Quasarbiz and the pulse logo are registered trademarks of Quasarbiz Corporation and/or its subsidiaries
in certain countries. All other trademarks mentioned are the property of their respective owners.
The JS100 is a broadband network media storage device designed for use on a small
office/home office (SOHO) network. With a JS100 connected to the network, users can easily
and quickly access, store, backup, organize and share both files and music on a single JS 100.
Also, home users can access or transfer files on digital devices such as set-top TV boxes,
digital cameras, camcorders, digital audio players, and the like by directly connecting such
devices to the USB port on the JS100.
JS100 network media storage unit can be connected to multiple Ethernet ports, and can
accommodate either IDE/ATA disk drives or SAT A disk drives, but are set up at the factory to
support either one or the other , but not both. Check the packing list to see which type of disk
drive to use in your unit. The use of USB drives is also supported.
The front and rear panels on the JS100 network media storage unit case provide a power
status LED and an activity LED. Control and status information, as well as information about
the network properties, firmware version, configuration settings, alert settings, machine
name, security settings, file management settings, disk management settings, and disk
power management settings are available when y ou open the JS100 user interface with your
browser. The user interface is also used t o change settings and to update the JS100 network
media storage unit firmware.
As shown on Figure 1, the power status and activity LEDs are located o n the front panel.
Much more information and control are available through the web configuration interface
Power LED
There is one orange pow er LED on front panel. A c ontinuously- illuminated LED indi cates that
the JS100 network media storage unit is powering properly.
Note: T o help prevent the loss of data in the event of a failure of a disk drive, the JS100
disk storage unit uses various methods, including a technology called self-monitoring
analysis and reporting technology (SMART), to monitor the condition of disk drives and
to detect a pending failure.
Drive Activity LED
The drive activity green LED for the disk drive is illuminated whenever reading or writing
activity occurs.
Power Button
The power button uses the software to shut down the JS100 network media storage unit and
turn off the power.
The primary power switch, the AC connector, two USB ports, an RJ-45 network port, a reset
button, and a serial development connector are on the rear panel of the JS100 network
media storage unit.
Rear Panel of the JS100
RJ-45 Network Port
The RJ-45 network port is a standard network (Ethernet) port. The network port is used to
connect the JS100 network media storage unit to the network using a Category 5 network
cable. The network cable is not included.
USB Ports
The USB ports can be used to connect to USB drives, which is a flexible way to quickly or
temporarily add disks (such as temporarily tore data while updating one of the internal IDE
disk drives)
Connecting a USB printer to one of the USB ports enables the JS100 network media storage
unit to act as a print server. The JS100 network media storage unit accepts print requests
from PCs on the network and saves the files to be printed on the JS100 disks until the printer
has completed the process.
USB cables are not included.
AC Connector
The AC connector is an industry-standard 120V connector. The supplied power cord or a
compatible cord can be used to connect to a wall outlet or to an uninterruptible power supply
(UPS).
1 Select an appropriate network cable, connect one end of the cable to the RJ-45 connector on the
JS100 network media storage unit, and connect the other end of th e cable to an RJ-45 network port
on the network.
2 Turn on the power to the JS100 network media storage unit.
3 On any Windows® machine on the same network, open Network Neighborhood.
4 Type 192.168.1.1 in the address box, and then press ENTER.
5 Do uble-click the Config folder.
6 Double-click the Configuration.html file.
7 Click the Please click here to begin your JS100 configuration link on the Welcome page.
If the JS100 network media storage unit has not been configured before (or if the
user has clicked Rest ore Defaults (see “ Administration - Basic”), the Initial Setup
page opens. Otherwise, the default configuration page (Administration - Basic)
opens.
If HTTP access is enabled (see “Share Management – Basic”), the We lcome page
also has a Please click here to browse shares in JS100 network media link.
This link opens the Browse Shares page, which allows the user to access their
files using a web browser (see Section <Remote Access>)
Both the Administration - Basic page and the Browse Shares page are password
protected. They are also protected (optional) by physical authentication. The
User name box is left blank, and the default password is nasoc.
8 Leave the User name box blank, type nasoc in the Password box, and then click OK.
Note: If you have enabled physical authentication, make sure that you press the
security button on the JS100 unit.
NAVIGATING TO OTHER SITE PAGES
The Site Map page provides links to other JS100 configuration pages.
ASSIGNING A NAME TO THE JS100 NETWORK MEDIA STORAGE UNIT
The first step in the Initial Setup process is t o set the Machine Name for the J S100 network media
storage unit. Any name can be used for the machine name. When there are multiple JS100 network
media storage units on the network, each unit must have a unique name. Type the machine name
the Machine Name box, and then click Next.
MACHINE NAME SETUP PAGE PIC
MAKING SECURITY SETTINGS
On the Administration Security Setup page, you can set up your JS100 unit to have the following
types of security:
No security
Password-based security
Physical security
Both password-based security and physical security
Password-based security consists of an administration user name and an administration password.
