
is a unique five-digit number.
nnnnn
,
Setup Reference for All Networks 7-3
Page 92
•
If an administrator has set a CD-ROM alias, it will be used
instead of the volume name. Since a volume name may not
be an easily recognizable representation of the CD contents,
assigning a CD-ROM alias is a convenient way of setting a
more significant or recognizable name.
Note❏If you run an application from a CD, or look for an applica-
tion’s associated files on the CD, the application may not recognize it by the CD-ROM alias. In that case, you will not be
able to use a CD-ROM alias.
•
If the system administrator has set a SCSI alias, it will be
used in place of any of the above names. The SCSI alias is
also known as the drive alias or the SCSI Alias. A SCSI alias
is useful for the following reasons:
• When a SCSI alias is set, any CD inserted into the drive
will be seen as having this name. Thus you could use the
same drive for a series of discs, such as a monthly issue,
and you will not have to enter a new name each time you
change the disc.
• When a SCSI alias is set, the volume rights for any CD
inserted in the drive are determined by the drive access
rights. This is convenient because the access rights need
setting only once, while the disc can be changed.
config
Folder
The config folder contains CD-ROM server configuration files:
html
and
public
Folders.
These contain HTML files and
images used when accessing the server from web browsers.
stat.txt
File.
config.ini
This contains CD-ROM server statistics.
File.
This is used to set the CD-ROM server
parameters as shown in the table starting on page 7-13.
scsi.txt
File.
This is used as a single point of viewing all the
CD-ROM drives and what is inserted in each of them.
index.htm
File.
This is used when accessing the server from
web browsers.
7-4 Setup Reference for All Networks
Page 93
volumes
Folder
The volumes folder contains all files used for controlling the
access of the CD-ROM server, to the connected CD-ROM drives,
and to the CD-ROMs inserted. See the access information in
chapters 3, 4, 5, and 6.
In configuring access, you will access these files directly if you
use the option of manually editing and saving the server’s configuration files to set security rights. On the other hand, if you
use a web browser or another configuration tool (such as the
HP CD-ROM Server Utility), you will access these files indirectly through that configuration tool.
Three folders are contained in the volumes folder:
cdrom
Folder.
A text file is automatically created in the cdrom
folder when a CD is inserted into the CD-ROM server. It is identified by its volume name. The file controls the user access to the
CD. Settings for up to 56 discs can be stored in the server at any
time. The settings will remain even if the disc is ejected. When
the limit is reached, the oldest settings are discarded when a
new disc is inserted.
Folder.
scsi
Each file is named id
address and
The scsi folder contains a file for each SCSI ID.
<x>
lun
<y>
.txt (where
<y>
is the LUN address), and will be created auto-
<x>
is the SCSI
matically. If the SCSI alias name is configured in this file, this
file will control access to the CD inserted in the drive.
An HP J3278A SureStore CD-ROM Server/Tower 7Plus that
is extended with drives beyond its internal bays will show
two SCSI buses.
server
Folder.
In this folder, the files cd.txt, config.txt,
root.txt, and volumes.txt control access to the file system of
the CD-ROM server itself. The file default.txt contains the
default settings to be used when either a new CD is inserted or a
new CD-ROM drive is connected.
Setup Reference for All Networks 7-5
Page 94
The files in the volumes folder are used for the following
functions:
To set access rights to:Select the following:
The CD-ROM se rver
The configuration files
The access-rights files
All of the connected drives and CDs
Any of the individual drives
Any of the individual CDs
Any new drives or CDs that wi ll be
connected in the future
root.txt
config.txt
volumes.txt
folder
cd.txt
the SCSI drive identity
(example:
the CD-ROM name in the
folder (example:
default in the
in the
in the
id2lun0.txt
server
in the
server
server
in the
server
music_1.txt
folder
server
folder
)
cdrom
folder
folder
)
General Structure of Access Rights
Access restrictions are set individually for each CD-ROM drive,
for the CDs inserted into the drives, and for the server configuration files, using files in the folders described above. The following list describes the parameters stored in the access files. Not
all parameters are used in every access file.
