Lexmark Markvision Enterprise User Guide

Markvision Enterprise
User's Guide
April 2012 www.lexmark.com
Edition notice
April 2012
The following paragraph does not apply to any country where such provisions are inconsistent with local law: LEXMARK INTERNATIONAL, INC., PROVIDES THIS PUBLICATION “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions; therefore, this statement may not apply to you.
This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in later editions. Improvements or changes in the products or the programs described may be made at any time.
References in this publication to products, programs, or services do not imply that the manufacturer intends to make these available in all countries in which it operates. Any reference to a product, program, or service is not intended to state or imply that only that product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any existing intellectual property right may be used instead. Evaluation and verification of operation in conjunction with other products, programs, or services, except those expressly designated by the manufacturer, are the user’s responsibility.
For Lexmark technical support, visit support.lexmark.com. For information on supplies and downloads, visit www.lexmark.com. If you don't have access to the Internet, you can contact Lexmark by mail: Lexmark International, Inc.
Bldg 004-2/CSC 740 New Circle Road NW Lexington, KY 40550 USA
© 2012 Lexmark International, Inc. All rights reserved.
Trademarks
Lexmark, Lexmark with diamond design, and MarkVision are trademarks of Lexmark International, Inc., registered in the United States and/or other countries.
All other trademarks are the property of their respective owners.
GOVERNMENT END USERS
The Software Program and any related documentation are "Commercial Items," as that term is defined in 48 C.F.R. 2.101, "Computer Software" and "Commercial Computer Software Documentation," as such terms are used in 48 C.F.R. 12.212 or 48 C.F.R. 227.7202, as applicable. Consistent with 48 C.F.R. 12.212 or 48 C.F.R. 227.7202-1 through 227.7207-4, as applicable, the Commercial Computer Software and Commercial Software Documentation are licensed to the U.S. Government end users (a) only as Commerical Items and (b) with only those rights as are granted to all other end users pursuant to the terms and conditions herein.
Licensing notices
All licensing notices associated with this product can be viewed from the root directory of the installation software CD.
Contents 3

Contents

Edition notice...............................................................................................2
Overview.....................................................................................................7
What is Markvision Enterprise?................................................................................................................7
Getting started.............................................................................................8
Support statements...................................................................................................................................8
System requirements.......................................................................................................................................... 8
Supported database servers ............................................................................................................................... 8
Installing Markvision.................................................................................................................................8
Upgrading to the latest version of Markvision..........................................................................................9
Backing up and restoring the Firebird database.......................................................................................9
Accessing Markvision..............................................................................................................................10
Migrating from MarkVision Professional to Markvision Enterprise........................................................10
Using Markvision.....................................................................................................................................12
Understanding the home screen.............................................................................................................13
Understanding ports and protocols........................................................................................................14
Managing assets.........................................................................................17
Discovering devices.................................................................................................................................17
Creating a discovery profile ..............................................................................................................................17
Editing or deleting a discovery profile ..............................................................................................................18
Importing devices from a file .................................................................................................. .......................... 19
Managing devices....................................................................................................................................20
Setting the device life cycle state ..................................................................................................................... 20
Auditing a device ..............................................................................................................................................20
Viewing device properties ................................................................................................................................ 21
Locating and organizing devices within the system.....................................23
Searching for devices within the system.................................................................................................23
Working with bookmarks......................................................................................................... ...............26
Creating bookmarks.......................................................................................................................................... 26
Accessing bookmarks........................................................................................................................................ 26
Deleting bookmarks ..........................................................................................................................................26
Using categories and keywords...............................................................................................................26
Adding, editing, or deleting categories ............................................................................................................. 27
Adding, editing, or deleting keywords .............................................................................................................. 27
Contents 4
Assigning keywords to a device ........................................................................................................................27
Removing an assigned keyword from a device................................................................................................. 28
Managing policies......................................................................................29
Creating a policy......................................................................................................................................29
Creating a new policy........................................................................................................................................29
Creating a policy from a device.........................................................................................................................29
Understanding the security policy...........................................................................................................30
Understanding secured devices........................................................................................................................ 30
Understanding settings for security policies..................................................................................................... 32
Creating a security policy.................................................................................................................................. 33
Changing the communication credentials of a restricted device ..................................................................... 38
Editing or deleting a policy......................................................................................................................39
Assigning a policy....................................................................................................................................39
Checking conformity with a policy..........................................................................................................39
Enforcing a policy....................................................................................................................................40
Removing a policy...................................................................................................................................40
Managing the Service Desk.........................................................................41
Working with policies..............................................................................................................................41
Checking device conformity with policies.........................................................................................................41
Enforcing policies ............................................................................................................. ................................. 41
Working with a device.............................................................................................................................41
Checking the status of a device ........................................................................................................................ 41
Viewing a device remotely...................................................................................................... .......................... 42
Viewing the embedded Web page ...................................................................................................................42
Managing device events.............................................................................43
Creating a destination.............................................................................................................................43
Editing or deleting a destination.............................................................................................................43
Creating an event.............................................................................................................. ......................44
Editing or deleting an event....................................................................................................................44
Assigning an event to a device................................................................................................. ...............44
Removing an event from a device...........................................................................................................45
Displaying event details...........................................................................................................................45
Performing other administrative tasks.......................................................46
Downloading generic files.......................................................................................................................46
Configuring email settings.................................................................................................................. ....46
Configuring system settings....................................................................................................................47
Contents 5
Adding, editing, or deleting a user in the system....................................................................................47
Enabling LDAP server authentication......................................................................................................48
Generating reports..................................................................................................................................53
Scheduling tasks......................................................................................................................................54
Viewing the system log...........................................................................................................................54
Frequently asked questions........................................................................56
Troubleshooting.........................................................................................57
User has forgotten the password............................................................................................................57
The application is unable to discover a network device.........................................................................57
Check the printer connections.......................................................................................................................... 57
Make sure the internal print server is properly installed and enabled ............................................................57
Make sure the device name in the application is the same as the one set in the print server ........................ 57
Make sure the print server is communicating on the network ........................................................................ 58
Device information is incorrect...............................................................................................................58
Glossary of Security Terms.........................................................................59
Index..........................................................................................................60
Contents 6
Overview 7