If you set password-based security, each time you access the JS100 unit, you must type the user name and password. The default user name is left blank, and the default password is nasoc.
Physical security consists of settin g a requir ement that the securi ty butto n on th e front of the uni t
has to be pressed each time someone wants to access any of the disk drives in the unit. This
requirement prevents purely network-based attacks. After the security b u tton i s presse d , t he user
has two minutes to connect to the JS100 unit. After the connection is made, the browser interface is
bound to the machine that is connected to it and all other access requests are denied. To release the
connected machine and to allow another machine to connect, the button must be pressed again. If
the JS100 unit is rebooted, the security button must be pressed to allow users to connect.
The security button and password-based security mechanisms are complementary. For maximum
security, both should be used. If maximum security is not need ed, either one or the other of the
security mechanisms may be used on its own. It is not recommended that both security mechanisms
be disabled except on a private network with no connection to the Internet or anyplace else where
potential security threats ma y exist.
After you make the preferred security settings, click Next.
On the Error Handling Alerts page, you can specify how you want to be notified in the event of an
operational problem or error. The two options are:
e-mail notification, or
pop-up window.
Note: If you do not want to make notification settings now, you can do so later.
To specify being notified by e-mail
1 Select the E-mail Notification Enabled check box.
2 In the Error Handling SMTP Server box, type the host name of the SMTP server to be used.
Notes:
For the host name, use the name listed in your e-mail account.
The default SMTP port number is 25; to override this setting, select the SMTP Port Override
check box and type the new SMTP port number in the Error Handling SMTP Port Number
box.
If you want others to receive the e-mail notice, type the e-mail address of each recipient in
the individual Error Handling E-mail Recipients boxes.
Click Send Test E-mail to verify that the settings for e-mail notification are correct.
To specify being notified by pop-up windows
1 Select the Pop-Up Notification Enabled check box.
2 In the Error Handling Pop-Up Machines box, type the name(s) of the computer(s) on which the
pop-up windows are be displayed.
Note: Type the computer name shown on the Computer Name tab of System Properties for
each computer.
3 Click Send Test Pop-up to verify that the settings for enabling pop-up notification are correct.
Note: Computers designated to receive pop-up notification must have Messenger service
enabled and started.
On the networking pages, you can view the properties of either wired LAN networks, or wireless LAN
networks, depending on the type of network connections available to the JS100 unit.
Wired LAN
The LAN page shows various LAN properties, some of which are read-only, such as the status of the
connection (the status should read Connected if the JS100 unit is physically connected to the
network and the network is functioning properly) and the Ethernet MAC address. All of this
information can be useful in debugging network problems.
LAN PAGE PIC
Most of the rest of the information depends on the setting of the LAN Protocol property. Three
options are available:
DHCP Client (default)
DHCP Server
Static
If you set the LAN Protocol property to DHCP Client, the network settings of the JS100 unit are
configured as a DHCP server. The JS100 unit sends a request using the DHCP protocol and receives
an IP address, subnet mask, and other settings from a server on the network. Most home gateways
and enterprise networks use the DHCP protocol. Therefore, if your JS100 unit is connected to a
home gateway or router or an enterprise network, use the DHCP Client option. When the DHCP
Client option is used, most of the other properties shown cannot be changed by the user.
If the JS100 unit is connected to a small, isolated home network, a DHCP server is unlikely to be
available. If a DHCP server is not available, set the LAN Protocol property to DHCP Server, making
the JS100 unit to be the DHCP server. If the JS100 unit is acting as a DHCP server, you must type
the start and end range of available DHCP addresses a nd the lease time in seconds in the LAN
DHCP Starting IP Address box, the LAN DHCP Ending IP Address box, and the LAN Lease
Time box, respectively.
Computers that are connected to the same private network are automatically assigned IP
addresses and other property settings by the JS100 unit, which makes it possible for such
computers to automatically communicate with the JS100 uni t. Do not set the JS100 to be a DHCP
server if there is another DHCP server on the network. Rather, use the Static option, which allows
you to manually set the IP address, subnet mask, and other properties. The computers connecting
to the JS100 unit must have the same s ettings. Only users with network administrat ion experience
should configure the network properties in this way because of the complex ity. U nusual network
setups, however, may benefit from using the Static option because it provides the most flexibility.
The initial setup is now complete. To begin configuring your JS100 unit, click Continue.
SETUP COMPLETE PAGE PIC
The configuration user interface has six main pages for configuring the JS100 unit:
Notes: To view the pages associated with each main page, move your cursor over page names
across the top of the user interface. To go to a particular page, click the page name.
If you are satisfied with the configuration settings you have made on each configuration page, click
Apply before going to another configuration page. If not, click Cancel.
