ZENworks 10 Configuration Management Discovery, Deployment, and Retirement Reference
Legal Notices
Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation, and
specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose.
Further, Novell, Inc., reserves the right to revise this publication and to make changes to its content, at any time,
without obligation to notify any person or entity of such revisions or changes.
Further, Novell, Inc., makes no representations or warranties with respect to any software, and specifically disclaims
any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc.,
reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to
notify any person or entity of such changes.
Any products or technical information provided under this Agreement may be subject to U.S. export controls and the
trade laws of other countries. You agree to comply with all export control regulations and to obtain any required
licenses or classification to export, re-export or import deliverables. You agree not to export or re-export to entities on
the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws.
You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses. See the
Novell International Trade Services Web page (http://www.novell.com/info/exports/) for more information on
exporting Novell software. Novell assumes no responsibility for your failure to obtain any necessary export
approvals.
8ZENworks 10 Configuration Management Discovery, Deployment, and Retirement Reference
About This Guide
novdocx (en) 16 April 2010
This Novell ZENworks 10 Configuration Management Discovery, Deployment, and Retirement
Reference helps you add devices to your ZENworks
ZENworks Adaptive Agent or Inventory Only Module to the devices. It also helps you install the
ZENworks Adaptive Agent to a Linux device in order to make the device a ZENworks Satellite.
The information in this guide is organized as follows:
Part I, “Device Discovery,” on page 11
Part II, “ZENworks Adaptive Agent Deployment,” on page 49
Part III, “Device Removal and Retirement,” on page 107
Part IV, “Appendixes,” on page 115
Audience
This guide is intended for anyone who will configure and manage a ZENworks system.
Feedback
We want to hear your comments and suggestions about this manual and the other documentation
included with this product. Please use the User Comments feature at the bottom of each page of the
online documentation, or go to the Novell
documentation/feedback.html) and enter your comments there.
®
Documentation Feedback site (http://www.novell.com/
®
Management Zone and then install the
Additional Documentation
ZENworks 10 Configuration Management is supported by other documentation (in both PDF and
HTML formats) that you can use to learn about and implement the product. For additional
documentation, see the ZENworks 10 Configuration Management documentation (http://
www.novell.com/documentation/zcm10/index.html).
Documentation Conventions
In Novell documentation, a greater-than symbol (>) is used to separate actions within a step and
items in a cross-reference path.
®
A trademark symbol (
trademark.
When a single pathname can be written with a backslash for some platforms or a forward slash for
other platforms, the pathname is presented with a backslash. Users of platforms that require a
forward slash, such as Linux*, should use forward slashes as required by your software.
, TM, etc.) denotes a Novell trademark. An asterisk (*) denotes a third-party
About This Guide9
novdocx (en) 16 April 2010
10ZENworks 10 Configuration Management Discovery, Deployment, and Retirement Reference
I
Device Discovery
novdocx (en) 16 April 2010
The following sections provide information and instructions to help you add devices to your
®
ZENworks
database. After a device is added to the database, a ZENworks Server can
automatically deploy the ZENworks Adaptive Agent to the device.
Chapter 1, “Basic Concepts,” on page 13
Chapter 2, “Discovering Devices By Using IP Addresses,” on page 23
Chapter 3, “Discovering Devices in LDAP Directories,” on page 35
Chapter 4, “Importing Devices from CSV Files,” on page 41
Chapter 5, “Advertised Discovery,” on page 43
Chapter 6, “Viewing or Updating Device Details,” on page 47
Device DiscoveryI11
novdocx (en) 16 April 2010
12ZENworks 10 Configuration Management Discovery, Deployment, and Retirement Reference
1
Basic Concepts
novdocx (en) 16 April 2010
1
Device discovery is the process of adding workstation and server information to the Novell®
ZENworks
Adaptive Agent from a ZENworks Server to the devices. The following sections provide
information to help you understand the discovery terminology and concepts:
Section 1.1, “Discovery Methods,” on page 13
Section 1.2, “IP and LDAP Discovery Tasks,” on page 13
Section 1.3, “IP Discovery Technologies,” on page 13
Section 1.4, “LDAP Discovery Technology,” on page 19
Section 1.5, “Advertised Devices,” on page 19
Section 1.6, “Discovered Devices,” on page 19
Section 1.7, “Deployable Devices,” on page 21
®
database so that you can use that information to automatically deploy the ZENworks
1.1 Discovery Methods
There are four discovery methods you can use:
IP discovery: Use the ZENworks discovery engine to collect information about devices on
your network. The engine uses various protocols and standards (WMI, WinAPI, MAC Address,
NMAP, ZENworks, SNMP, SSH) to discover and collect information from devices that you
identify through IP address ranges.