Overview

What is Markvision Enterprise?

MarkvisionTM Enterprise (MVE) is a Web-enabled device management utility designed for IT professionals. MVE works as a client/server application. The server discovers and communicates with devices on the network and provides information about them to the client. The client displays device information and provides a user interface to manage those devices. Each Markvision Server can manage thousands of devices at one time.
Built-in security provisions prevent unauthorized access to the application, and only authorized users can use the client to access management options.
Markvision lets you monitor and manage your entire print fleet, which is composed of printers and print servers. In Information Technology Infrastructure Library (ITIL), printers and print servers are also known as Configuration Items (CIs). Within this document, CIs, printers, or print servers are sometimes called devices.
Getting started 8

Getting started

Support statements

For a complete list of supported operating systems and Web browsers, see the Release Notes.

System requirements

RAM
Required: 1GB
Recommended: 2GB+
Processor speed
Required: 1 physical 2GHz or higher (HyperThreaded/Dual Core)
Recommended: 1+ physical 3+GHz (Hyper-Threaded/Dual Core+)
Computer hard disk drive space
At least 60GB available storage space
Screen resolution
At least 1024 x 768 pixels (for MVE clients only)

Supported database servers

Firebird
Microsoft SQL Server 2008
Microsoft SQL Server 2005
Notes:
The application supports only the 32-bit versions, and comes with a preconfigured Firebird database.
The database server where MVE is installed must have only one network interface card (NIC).

Installing Markvision

With Markvision, you can use either Firebird or Microsoft SQL Server as the back-end database.
If you are using Microsoft SQL Server, then do the following before installing Markvision:
Enable mixed mode authentication and Auto Run.
Set the Network Libraries to use a static port and TCP/IP sockets.
Create a user account that Markvision will use to create the database schema and any database connections.
Getting started 9
Create the following databases:
FRAMEWORK
MONITOR
QUARTZ
Note: Make sure that the user account you created is either the owner of these databases or has the appropriate privileges to create a schema and perform Data Manipulation Language (DML) operations.
1 Unzip the install files into a path that does not contain any spaces.
2 Launch setup.exe, and then follow the instructions on the computer screen.