Administration. Administration pages include the following (see Administration for details):
z Administration - Basic
z Firmware Administration
z Error/Alerts Logging
z Windows Setup
z User Management - Basic
Share Management. Share Management pages include the following (see “Share
Management” for details):
z Share Management - Basic
z Create New Share
z Share Access
Disk Management. Disk Management pages include the following (see “Disk Management”
for details):
z Disk Management – Ba sic
z Legacy Disk Management – Basic
z Create New Disk Pool
z Resize Disk Pool
z Add Mirrors/Spares
z Remove Mirrors/Spares
z Default Disk Behavior
z Disk Power Management
Networking. (see “Viewing and Modifying Network Settings” and “Viewing and Modifying
Network Settings”).
Printers. (see “Selecting a Printer”)
Site Map. The Site Map page provides links to all the JS100 configuration pages (see
On the Administration - Basic page, you can view and modify the following basic JS100
administration settings:
JS100 machine name (see “Assigning a Name to the JS100 Disk Storage Unit” on)
Language
Administration user name
Administration password
Security button enabled/disabled.
JS100 time
Browser time
Time zone region
Time zone country
Time zone city
NTP servers
The JS100 unit software keeps track of the date and time and uses this information to timestamps
files as well as for administrative purposes, such as error and connection logging. The JS100 unit
clock runs in real time and has a battery to keep the clock running even when the power to the JS100
unit is turned off.
The current date and time as recorded by both the JS100 unit and the PC that is connected to the unit
is displayed. To manually set the JS100 time, click Set Time Manually. To set the JS100 time to
match that of the PC that is connected to the JS100 unit, click Set JS100 Time to Match.
The JS100 unit is also capable of synchronizing the date and time settings on the network. JS100
units that are on networks connected to the Internet should usually be set up to do this. This kind of
network time synchronization is done through an international standard called Network Time
Protocol (NTP).
There is space opposite NTP Servers to type the IP addresses of three machines for the J S100 unit
to use for determining the current date and time. The default IP addresses are 192.5.41.40,
192.5.41.41, and 133.100.9.2. The first two of these IP addresses are servers run by the United
States Naval Observatory as a public service to provide the precise time over the Internet. The third
is a similar time server in Japan. These are generally good choices for time servers.
Use the spaces opposite the Time Zone Region, Time Zone Country , and Time Zone City to
make local time zone settings.
To perform a software reboot of the JS100 unit system, click Reboot.
To restore the JS100 unit system to the factory settings, click Restore Defaults.
Firmware Administration
On the Firmware Administration page, you can view the current JS100 unit firmware version and
update the firmware to a newer version, if available. Alw ays note the version information when
contacting technical support.
To update the firmware
1 Download the new version of the firmware to a PC that is connected to the JS100 unit.
2 Click Browse.
3 Click the name of the downloaded file, and then click Open.
4 Click Update.
Caution! The update process takes several minutes. Do not turn off the JS100 unit while the
update is in progress! Doing so could corrupt the JS100 software, making it impossible for
the JS100 unit to boot or to update the firmware in the future. If you do accidentally t urn off
the JS100 unit while the update is in progress, contact technical support for help.
PBSA is a simple model that allow s only users hav ing the correct pa ssword to gain a ccess to an
individual share.
UBSA access is more flexible. An administrator c an grant perm issions to shares t o each indivi dual
user. An individual user can be assigned either no access, full access, or read access on a
share-by-share basis. If you select USBA, you must also designate a pool. The JS100 unit uses this
pool to save user information. If no disk pool exists, you must create one (see “Creating a New Disk
Pool”) before you select UBSA.
To configure a JS100 unit as a member of workgroup
1 Select the Workgroup Member Mode checkbox.
2 Type the workgroup name in the Workgroup Name box.
3 Select either the Password Based Share Access check box or the User Based Share Access
check box. If you select the User Based Share Access check box, in the Pool Name list, click the
pool where user accounts are stored.
WINDOWS SETUP PAGE PIC
Domain Member Mode
A domain is a workgroup with the added feature of single sign-on. With single sign-on, a user has
one account that is shared across multiple computers. Also, the u ser can access resources on
another computer without having to reauthenticate.
Computers in a domain are controlled from a central location (domain controller) and users must
obtain central authentication before joining the domain. If your network uses a domain, you may
prefer to configure the JS100 unit t o connect to the network as a domain membe r. When the JS100
unit is configured in this way, the JS100 unit software sends a request to the PD C to authenti cate
For JS100 units that are also configured to support Network File System (NFS), the JS100 unit
assigns UNIX
File System (CIFS). User IDs are in the range 35000–40000; group IDs are in the range
42000–43000.
®
user IDs (UID) and group IDs (GID) to files created through the Common Internet
Primary Domain Controller Mode
A domain controller must exist on a network before you can create a domain. The domain controller
is the repository of user information.