LDAP directory discovery: Use the ZENworks discovery engine to search Novell
eDirectory
search and the filter to use for the search.
CSV import: Import device information from a comma-separated values (CSV) file. At the
minimum, the file must contain the IP address or DNS name for each device.
Advertised discovery: Use the ZENworks discovery engine to collect information about
devices that have the ZENworks preagent installed.
TM
or Microsoft* Active Directory* for device objects. You specify the contexts to
®
1.2 IP and LDAP Discovery Tasks
IP and LDAP discoveries are performed through discovery tasks. You create a discovery task in
ZENworks Control Center. LDAP discovery requires Novell eDirectory
Directory* to search for devices.
TM
or Microsoft* Active
1.3 IP Discovery Technologies
The ZENworks discovery engine can utilize a variety of different technologies for IP-based
discoveries. When more than one technology is used, the discovery engine initiates a discovery
request for each technology. This is done for each target IP address. For example, if you use MAC
Address, SNMP, and WMI, the discovery engine creates three requests for each target IP address.
Basic Concepts
13
The requests are queued and the discovery engine processes five requests at a time until no requests
remain. Five requests is the default. You can change the default if necessary (see Section 2.1,
“Configuring Discovery Settings,” on page 23) or override the settings in the discovery task.
Using fewer discovery technologies reduces the time required to complete the discovery task but
might also reduce the amount of information received.
By default, the MAC Address, SSH, WinAPI, and ZENworks technologies are enabled; the SNMP,
WMI, and NMAP technologies are disabled. You can change the default if necessary; see
Section 2.1, “Configuring Discovery Settings,” on page 23.
If more than one technology request returns information for a discovered device, the information is
merged together. In the case of conflicting information, the discovery process chooses the “best”
information. If a high priority discovery technology is successful and returns the information, then
the other lower priority discovery technologies are aborted for better performance. For example, if
WinAPI or WMI is successful, then MAC address and NMAP technologies are aborted.
IP discovery tasks require the following information:
The range of IP addresses for the devices you want discovered.
The credentials required for the SSH, WMI, WinAPI, and SNMP discovery technologies to
retrieve information from devices. The NMAP, MAC Address, and ZENworks technologies do
not require credentials.
Not all technologies use the same credentials, and all devices might not have the same
credentials, so you might need to specify multiple credentials to cover all targeted devices and
to utilize all discovery technologies. For example, WMI and WinAPI require Windows
credentials, and SNMP requires SNMP credentials.
The schedule for running the task. You can schedule it to run immediately or at a specified date
and time. Optionally, you can choose to not set a schedule, in which case the task is not run
until you manually initiate it or schedule a time.
The ZENworks Server that you want to run the task.
novdocx (en) 16 April 2010
14ZENworks 10 Configuration Management Discovery, Deployment, and Retirement Reference
The following table provides detailed information about the IP discovery technologies:
Table 1-1 IP Discovery Technologies
novdocx (en) 16 April 2010
IP Discovery
Technology
WMI
(Windows
Management
Instrumentation)
FunctionalityRequirementsPrerequisites
WMI is the infrastructure
for management data
and operations on
Windows-based
operating systems.
Discovery issues a
remote request to the
WMI service on the
devices identified by the
IP-based discovery task
to obtain information.
Retrieves the OS type
and version, MAC
address, Network
Adapters, and CPU
details of the device.
For more information on
WMI, see the MSDN
Web site (http://
msdn.microsoft.com/enus/library/
aa384642(VS.85).aspx).
Because WMI is a
Windows-specific
technology, the
requests generated
from a ZENworks
Server running on
Linux must be routed
to a Windows Proxy
for processing. For
more information,
see Section 2.2,
“Designating a
Discovery and
Deployment Proxy
Server,” on page 26.
Microsoft Windows
Management Instrumentation
Service to be installed and
running on the target
Windows device.
Credentials of an
administrator account on the
target device should be
specified as Windows
credentials in the discovery
task. This is required for
connecting to the WMI
Service.
To authenticate by using the
Windows credentials, set the
value of the Network access:
Sharing and security model
for local accounts Local Security setting to Classic local users authenticate as
themselves. For more
information on how to
configure the Local Security
settings, see “Enabling
Classic File Sharing” on
page 83.
Since the Remote WMI
connection establishes a
RPC connection with the
target Windows device, the
TCP ports 139 and 445 must
be allowed by the Windows
Firewall of the target device
for the WMI discovery
technology. For more
information on how to open
these ports, see “Enabling
File and Printer Sharing
through Windows Firewall” on
page 82.