Upgrading to the latest version of Markvision

Upgrading is designed to work only from the immediately preceding version.
1 Back up your database.
Notes:
If you are using a Firebird database, then see “Backing up the Firebird database” on page 9 for more
information.
If you are using MS SQL Server, then contact your MS SQL administrator.
2 Unzip the install files into a temporary location, and make sure the path does not contain any spaces.
3 Launch setup.exe, and then follow the instructions on the computer screen.

Backing up and restoring the Firebird database

Backing up the Firebird database
Note: If you are using MS SQL Server as your database, then contact your MS SQL administrator.
1 Stop the Markvision Enterprise service.
a Click , or click Start > Settings.
b Select Control Panel, and then if necessary, click System & Security.
c Double-click Administrative Tools.
d If necessary, double-click Component Services.
e Double-click Services.
f From the Services pane, select Markvision Enterprise, and then click Stop.
2 Locate the folder where Markvision Enterprise is installed, and then navigate to firebird\data.
For example, C:\Program Files\Lexmark\Markvision Enterprise\firebird\data
3 Copy the following databases to a safe repository.
FRAMEWORK.FDB
MONITOR.FDB
QUARTZ.FDB
Getting started 10
4 Restart the Markvision Enterprise service.
a Repeat steps 1a through 1e.
b From the Services pane, select Markvision Enterprise, and then click Restart.
Restoring the Firebird database
1 Make sure you have completed the backup process for the Firebird database.
2 Stop the Markvision Enterprise service.
For more information, see step 1 of “Backing up the Firebird database” on page 9.
3 Locate the folder where Markvision Enterprise is installed, and then navigate to firebird\data.
For example, C:\Program Files\Lexmark\Markvision Enterprise\firebird\data
4 Replace the following databases with the databases you saved when you were completing the backup process.
FRAMEWORK.FDB
MONITOR.FDB
QUARTZ.FDB
5 Restart the Markvision Enterprise service.
For more information, see step 4 of “Backing up the Firebird database” on page 9.

Accessing Markvision

1 Open a Web browser, and then type http://MVE_SERVER:9788/mve/ in the URL field.
Note: Replace MVE_SERVER with the host name or IP address of the machine hosting Markvision.
2 In the User field, type admin.
3 In the Password field, type Administrator1, and then click Login.
Note: To change your password, click Change Password from the upper-right corner of the home screen.
If Markvision is idle for more than 30 minutes, then it automatically logs out. You will need to log in again to access Markvision.

Migrating from MarkVision Professional to Markvision Enterprise

Note: Markvision Enterprise (MVE) only supports migration of data from MarkVision Professional (MVP) v11.2.1.
Exporting data from MVP
Using the MVP Server Web page
1
Open a Web browser, and then type http://MVP_SERVER:9180/~MvServer in the URL field.
Note: Replace MVP_SERVER with the IP address or host name of the MVP Server.
2 From the MarkVision Server Web page, click Data Dir.
Getting started 11
3 Enter your user name and password if prompted.
4 From the Download Data Directory page, click to download your MVP data as a zip file.
5 Save the zip file.
Using the file system
1
On the system running the MVP Server, navigate to the location where the MVP Server is installed.
2 Compress the Data folder into a zip file.
Importing data into MVE
1 Log in to Markvision Enterprise.
2 In the “Import data from MarkVision Professional” dialog, click Yes, and then click Browse.
Notes:
If you click Yes, then the dialog does not appear the next time you log in to MVE.
If you click No and you do not want to see the dialog again, then select Do not show this message again.
3 Navigate to the location where your zip file is stored, and then click Open.
4 From the “Data to Import” area, select the type of data that you want to import.
Data Details
Users
Devices
In MarkVision Professional, users are given privileges for individual functions.
In Markvision Enterprise, users are assigned roles associated with different functions.
All users imported from MVP are automatically assigned to all roles except ROLE_ADMIN.
If an MVP user's password does not meet the MVE password criteria, then the string
Administrator1 is appended into the user's current password.
MVE only imports basic device information from MVP, including model name, serial number, MAC
address, and IP address.
If a printer already exists in MVE, then that printer is ignored during import.
During import, MVE disregards printers connected to External Network Adapters (ENAs), since MVE
currently does not support ENAs.
The imported devices are automatically set to the Managed (Normal) life cycle state.
MVP manages printers and print servers. MVE only manages printers. Therefore, two entries in MVP
become a single entry in MVE.
Getting started 12
Data Details
Discovery Profiles
When MVP profiles are imported into the MVE system, only the following details are imported:
SNMP Community Name
Retries
Timeout
Exclude Address
Include Address
In MVP, each Include/Exclude entry contains an SNMP Read/Write Community Name set. A profile that
contains multiple Include/Exclude entries may also contain multiple unique Read/Write Community Name sets. In MVE, the Read/Write Community Name set belongs to the profile itself. Each profile can contain only one Read/Write Community Name set. Therefore, one discovery profile in MVP (containing multiple unique Read/Write Community Name sets) is broken into multiple discovery profiles when imported into MVE (each containing one Read/Write Community Name set). The number of profiles in MVE is equal to the number of unique Read/Write Community Name sets in the original MVP profile.
For Timeout, MVE converts the MVP Timeout to milliseconds by multiplying the MVP value (in seconds)
by 1000.
The Automatically Manage option is set to False during import.
5 Click Import.