Note: Each domain may have only one PDC. If a PDC already exists in a given domain, do not
configure the JS100 unit as a PDC
Different versions of Windows have different levels of support for domain membership. Windows
NT, Windows 2000, and Windows XP Professional fully support domain membership. Users of these
versions of Windows can use a JS100 unit to maintain user accounts and to use the additional
security features of domains. Windows 98 and Windows Me provide limited domain membership
support. Users of computers running on one of these Windows operating systems can have their
account information served by a JS100 unit, but they cannot use the additional security features of
domains. Users of Windows XP Home Edition cannot use PDC support in any way.
To configure the JS100 unit as a primary domain controller
1 Select the Primary Domain Controller Mode check box.
2 Type the doma in na me in the Doma in Na me box . Users wa nting to j oin th e doma in mus t includ e
the domain name in the logon information.
3 Type the administrator user name in the Admin User Name box. The administrator account is used
to add, delete, and modify user and machine accounts in the domain.
Tip: The administrator account is separate from the one used to access the JS100 user
interface.
4 Type the administrator password in the Admin Password box and again in the Confir m Password
box. The administrator password is the password for the administrator account.
5 Click a pool in the Profiles and Scripts Pool list.
Notes:
When operating as a PDC, a JS100 unit stores some dat a about each user on the dis k.
The JS100 software create two shares within the pool given here: profiles and netlogon.
Domain users do not need to be aware of these shares, but the administrator does to
ensure that there is enough disk space.
The netlogon share contains the logon script described in Step 6.
For some versions of Windows, the operating system stores the user environment
(window layout and menu items) in the profiles share.
6 Click a drive letter in the Logon Drive box.
Notes: When a user logs on to the domain, the user home directory is assigned this drive
letter . This is essentially an implicit net use command. For the logon drive to work for a given
user, that user must have a home directory (see “Creating a User Account”). If no home
directory exists, the drive specified here is not mounted for that user.
7 Type the name of the logon script in the Logon Script box.
Note: The logon script is the name of an MS-DOS batch script that runs on the local machine
when a user logs on to the domain. Because this same script is run for every user in the
domain, it is a convenient place to set up a common environment for all users. For example,
the logon script could be used to synchronize machine time (see the Microsoft net time
command) or to map a common shared drive to a drive letter (see the Microsoft net use
command). See also “Creating a Logon Script”. For more information about using JS100 as
a PDC, see “Using a JS100 Unit as a Primary Domain Controller”.
WINDOWS SETUP PAGE PIC
User Management - Basic
The User Management - Basic page allows an administrator to manage user accounts when UBSA
mode is enabled, and the JS100 unit is set up to operate in Workgroup Member mode.
The Share Management - Basic page lists all the shares on the JS100 unit and the access
permissions for each share.
Global Access Info. Lists the permissions for each file access protocol.
Shares. Lists the pools shares, which are grouped by pool.
Legacy Disk Shares. Lists foreign shares (if any exist).
The CIFS and NFS protocols are read-only, unless write p ermiss ion is granted . Sim ilarly, th e FT P
and HTTP protocols are read-only, unless create and/or delete permission is granted.
The create permission allows users to crea te new files but not alter existing files. The delete
permission allows users to modify and delete existing files. If a share has delete permission but not
create permission, users can modify or delete files, but cannot add them.
The Create New Share page allows you to create a new share in an existing pool.
In Workgroup Member mode with PBSA, the Enable Share Authentication security feature should
be enabled. When enabled, this feature provides share-level security through password protection
of Windows shares.
In Workgroup Member mode with UBSA, users are listed under share permissions. This feature
provides control access to the newly-created share on a user-by-user basis. If more-advanced
security features are required, configure the JS100 unit as a domain controller (See “Primary
Domain Controller Mode”).
To create a new share in Workgroup Member mode with PBSA
1 Type the name of the new share in the New Share Name box.
2 In the Create in Pool list, click the pool where the new share is to be located.
3 Select the Enable Share Authentication check box to password protect the share. Otherwise,
the share can be accessed by anyone that is able to connect to th e unit.
4 Type the password in the Share Password box and again in the Confirm Password box.
5 Click Create Share.
CREATE NEW SHARE PAGE PIC
To create a new share in Workgroup Member mode with UBSA
1 Type the name of the new share in the New Share Name box.
2 In the Create in Pool list, click the pool where the new share is to be located.
3 Opposite Shares Permissions, click the permission type to be granted to each user.
4 Click Create Share.
The Share Access page allows an administrator to view and modify share access. This page is
available only if the JS100 unit has been configured as a member of a workgroup. It is not available
if the JS100 unit has been configured as a member of a domain or as a domain controller (see
“Primary Domain Controller Mode”).
If PBSA has been set for the workgroup, the content of the Share Access page is different than if
UBSA has been set for the workgroup.
To change the share access settings of an existing share for a workgroup with PBSA
1 In the Share Name list, click the name of the share.
2 Click the Enable Share Authentication check box to change the setting. Selecting the check box
enables password-protected access; clearing the check box disables pa ssword-protected access ,
allowing open access.