Basic Concepts15
novdocx (en) 16 April 2010
IP Discovery
Technology
WinAPIIssues a request to the
FunctionalityRequirementsPrerequisites
registry on the devices
identified by the IP-based
discovery task to retrieve
the OS type and version,
and CPU details.
Because WinAPI is a
Windows-specific
technology, the
requests generated
from a ZENworks
Server running on
Linux must be routed
to a Windows Proxy
for processing. For
more information,
see Section 2.2,
“Designating a
Discovery and
Deployment Proxy
Server,” on page 26.
Microsoft Remote Registry
Service to be installed and
running on the target
Windows device.
Credentials of an
administrator account with
read privileges on the
Windows registry of the target
device should be specified as
Windows credentials in the
discovery task. This is
required for connecting to the
Remote Registry Service.
The File and Printer Sharing
for Microsoft Networks option
must be enabled. For more
information, see “Enabling
File and Printer Sharing for
Microsoft Networks” on
page 81.
To authenticate by using the
Windows credentials, set the
value of the Network access:
Sharing and security model
for local accounts Local Security setting to Classic local users authenticate as
themselves. For more
information on how to
configure the Local Security
settings, see “Enabling
Classic File Sharing” on
page 83.
Since the Remote Registry
connection establishes a
RPC connection with the
target Windows device, the
TCP ports 139 and 445 must
be allowed by the Windows
Firewall of the target device.
For more information on how
to open these ports, see
“Enabling File and Printer
Sharing through Windows
Firewall” on page 82. If the
target device is in a different
subnet than the Windows
Proxy or the Primary server
running the task, then the
scope of the Firewall
exception should include
them.
16ZENworks 10 Configuration Management Discovery, Deployment, and Retirement Reference
novdocx (en) 16 April 2010
IP Discovery
Technology
MAC AddressRetrieves the MAC
NMAPUses NMAP (Network
FunctionalityRequirementsPrerequisites
Address of the
discovered device. Uses
ping
and
arp
the
(Address Resolution
Protocol) commands to
map the IP addresses of
the devices identified by
the IP-based discovery
task to their associated
MAC addresses.
The MAC Address
discovery gets only the
MAC address of the
device and does not give
any OS information.
Mapper) to retrieve the
OS type and version
details of the devices
identified by the IP-based
discovery task.
IMPORTANT: NMAP has
certain known limitations.
For more information on
these limitations, see the
NMAP Web site (http://
www.nmap.org).
For the
successful, the target devices
must reside in the same
network as the ZENworks
Server that performs the
discovery request.
For the
successful, the incoming
ICMP echo requests (ping)
must be enabled on the
device, and the ICMP echo
requests and echo responses
must be allowed on the
network.
arp
command to be
ping
command to be
NMAP must be installed on
the ZENworks Server that is
processing the discovery
request.
NMAP is freely available from
InSecure.org (http://
www.insecure.org). For more
information on how to
configure NMAP for
ZENworks, see Appendix C,
“Configuring NMAP for
ZENworks,” on page 123.
Basic Concepts17
novdocx (en) 16 April 2010
IP Discovery
Technology
ZENworksIssues a request to the
FunctionalityRequirementsPrerequisites
ZENworks Adaptive
Agent or ZENworks
preagent on the devices
identified by the IP-based
discovery task. If the
device has the ZENworks
Adaptive Agent, the
agent responds with the
OS type and version,
MAC Address, Network
Adapters, CPU,
managed device GUID,
Management Zone
GUID, Management
Zone name, Adaptive
Agent version, disk
space, and memory
details. If the device has
the ZENworks preagent
installed, the preagent
responds with the OS
type, CPU, disk space,
memory, and the GUID
details that should be
used to register the
device in the
Management Zone.
The preagent is only installed
on OEM devices or on
devices whose registration
was removed from the zone.
SNMPIssues a request to the
SNMP service on the
devices identified by the
IP-based discovery task.
SNMP versions 2 and 1
are supported, with
SNMP version 2 tried
first. Retrieves the OS
type and version, MAC
address, Network
Adapters, and CPU
details.
Because the
discovery process
uses a Windowsbased SNMP
technology, requests
generated from a
ZENworks Server
running on Linux
must be routed to a
Windows Proxy for
processing. For more
information, see
Section 2.2,
“Designating a
Discovery and
Deployment Proxy
Server,” on page 26.
To query a device using
SNMP, the device must have
SNMP enabled.
The SNMP community string
must be specified as a SNMP
credential in the Discovery
Task.