Using Markvision

The features and functions of Markvision are divided into four service areas. This provides greater ease of use by making sure the view of the interface is populated with only the features and functions needed for the task at hand. Each service area is accessible by way of a tab on the home screen and corresponds to a service life cycle stage in the Information Technology Infrastructure Library (ITIL) version 3. The ITIL disciplin e is globally recognized for its compilation of best practices for managing IT resources within an organization.
Use this tab To
Assets Locate, identify, catalog, organize, and track the physical assets (printers and multifunction devices) that
comprise your print fleet. Here, you can gather and maintain information about the fleet models, capabilities, installed options, and life cycle.
In ITIL, this fits into the Service Transition area.
If one of your responsibilities includes management of IT assets, then go to “Managing assets” on page 17.
Policies Define and manage the software configuration of the print fleet. Here, you can assign a defined policy that
specifies the particular configuration settings for each model. You can monitor whether the print fleet conforms with the policies, and enforce these policies when necessary.
In ITIL, this fits into the Service Transition area.
If one of your responsibilities includes administration and maintenance of configuration management tools, then go to “Managing policies” on page 29.
Service Desk
Directly interact with a single device in the print fleet. Here, you can remotely manage the device, check policy conformance and enforce policies, and customize configuration settings through the device embedded Web server.
In ITIL, this fits into the Service Operation area.
If one of your responsibilities includes management or administration of customer IT support service, then go to “Managing the Service Desk” on page 41.
Getting started 13
Use this tab To
Event Manager
Create an automated event when a device sends an alert to the network. You can choose to send an e-mail or perform other scripted actions to notify identified personnel.
In ITIL, this fits into the Service Operation area.
If one of your responsibilities includes problem management or incident handling, then go to “Managing device events” on page 43.

Understanding the home screen

Markvision
1
5
4
2
3
Use this area To
1 Header Access the four service area tabs and perform other administrative tasks.
2 Search Results View the full, paged list of devices matching the currently selected bookmark or
search.
3 Task Information View the status of the most recent activity.
4 Search Results Summary View a categorized summary of the currently selected bookmark or search.
5 Bookmarks and Advanced
Search
Manage and select bookmarks, and refine search queries.
Getting started 14