3 Click Apply.
To change the password of a password-protected share
1 Type the new password in the New Password box and again in the Confirm Password box.
2 Click Apply.
SHARE ACCESS PAGE PIC
To change share access settings of an existing share for a workgro up with UBSA
1 In the Share Name list, click the name of the share.
2 In the Share Permissions list, click the permission type to be granted to each user.
On the Disk Management - Basic page, you can do the following:
View a graph showing the di sks that are connected to the JS100 unit (i ncluding both IDE
disks and external USB disks) and how the space on those disks is allocated
View disk pool mapping information, which includes:-The name, type, and status of the
pools-The logical size, space used, and physical size of the pools-The amount of space on
each disk that is allocated to each pool
Create a new disk pool (see “Creating a New Disk Pool”)
Rename a disk pool (see “Renaming a Disk Pool”)
View detailed information about each disk
Rename a disk (see “Renaming a Disk”)
Erase a disk (see “Erasing a Disk”)
JS100 units can be configured to automatically use new blank disks in certain ways (see “Configuring
Default Disk Behavior”).
JS100 units use the Self-Monitoring Analysis and Reporting (SMART) protocol to query detailed
information from each disk that supports SMART (most modern hard disks support SMART to some
degree or another). SMART enables the JS100 unit to alert users if disk failure is imminent, which gives
users an opportunity to back up the data on the disk and to replace the disk.
To view the disks that are available, select the Show Disk Details check box.
The Erase Disk function erases the data on a disk. When you wipe a disk, ensure that all the pools
in the target disk that span multiple disks have either been deleted or that these companion disks
are also being wiped at the same time. If this condition is not met, an error results.
To erase disks
1 Select the Show Disk Details check box, and then click Erase Disk.
2 Select the respective check boxes for the disks to be included in the wipe operation.
3 Click Quick Erase to remov e only the control information from the disk. Click Full E rase to
completely erases all the data from the disk.
Notes:
The Full Erase process is very slow; the amount of time required for a full erase
depends on the size of the disk.
For the full erase operation to proceed, you must type Yes, destroy everything on
To check and repair a legacy disk, click Check and Repair. The results are reported on the
Partition ‘LEGACY_DISK’ Check and Repair Result page. To return to the Legacy Disk Management
page, click Continue.
PARTITION “LEGACY_DISK” CHECK AND REPAIR RESULT PAGE PIC
Creating a New Disk Pool
You can set the new pool to be mirrored, striped, or both, depending on how many disks are
available. Also, you can encrypt the pool.
By default, the new disk pool is auto matically configured to maximize the size of the pool. To
manually configure the new disk pool, select the Manual Configuration check box.
When manually configuring the new disk pool, you can specify how much of the current disk is
mapped to the new pool. If you select either or both the Mirroring and Striping check boxes, you
must assign at least one disk to each of the columns by selecting the appropriate check box. Do not
assign any one disk to more than one column. To specify the amount of space to be allo cate d on
each disk, either type the amount of space (in GB) in each Space Allocation box, or use the slider.
The software adjusts the assigned amount of space to no t exce ed the ma xim um a mount allow e d
for each disk. The total for each column must be the same.
Creating a JBOD or Raw Pool
1 Type the name of the new pool in the New Pool Name check box.
2 Select the Manua l Con f iguration check box.
3 For each disk that you want to use, select the Use check box for that disk.
4 For each disk, specify the amount of space to be allocated.
5 Click Create Pool.
1 Type the name o f the new pool in the New Pool Name check box.
2 Select the Striping check box.
3 Select the Manual Configuration check box.
4 For each disk, specify the amount of space to be allocated (RAID 0 requires that the space on each
disk be the same).
5 Click Create Pool.
Creating a RAID 1 or Mirrored Pool
1 Type the name o f the new pool in the New Pool Name box.
2 Select the Mirroring check box.
3 Select the Auto Configuration check box.
4 Click Create Pool.
Creating a RAID 0+1 or Mirror of Stripes Pool
1 Type the name o f the new pool in the New Pool Name box.
2 Select the Mirroring check box.
3 Select the Striping check box.
4 Select the Auto Configuration check box.
5 Click Create Pool.
Encrypting the Pool
1 Select the Encrypt Pool check box.
2 Type the password in the Encryption Password box and again in the Confirm Password box.
3 Select the Restore Pool Password check box.
4 Click the secret question of choice in the Secret Question list, and then type the answer to the
1 On the Disk Management - Basic page, click Rename Pool.
2 In the Old Pool Name list, click the name of the pool that you want to rename.
3 Type the name o f the new pool in the New Pool Name box.
4 Click Rename Pool.
RENAME POOL PAGE PIC
Resizing a Disk Pool
1 Open the Resize Disk Pool page.
2 Click the name of the disk pool in the Pool Name list.
3 Select the Use check box next to the listed disks you want to include.
4 in the Space Allocation boxes, type the amount of allocation space (in GB), or use the slider to
specify the allocation space for each disk.