SNMP uses the UDP Port
161. The firewall must be
configured to allow access
through this port.
18ZENworks 10 Configuration Management Discovery, Deployment, and Retirement Reference
novdocx (en) 16 April 2010
IP Discovery
Technology
SSHUses the SSH protocol to
FunctionalityRequirementsPrerequisites
To query a device using SSH,
communicate with the
SSH server on the
devices identified by the
IP-based discovery task.
Depending on the device
OS (Linux or NetWare),
the device retrieves the
OS type, OS or Kernel
version, CPU, Network
Adapters, and memory
details.
the device should have SSH
enabled, and the username
and password must be
specified as General or Linux
credentials in the Discovery
task.
1.4 LDAP Discovery Technology
For LDAP discoveries, the ZENworks discovery engine issues an LDAP request to the LDAP
server. The LDAP request contains the LDAP server name, LDAP port, credentials, the context or
group to search, and whether or not to recursively search subcontainers or subgroups.
Device objects that are found are queried for well-known attributes (dnsHostName,
OperatingSystem, wmNameDNS, wmNameOS, and so forth) to attempt to determine the OS
version and DNS name of the device. If the request specifies a recursive search, the context is
searched for well-known container objects. For each container object found, a new LDAP request is
created for the container object and appended to the search context of the current request.
LDAP discovery tasks require the following information:
The connection information (address and port) for the LDAP server.
The credentials required for reading information from the LDAP directory.
The directory contexts to search for devices.
The schedule for running the task. You can schedule it to run immediately or at a specified date
and time. Optionally, you can choose to not set a schedule, in which case the task is not run
until you manually initiate it or schedule a time.
The ZENworks Server that you want to run the task.
1.5 Advertised Devices
The ZENworks discovery engine allows you to discover devices that have the ZENworks preagent
installed, such as OEM devices or devices whose registration was removed from the Management
Zone. Only those devices that have the preagent installed respond to an advertised discovery;
devices that have the ZENworks Adaptive Agent do not respond to an advertised discovery.
1.6 Discovered Devices
As devices are discovered, they are added to the ZENworks database and listed in the appropriate
device type folder in the Discovered panel on the Discovered Devices page.
All Types: All discovered devices, regardless of type.
Servers: All discovered devices that have been identified as servers.
Wor kstatio ns: All discovered devices that have been identified as workstations.
Printers: All discovered devices that have been identified as printers. ZENworks does not
manage printers; therefore, you cannot deploy the ZENworks Adaptive Agent to them.
Network Equipment: All discovered devices that have been identified as network equipment.
This incudes such devices as routers. ZENworks does not manage network equipment;
therefore, you cannot deploy the ZENworks Adaptive Agent to network equipment.
Thin Clients: All discovered devices that have been identified as thin clients.
Other Devices: All discovered devices that have been identified but don’t fit into one of the
other categories. This category includes devices that already have the ZENworks Adaptive
Agent installed.
Unknown Devices: All discovered devices whose operating system cannot be identified. The
devices might be listed as unknown because the firewall configuration of the device may block
the usage of discovery technologies, or invalid credentials are provided to the discovery
technology. You can deploy the ZENworks Adaptive Agent to these devices if you can
manually ensure that the agent is supported on these devices. For more information on list of
supported devices, see “Managed Device Requirements” in ZENworks 10 Configuration
Management Installation Guide.
Deployable Types: All discovered devices that have been identified as types to which you can
deploy the ZENworks Adaptive Agent.
Devices Created Via ZENworks Migration: All devices that were migrated from ZENworks
7 through the ZENworks Migration utility.
Devices Created Via ZENworks Asset Management: All devices that were migrated from
ZENworks Asset Management through the ZENworks Asset Management Migration utility.
20ZENworks 10 Configuration Management Discovery, Deployment, and Retirement Reference
1.7 Deployable Devices
Devices that meet the requirements for the ZENworks Adaptive Agent are displayed in ZENworks
Control Center in the Deployable Devices panel on the Deployment page.
Using this panel, you can deploy the Adaptive Agent to devices, remove them from the ZENworks
database, or ignore them by filtering them out of the list.
novdocx (en) 16 April 2010
Basic Concepts21
novdocx (en) 16 April 2010
22ZENworks 10 Configuration Management Discovery, Deployment, and Retirement Reference
2
Discovering Devices By Using IP
novdocx (en) 16 April 2010
Addresses
You can perform an IP-based discovery of your network to add devices to your ZENworks®
database. With an IP discovery, the ZENworks Server uses a set of technologies (WMI, WinAPI,
MAC Address, NMAP, ZENworks, SNMP, SSH) to discover as much information about the target
devices as possible. The target devices are determined by the IP address range you specify.