Note❏If you use Windows NT domains or NetWare NDS, you also
can set up access restrictions for those environments. See
page 4-15 and page 5-10.
Name.
volume name, it will be assigned a default name cd_
where
names will be id
and
This volume name cannot be changed. If a CD has no
nnnnn
nnnnn
<y>
is a unique five digit number. CD-ROM drive
<x>
lun
<y>
, where
<x>
is the SCSI address
the LUN (logical unit number) to identify multi-unit
,
drives.
Alias.
The name displayed in the cd folder representing the
CD or CD-ROM drive. By editing this entry, you can select a
name that makes sense to the users of the CD. The name must
be a unique and valid volume name.
7-6 Setup Reference for All Networks
Page 95
Comment.
the user is selecting CDs.
•
In SMB, the share-level name must not exceed 12 characters. If this is insufficient, you can use the comment parameter to give more information to users when configuring.
•
In NetWare, the comment is not available. However the 12character naming limit does not exist, so you can assign a
longer name instead of a comment.
Text that is displayed in Windows Explorer when
DriveName.
changed.
InsertedVolume.
be changed.
LockEject.
Note❏The three items above appear only in the SCSI drive access
files, which are identified as id
UserLimit.
CD. If it is set to 0, any number of users may access the disc.
SessionTimeout.
sidered to be active after the last access to the CD. When the
time has expired, another user may access the CD and perhaps
lock out the first user, depending on the UserLimit setting.
Note❏Items in the access control files which have a value of * have
no access restrictions. For example, * for SMBPassword
means that no password is required to access the volume.
The manufacturer’s name of the drive; cannot be
The name of the CD that is inserted; cannot
Locks the eject button if set to yes.
<x>
lun
<y>
.
The maximum number of simultaneous users of a
Specifies how many seconds a user is con-
The following notes may help you when managing access rights:
•
•
•
•
The identity of the drive will appear as: id
<x>
where
If the CD has no volume name, and an alias name has not
been assigned, the name of the disc will default to
cd_
nnnnn,
The settings for a CD are stored even if the CD is removed.
The settings are immediately available if the CD is reinserted. Settings are limited to 56 CDs typically; thereafter
the oldest setting is discarded when a new CD is inserted.
The access settings for a CD-ROM drive will override the CD
settings for CDs in that drive, when an alias name is entered
for it; if no alias, the drive access settings are not used.
is the SCSI address and
where
nnnnn
is an unique five digit number.
Setup Reference for All Networks 7-7
<y>
<x>
lun
<y>
the LUN address.
Page 96
Configuration Tools and Methods
Using the HP
CD-ROM Server
Utility
Using a Web
Browser and
Server Web Page
For Windows 95 and NT 4.0 systems, you can configure the
server by using the software utility named HP CD-ROM Server
Utility. (You can download it from HP’s electronic distribution
sites. For more information, see “Electronic Support Services” on
page A-1.)
You can do configuration of the CD-ROM server by using a web
browser. To access the CD-ROM server’s web page, an IP
address must be set on the CD-ROM server (see instructions
starting on page 3-1). Also, the HTTPEnable configuration
parameter must be set to yes, which is the default setting.
The browser used in this example is Internet Explorer.
1.Start Internet Explorer (asuming an IP address is assigned
to the server).
2.From the File menu, select Open Location... The following
dialog is displayed:
3.Enter the URL of the server as http://
7-8 Setup Reference for All Networks
<IP-address>
Alternatively, use the host name associated with the IP
address and assigned to the server.
Page 97
You are prompted to
supply:
username =
password =
(factory defaults)
root
pass
4.Click OK. You should see the web page of the server, as shown
below.
5.Select one of the tabs as follows:
•
Advanced Configuration: All the server configuration
parameters listed in “Configuration Parameter Reference”
on page 7-13
•
Basic Setup: An alternative, easier dialog to make the basic
are found under this tab in several sections.
configuration changes required for features such as access
rights, password, and user authentication. All these features
are a subset of the parameters also available under
Advanced Configuration.
