Ok, I did it. A lot of googling finaly paid off. I'll post a little howto just so others can do it if they need and also so I can in the future if I forget.
I found a link
here to a script that will extract the individual jffs2 filesystems from the NAND image. I also attached the script exactly as I used it on my c3100 NAND backup to this post. Just take off the .txt extension and make it executable.
Here is what I did to get my usr partition from NAND mounted. (usr is the one that had all my stored files)
I stuck the nand-ripper.sh script, modified the parameters in the script to match what is hopefully the correct info, and my nand backup (SYSTC310.DBK) in the same folder and extracted the usr partition with this command:
./nand-ripper.sh nand_usr user SYSTC310.DBK
I now have nand_usr which is the partition I wanted access to.
Then I had to do some digging around to find out how to even mount or extract this type of image. Most helpful was a post
here and
here.
if your kernel has them as modules, make sure to modprobe loop and block2mtd
Create the mtd device as I don't really have a NAND on my desktop machine:
mknod /dev/mtdblock0 b 31 0
Set up a loop device straight to my extracted partition file:
losetup /dev/loop0 nand_usr
Tell the block2mtd driver what you want it to convert to a fake MTD device.
echo "/dev/loop0" > /sys/module/block2mtd/parameters/block2mtd
Then, finally mount the device:
mkdir /mnt/zaurus_usr
mount -t jffs2 /dev/mtdblock0 /mnt/zaurus_usr