5 Click Resize Pool.
On the Default Disk Behavior page, you can specify the default action when a new disk is added to
the JS100 unit.
Caution! The JS100 unit claims a disk before using it. The clai mi ng proces s m a rks the dis k
as being used by the JS100 unit and wipes any preexisting data on the disk.
To set the default disk behavior, click one of the following in the New Disk Action list.
1 Take No Action. In this case, nothing happens by default. You must manually configu r e how
space on the new disk is to be allocated.
2 Create or Expand Primary Pool Across All Disks. In this action, all new disks are claimed and
their storage space is added to the primary pool and share. After you click this action in the New
Disk Action list, you must type the name of the primary disk pool in the Primary Disk Pool Name
box and type the name of the primary share in the Primary Share Name box.
3 Create or Mirror Primary Pool. This action specifies that a primary pool be created when the first
disk is added. When the second disk is added, a mirror is created for the primary pool and share.
After you click this action, you must type the name of the base disk pool in the Base Disk Pool
Name box and type the name of the base share in the Base Share Name box.
4 Create one pool pe r di s k. In this action, a new base pool and base share are created. After you
click this action, you must type the name of the base disk pool in the Base Disk Pool Name box
and type the name of the base share in the Base Share Name box. The names of the pool and
share for each disk are created by appending a number to these names. For example, if you type
MyPool and MyShare, the JS100 unit uses MyPool1 and MyShare1 for the first disk, MyPool2 and
MyShare2 for the second disk, and so on.
DEFAULT DISK BEHAVIOR PAGE PIC
Setting Disk Power Management Options
On the Disk Power Management page, you can modify the spin down times of the avail able d isk s
when they are idle. The times specified can be given in 5-second intervals up to a maximum of 21
Note: Some disk drive manufacturers may automatically set a spin down time minimum in
those cases, the actual spin down time may exceed tim e you specify.
This section describes the tabs in the “Media Management”, which includes
1. iTune Jukebox: share your JS100 collection with family and friends by using iTunes,
2. Airport Express Jukebox: streams music from JS100 to Apple’s Airport Express,
3. Internet Radio Jukebox: records Internet radios,
4. Broadcast Jukebox: broadcasts music in network,
5. UPnP Media Server: selects your favorite music, photo and video on demand.
iTunes Jukebox
As long as you enable the “iTunes Jukebox”, your iTunes or Roku SoundBridge can
automatically discover JS100, search all songs and Apple music videos, and play music on
demand. You can also assign a specific share directory shared with your family and friends.
To download iTunes software, please visit http://www.apple.com.
Auto Start iTunes Jukebox: To enable this tab, iT une Jukebox will be automatically lauched as
long as JS100 is powered on.
iTunes Jukebox Name: You can modify the Jukebox Name showed on iTune computers.
iTunes Jukebox Port Number: We recommends users to keep the default port number
iTunes Jukebox Share D irectory: Users can select a given folder to be shared by iTune
computers.
You are easy to discover Apple Airport Express devices in the network, and to stream music
from different share folders to those ones.
Click “Airport Express Jukebox” on “Media Management” tab to refresh and to discover
Airport Express Devices in the same network subne t
Select a shared folder for every Airport Express device
Start or Stop to stream music from the selected folders to Airport Express Devices
Click on “Apply” to save all settings
Because Airport Express uses Apple lossless encoder to play m4a format only, users may put
your collection of music to iTune Library, and convert those files i n Apple lossless. After
conversion, you can transfer those new files to JS100.
Click the “edit” tab on iTune, and select “preference” to open a window
Client “Importing” on the “Advanced” tab, and select “Apple Lossless Encoder” on
“importing Using”.
Make a right click on the songs you want to convert, and select “ convert selection to
Users are easy to configure Airport Express by simply using “Airport Utility Admin”. Please
follow the below instructions to deploy Airport Express to work with JS100.
Launch “Airport Admin Utility” and click “Configure”
Note: the default setting of Airport Express enables DHCP server and Wireless Base
Station, your computer is supported to access its wireless network and to share a same
subnet mask, or to obtain an IP address from Aitport Express.
Click the “Airport” tab, and name Airport Express same to the one you enter in the
JS100
Select “Join an Existing Wireless Network” in the field of “Airport Network”, and enter a
wireless “Network Name” (SSID) that you want to join
JS100 can broadcast music from a selected share folder Your family and friends are easy to
stay tuned at JS-100 by using PC media players such as Winamp, Windows Media Player,
iTunes and Yahoo Music Engine.
Listen to JS100 with Winamp, Windows Media Player or Yahoo Music
Engine
Click on “File” and select “Play URL” or “Open URL”, and enter JS100’s IP address and port
number as the following formats.
http://192.168.1.100:8000 or http://JS100:8000
Listen to JS100 by using iTunes
Click on the” Advanced” tab and select “Open Stream”,
You can rip MP3 files from Internet radios. There are p lenty of Internet Radios on iTunes,
Winamp and Windows Media Player. You must get the latest information because Internet
Radios used to change port numbers and path.