•
Management and Access Rights: Use buttons here for:
• Drive Rights: To edit the access rights setting for each
CD-ROM drive in the CD-ROM server.
• CD-ROM Rights: To edit the access rights settings for the
CD-ROMs inserted into the drives.
• Server Rights: To edit the access rights settings for
server configuration capabilities.
• General: Functions for management of the server.
6.When accessing the above tabs for the first time during a
session, you will be prompted to enter the username (default
is
) and password (default is
root
pass
).
7.If you need help, click the ? button to display the on-line help.
Setup Reference for All Networks 7-9
Page 98
8.To return to the settings in place before you made changes on
a particular page, click the Reset Settings button on the
bottom of the page.
9.To keep any settings you change on a page, click the Submit
settings button at the bottom of the page to download the
changes to the corresponding file on the CD-ROM server.
10. Repeat the preceding steps for all changes needed at this time.
11. Restart the server to effect the new settings:
Click the Management and Access Rights tab; click the General button. Select Restart Server from the menu at left.
Click the Restart Server button, and confirm.
The yellow Status indicator light on the front of the server
module will flash during power-on sequence and self-test.
When it stops flashing and remains off, the new settings are
ready for use.
Using a Text
Editor to Edit
Server’s Files
If you can locate the CD-ROM server on your network, you can
configure it using your favorite text editor in any operating environment. The basic procedure is to view the server’s file structure and open a configuration or access-control files. Then you
make changes and save the file. Saving the file sends your configuration changes to the server.
The server’s file structure is described in “File System
Description” on page 7-3. The file used for most configuration changes is con fig.ini in the config folder. Other
files are used for changing access features.
Follow the procedure below to access the server’s files using a
text editor. The Windows Notepad editor on a Windows 95 workstation is used in this example.
1.Click Start, click Programs, and start Windows Explorer.
2.Locate the CD-ROM server that you want to configure. Refer
to chapter 3, 4, 5, or 6 to get access to the server on the network.
7-10 Setup Reference for All Networks
Page 99
3.Locate the server’s folders and file. Open the file using your
editor. In a standard Explorer setup, double-clicking an
“.ini” or “.txt” file automatically opens the file with the
Notepad editor.
The following is an example of the config\config.ini
file.
Note❏The config.ini file illustrated above is for server firm-
ware version 4.11. As firmware is updated, configuration
files may change. (See chapter 8, “Upgrading the Firmware”.)
Setup Reference for All Networks 7-11
Page 100
The following is an example of the general format of an
access-control file. The actual files vary depending on which
access file it is (drive, CD, or server file):
Name = cd_12345;Cannot be changed
Alias = cd_12345
Comment=
DriveName=
InsertedVolume=
LockEject= no
UserLimit = 0
SessionTimeout = 0
SMBPassword = *
NetWareUser/Group = *
NFSIPAddress = *
NFSGroup = *
NFSUser = *
[END]
CAUTION!
4.Change configuration settings by editing parameters in the
file. The parameters in the config.ini file are listed with
descriptions in the next section on page 7-13.
❏When editing the file, be sure that there is a space between
the equal sign and the parameter value. All other spaces
between names of parameters or values are ignored. Do not
remove the [END] marker from the file.
5.To activate the new settings, it will be necessary to restart the
CD-ROM server. This can be done by setting the Restart
parameter in the config.ini file to yes and saving the file.
6.Save the file you edited, to send the new settings to the server.
If you have set config.ini’s Restart parameter to yes, the
server will restart. If you have not set Restart, then switch the
server’s power off, wait 10 seconds, and then switch power on.
The four indicator lights on the front of the server module
will flash during the power-on sequence and self-test. When
the yellow Status indicator stops flashing and remains off,
the new settings are ready for use.
7-12 Setup Reference for All Networks
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.