Understanding ports and protocols

Markvision uses different ports and protocols for the various types of network communication, as shown in the following diagram.
SQL and
Firebird
Flex/Browser Client
DBs
TCP 9788
TCP 1433, 3050
MVE SERVER
UDP 69 , 161, 5353,6000, 6100,9187, 9300 TCP 21, 80, 5000, 6 110 9100
,
Network Devices
UDP 88 TCP 389, 636
LDAP/Kerberos Server
TCP 25
Mail Server
Note: The ports are bidirectional and must be open or active for Markvision to function properly. Make sure all device ports are set to either Secure and Unsecure or Enabled, depending on the device.
Server to device communication
These are the ports and protocols used during communication from the Markvision Server to network devices.
Protocol Markvision Server Device Used for
NPAP
Network Printer Alliance Protocol
XMLNT
XML Network Transport (Object Store)
LST
Lexmark Secure Transport
mDNS
Multicast Domain Name System
SNMP
Simple Network Management Protocol
Ephemeral User Datagram Protocol (UDP) port
Ephemeral UDP and
Transmission Control Protocol
UDP 9300 Communication with Lexmark network
printers
UDP 6000
TCP 5000
Communication with Lexmark network printers
(TCP) ports
UDP 6100
Ephemeral TCP port
(handshaking)
UDP 6100
TCP 6110
(handshaking)
Encrypted communication with Lexmark network printers
Ephemeral UDP port UDP 5353 Discovery of certain Lexmark network
printers and determining the security capabilities of devices
Ephemeral UDP port UDP 161 Discovery of and communication with
Lexmark and third-party network printers
Getting started 15
Protocol Markvision Server Device Used for
FTP
File Transfer Protocol
TFTP
Trivial File Transfer Protocol
HTTP
Hypertext Transfer Protocol
Raw Print Port Ephemeral TCP port TCP 9100 Generic file downloads
Ephemeral TCP port TCP 21 Generic file downloads
Ephemeral UDP port UDP 69 Firmware updates and generic file
downloads
Ephemeral TCP port TCP 80 Generic file downloads
Device to server communication
This is the port and protocol used during communication from network devices to the Markvision Server.
Protocol Device Markvision Server Used for
NPAP UDP 9300 UDP 9187 Generating and receiving alerts
Server to database communication
These are the ports used during communication from the Markvision Server to databases.
Markvision Server Database Used for
Ephemeral TCP port TCP 1433 (SQL Server)
This is the default port and can be configured by the user.
Ephemeral TCP port TCP 3050 Communication with a Firebird database
Communication with an SQL Server database
Client to server communication
This is the port and protocol used during communication from the flex/browser client to the Markvision Server.
Protocol Flex/Browser Client Markvision Server
AMF
ActionScript Message Format
TCP port TCP 9788
Messaging and alerts
This is the port and protocol used during communication from the Markvision Server to a mail server.
Protocol Markvision Server SMTP Server Used for
SMTP
Simple Mail Transfer Protocol
Ephemeral TCP port TCP 25
This is the default port and can be configured by the user.
Providing the email functionality used to receive alerts from devices
Getting started 16
Markvision server to LDAP server communication
These are the ports and protocols used during communication involving user groups and authentication functionality.
Protocol Markvision server LDAP server Used for
LDAP
Lightweight Directory Access Protocol
LDAPS
Secure Lightweight Directory Access Protocol
Kerberos Ephemeral UDP
Ephemeral TCP port
Ephemeral TCP port
port
TCP 389, or the port to which the LDAP server has been configured to listen
Transport Layer Security (TLS), or the port to which the LDAP server has been configured to listen
This is for TLSencrypted connections.
UDP 88
This is the default Kerberos Authentication Service port.
Authentication of Markvision Enterprise users using an LDAP server
Authentication of Markvision Enterprise users using an LDAP server through a secure channel that uses TLS
Kerberos authentication
Managing assets 17

Managing assets

Discovering devices

The application lets you search the network for devices. When devices are discovered, their identification information is stored in the system. Use bookmarks or searches to display devices in the Search Results area.
Discovered devices are, by default, set to New and are not managed by the system. Before any action can be done on a device, you need to set it to Managed. For more information, see “Managing devices” on page 20.
There are two ways of adding devices to the system:
Using a discovery profile—Discover devices in the network using customized parameters.
Importing devices from a file—Use a comma
Note: You can use only one of these two ways. Performing both procedures to add devices into the system results in duplicate devices.
After adding a device into the system, perform an audit of the device immediately. Performing an audit provides additional information about the device, which is required to successfully complete some tasks. For more information about auditing a device, see “Auditing a device” on page 20.
separated value (CSV) file to import devices.
Note: Note: This applies only to unrestricted devices. For restricted devices, first assign a security policy and then enforce it on the restricted devices before performing an audit. Failure to do so results in an audit failure and sets the state of the restricted devices to (Managed) Missing. For more information about restricted devices, see “Understanding secured devices” on page 30.