Enter the IP address, port number and path of Internet radio stream that you want to rip.
Get the information of Internet Radios from iTunes
Launch iTunes and go to Radios
Select an Internet radio station, and move it to iTunes Library
Right-click on the Internet radio on iTunes Library, and select “Get Info” to open a
window
Click on “Edit URL” to get the link to Internet Radio
Enter the link on JS100
Get the information of Internet Radios from Winamp
Launch Winamp and go to “Online Media”
Select an Internet radio station
Right-click the radio on “Playlist Editor”, and select “view file info” to get the link
As long as you enable the “UPnP Media Server”, you are easy to play your favorite music,
photo and video on digital media players compatible to UPnP AV protocols.
Section 3: Using JS100 as a Primary Domain
Controller
After the JS100 unit is configured as a primary domain controller (PDC), you must add each computer to
the domain. Open the Windows Help and Support Center for instructions on adding a computer to a
domain.
CREATING A USER ACCOUNT
1 Log off of Windows and then log back on.
2 Type the PDC administrator user name and password and in the appropriate boxes.
3 Click the new domain name in the Log on to box, and then click OK.
4 Open a command prompt window.
Type net user /add /domain <user name> <password>
where
<user name> is the user name you want to use, and
<password> is the password you want to use.
5 Press ENTER.
CREATING A HOME DIRECTORY
Each user can create a home directory, which is a disk share that is dedicated to that particular user.
Having a home directory enables the logon drive feature (see “Windows Setup” on page 34) and
the home option on the Microsoft net user command. The logon drive is mapped only for those
users that have created a home directory.
To create a home directory
Create a share (see “Create New Share”), and assign the user name as the share name. The share
must reside on the PDC, but it can be in any of the PDC pools.
CREATING A GROUP ACCOUNT
In Microsoft Windows, file access permissions may be given to individual users or to groups of u sers.
A group can have any number of users, and users can be in any number of groups. When there are
many users, the use of groups can simplify the administration of file permissions. For example,
whatever file permissions are granted to the group also apply to the members of the group. As
group membership changes, the administrator has only to update the group account to
accommodate new members and deny access to those who have lef t the group.
Domain members rely on the domain controller to provide group membership information. When a
JS100 unit is acting as a PDC, it maintains the group membership i nformati on. Groups and group
membership may be managed using the Microsoft net group command. To use the net group
command, log on to Windows as the domain administrator and open a command prompt window.
Examples 1 and 2 create new groups called nurses and doctors. Examples 3, 4, and 5 add individual
nurses to these groups. Examples 6 and 7 delete individual users from the groups.
The JS100 unit automatically assigns all users to a group named users. It is not necessary t o add
users to the users group, and users cannot be deleted from the users group. The net group
command cannot be used to query the members of the users group, but the net users query
returns the same information.
Note: All files on JS100 have permissions for the user who owns the file, a default primary
group, and Everyone. Separate permissions can be added for individual users using
Windows access control list (ACLs). The default primary group is always users and cannot be
changed. For the current release, there is no reason to create a group accoun t.
For JS100 devices that are also configured to support NFS, JS100 assigns UNIX user IDs
(UIDs) and group IDs (GIDs) to files created through CIFS. User IDs are in the range
35000–40000; group IDs are in the range 42000–43000. Moreover, setting up permiss ions
on a Windows platform and copying the file to a JS100 unit disables your permissions.
MANAGING THE DOMAIN
Use the Microsoft net user command to ad d, delete, and modify user accounts. Use the Microsoft
net group command to add, delete, and modify group accounts as well as to add and delete users
memberships to groups.
CREATING A LOGON SCRIPT
A JS100 unit passes the name of the current user to the logon script when the script is run. This
allows the script to run differently for different users. Use the “%1” replaceable parameter to
access the user name.
After you have access to the netlogon share, you must create the logon script. It must reside within
the netlogon share that the JS100 unit automatically creates in the pool given in “Profiles and
Scripts Pool” . Y ou can include directory names within the script name, but the path must be relative
(the path cannot start with a drive letter or a slash). For example, if you type netlogon.bat, when
you have access to the netlogon share, you must create a file named netlogon.bat. Or if you type
scripts/netlogon.bat, you must create both a directory named scripts as well as the netlogon.bat
AP access point A stand-alone wireless hub that allows any computer that
has a wireless network adapter to communicate with another computer
and to connect to the Internet.
ATA advanced technology attachment A disk drive implementation that
integrates the controller on the disk drive itself. Also known as IDE Parallel
ATA.
authentication The process for verifying that an entity or object is who or what it claims to
be. Examples include confirming the source and integrity of informatio n,
such as verifying a digital signature or verifying the identity of a user or
computer.
B
base pool base share The pool that is created when a new disk is added using the Create One
Pool Per Disk option. The share that is created when a new disk is added
using the Create One Pool Per Disk option.