Creating a discovery profile

1 If necessary, from the Assets tab, click Discovery Profiles to show the Discovery Profiles section.
2 Click , and then type the name of the new discovery profile.
3 From the Addresses tab, select Include or Exclude.
4 To import a list of items from a file to include or exclude, do the following:
a Click .
b Navigate to the folder where the file is saved.
c Select the file, and then click Open.
Note: The file can contain any of the patterns that can be entered in the text field above Address/Range. To view
examples of a valid pattern, mouse over the text field.
5 Beside , type the IP address, fully qualified DNS host name, subnets with wildcard characters, or address ranges
you want, and then click
.
Notes:
You can type only one entry at a time. To view examples of a valid entry, mouse over the text field above
Address/Range.
When typing address ranges, do not use wildcard characters.
To delete an entry, select it, and then click .
Managing assets 18
6 Click the SNMP tab, and then select Version 1,2c or Version 3.
Note: If you are not sure which version of the SNMP you are using, then contact your system support person.
7 If you selected Version 1,2c in step 6, then from the Community Names area, set the privacy profile.
If you selected Version 3, then from the Security area, set the security profile.
Note: If you are not sure how to configure your SNMP Version 3 security profile, then contact your system
support person.
8 Click the General tab, and then from the Performance area, do the following:
In the Timeout field, specify the amount of time (in milliseconds) to wait for the devices to respond.
In the Retries field, specify the number of retries before the system stops attempting to communicate with a
device.
9 Select whether to include secured devices in the discovery.
Notes:
If you do not have a secured device, then do not select this option. Doing so incurs a performance penalty,
which results to a much longer time in discovering devices.
When a device is secured, one or both of the following conditions apply: (a) communication ports are
disabled, and (b) authentication is required to obtain information from the device.
10 Select whether the discovery profile should automatically manage the discovered devices.
Note: If you select this option, then all discovered devices are automatically set to the Managed life cycle state.
11 Click Save > Close.
Notes:
Clicking executes the discovery profile and does not save it.
A new discovery profile gathers just enough information to reliably identify a device. To gather the complete
information from a device, set the device state to Managed, and then perform an audit of the device.
To make sure that the device information is current, a discovery can be scheduled to occur on a regular
basis. For more information, see “Scheduling tasks” on page 54.

Editing or deleting a discovery profile

1 If necessary, from the Assets tab, click Discovery Profiles to show the Discovery Profiles section.
2 Select a profile, and then click to edit or to delete the discovery profile.
3 Follow the instructions on the computer screen.
Managing assets 19

Importing devices from a file

Use a comma-separated values (CSV) file to import devices.
Note: In preparation for a deployment, Markvision lets you add devices into the system even before these are available on the network.
1 From the Assets tab, click Import, and then click Browse.
2 Navigate to the folder where the CSV file is stored.
Note: Make sure that each line of the CSV file represents a single device.
3 Select the CSV file, and then click Open.
4 From the Possible Columns section, select the columns to match the values in your CSV file.
5 If you are using SNMP V3 protocol to communicate with the device, then you must select the following columns:
SNMP V3 Read/Write User
SNMP V3 Read/Write Password
SNMP V3 Minimum Authentication Level
SNMP V3 Authentication Hash
SNMP V3 Privacy Algorithm
Note: In the CSV file that you selected in step 3, make sure the following parameters contain any one of the values specified below them:
Minimum Authentication Level
NO_AUTHENTICATION_NO_PRIVACY
AUTHENTICATION_NO_PRIVACY
AUTHENTICATION_PRIVACY
Authentication Hash
MD5
SHA1
Privacy Algorithm
DES
AES_128
AES_192
AES_256
Note: If your CSV file does not contain the exact values specified, then MVE cannot discover the device.
6 Click Add to move the selected columns into the CSV File Columns section.
If you want the system to ignore a column in your CSV file, then select Ignore. Do this for each column in your
CSV file that is not listed in the Possible Columns section.
To change the order of the columns you selected to match your CSV file, select a column from the CSV File
Columns section, and then use the arrows to move the headings up or down.
7 Select whether the first row in your CSV file contains a header.
8 Select whether the imported devices should be automatically set to the Managed life cycle state.
9 Click OK.
Loading...
+ 42 hidden pages