C
CIFS Common Internet File System
computer administrator A user who manages a computer. The computer administrator makes
system-wide changes to the computer, including installing programs and
accessing all files on the computer, and can create, change and delete the
accounts of other users.
D
DHCP Dynamic Host Configuration Protocol A mechanism for allocating IP
addresses dynamically so that addresses can be reused when hosts no
longer need them.
domain A workgroup with the added feature of single sign-on. With single sign-on,
a user has one account that is shared across multiple computers. Also, the
user can access resources on another computer without having to
reauthenticate. Computers in a domain are controlled from a central
location (domain controller) and users must obtain central authentication
before joining the domain.
F
FAT file allocation table
foreign share A legacy disk share.
fragmentation threshold The threshold at which the data packet is broken into multiple frames. This
determines the packet size and affects the throughput of the transmission.
FTP File Transfer Protocol
H
HTTP Hypertext Transfer Protocol
I
IDE integrated device electronics A data-transfer interface in which the
control electronics for the disk drive are physically located on the drive
itself rather than on an expansion board or drive adapter. Synonym:
IEEE 802.11i IEEE 802.11i (also known as WPA2™) is an amendment to the IEEE 802.11
standard specifying security mechanisms for wireless networks. The draft
standard was ratified on 24 June 2004, and supersedes the previous
security specification, Wired Equivalent Privacy (WEP), which was shown
to have severe security weaknesses.
IEEE 802.1X - 2001 The IEEE standard for Port Based Network Access Control. The IEEE
802.1X standard enforces authentication of a network node before it can
begin to exchange data with the network.
IP address The address of a computer that is attached to a network. Part of the
address designates which network the computer is on, and the other part
represents the host identification.
J
JBOD just a bunc h of disks
L
LAN local area network A high-speed, low-error data network covering a
relatively small geographic area.
legacy disk A disk that uses the FAT file system.
M
mirror A mirrored volume is a fault-tolerant volume that duplicates data on two
physical disks. A mirrored volume provides data redundancy by using two
identical volumes, which are ca lled mirrors, to duplicate the information
contained on the volume. A mirror is always located on a different disk. If
one of the physical disks fails, the data on the failed disk becomes
unavailable, but the system continues to operate in the mirror on the
remaining disk. You can create mirrored volumes only on dynamic disks.
N
net time The net service command that synchronizes the computer clock with that
of another computer or domain. Used without parameters, net time
displays the time for another computer or domain.
net use The net service command that connects a computer to or disconnects a
computer from a shared resource, or displays information about computer
connections. The command also controls persistent net connections. Used
without parameters, net use retrieves a list of network connections.
net user The net service command that adds or modifies user accounts or displays
user account information.
NFS Network File System
P
PBSA password-based share access
PDC primary domain controller
pool A specified amount of disk space that contains one or more shares.
pool share A share created on a nonlegacy disk.
primary pool The single pool to which new disk space is added or mirrored when a new
disk is added.
primary share The single share in the primary pool.
R
RADIUS Remote Access Dial-In User Service RADIUS is a client/server protocol and
software that enables remote access servers to communicate with a
central server to authenticate dial-in users and authorize their acce ss to
the requested system or service.
RAID redundant array of independent disks A method used to standardize and
categorize fault-tolerant disk systems. RAID levels provide various mixes
of performance, reliability, and cost.
RAID 0 A RAID level that provides striping.
RAID 1 A RAID level that provides mirroring.
root The highest or uppermost level in a hierarchically organized set of
information. The root is the point from which further subsets are branched
in a logical sequence that moves from a broad or general focus to narrower
perspectives.
router A computer networking device that forwards data packets toward their
destinations through a process know as routing.
RTS threshold The number of frames in the data packet at or above which an RTS/CTS
(request to send/clear to send) handsh ake is tu rned on be fore t he pac ket
is sent. The default value is 2347.
S
SATA serial advanced technology attachment. An evolution of the parallel ATA
physical storage interface. SATA is a serial link—a single cable with a
minimum of 4 wires—that creates a point-to-point connection betwee n
devices.
share A directory that can be mounted on one or more computers and filled with
as many subdirectories and files as desired, up to the limit of the space in
the disk pool in which the share exists.
single sign-on A process that allows a user with a domain account to log on to a network
once using a password or smart card and to gain access to any computer in
the domain.
SMART Self-Monitoring Analysis and Reporting
striping A technique for spreading data over multiple stored disks, which speeds up
the retrieval of the data stored on the disks.
U
UBSA User-based share access
UPS Uninterruptible power supply
USB Universal serial bus A bus used to connect devices to a host (a computer in
which a host controller is installed).
W
WAN wide area network In contrast to a LAN, a WAN is a data network that
covers a wider geographic area and usually operates at a lower speed. In
the home environment, the WAN is usually the internet.
WEP Wired Equivalent Privacy A form of data encryption.
wipe The process of removing data from a disk.