Section 2.1, “Configuring Discovery Settings,” on page 23
Section 2.2, “Designating a Discovery and Deployment Proxy Server,” on page 26
Section 2.3, “Creating an IP Discovery Task,” on page 27
2.1 Configuring Discovery Settings
IP discoveries use the following configuration settings that can be modified, if necessary:
Number of discoveries that can be processed concurrently (default is 5)
IP subnets or address ranges that are to be excluded from the discovery
Discovery technologies that are used (the default is LDAP, MAC Address, WinAPI,
ZENworks, and SSH)
1 In ZENworks Control Center, click the Configuration tab.
2
2 In the Management Zone Settings panel, click Discovery and Deployment, then click the
Discovery option.
Discovering Devices By Using IP Addresses
23
novdocx (en) 16 April 2010
3 In the Discovery Process Settings panel, modify the following settings as necessary:
Maximum Concurrent Discoveries: A discovery task consists of one or more discovery
requests. For IP-based discovery tasks, a request is created for each discovery technology and
each IP address in the specified range. Therefore, if you use six technologies to discover 10 IP
addresses, 60 requests are created. For LDAP-based discovery tasks, a request is created for
each context or group to be searched.
You use this field to specify the maximum number of discovery requests that the ZENworks
Server can process at one time. A smaller number eases the traffic load on the network but
requires more time to complete the discovery task; you should use a smaller number if you
schedule discovery tasks during peak network load times. A larger number has the opposite
effect; heavier traffic load with less time to complete the task.
For more information on the IP discovery process, see Section 1.3, “IP Discovery
Technologies,” on page 13.
Discovery Technologies: The discovery process can utilize a variety of different technologies.
When more than one technology is used, the discovery process initiates a discovery request for
each technology, with all technology requests running simultaneously. This is done for each
target IP address. For example, if you use MAC Address, SNMP, and WMI, the discovery
process creates three requests for each target IP address. The requests are queued and run
according to the Maximum Concurrent Discoveries setting.
If more than one technology request returns information for a discovered device, the
information is merged together. In the case of conflicting information, the discovery process
chooses the “best” information.
24ZENworks 10 Configuration Management Discovery, Deployment, and Retirement Reference
Using fewer discovery technologies reduces the time required to complete the discovery task
but might also reduce the amount of information received.
For detailed information about each technology, see Section 1.3, “IP Discovery Technologies,”
on page 13.
4 In the IP Addresses to be Excluded panel, specify the IP subnets or address ranges to be
excluded from the discovery.
NOTE: All the discovery tasks inherit the IP address ranges specified at the Management Zone
level. If the IP address range is specified at a task level, the combined ranges of the
Management Zone and discovery task are excluded from the discovery.
You can manually add the IP addresses to be excluded or import the IP addresses to be
excluded from a CSV file.
To manually add the IP address to be excluded:
1. In the Range field, enter the IP address range in one of the following formats:
xxx.xxx.xxx.xxx: Standard dotted-decimal notation for a single address. For
example,
123.45.167.100.
novdocx (en) 16 April 2010
xxx.xxx.xxx.xxx - xxx.xxx.xxx.xxx: Standard dotted-decimal notation for a range of
addresses. For example,
123.45.167.100 - 123.45.167.125
.
xxx.xxx.xxx.xxx/n: Standard CIDR (Classless Inter-Domain Routing) notation. With
CIDR, the dotted decimal portion of the IP address is interpreted as a 32-bit binary
number that has been broken into four 8-bit bytes. The number following the slash (/
n) is the prefix length, which is the number of shared initial bits, counting from the
left side of the address. The /n number can range from 0 to 32, with 8, 16, 24, and 32
being commonly used numbers. For example,
addresses that start with
123.45.167
. When you add the IP address range to the
123.45.167.100/24
matches all IP
Selected IP Ranges list (see the next step), it is automatically expanded to show the
range of addresses in dotted-decimal notation.
2. To add the IP address range to the Selected IP Ranges list, click Add.
To use a CSV list to import an IP address to be excluded:
1. In the Selected IP Ranges list, click Import.
The Import CSV File dialog box is displayed.
2. Click Browse to browse for and select a file that contains a comma-separated or
columnar list of IP addresses.
3. Click OK.
5 In the Network Discovery Settings panel, modify the following settings as necessary:
IP Settings: These settings apply when using the WMI and SNMP discovery technologies.
Initial ping timeout: Specifies how long the discovery technology waits for a response to
an ICMP query (ping).
Maximum ping retries: Specifies the number of times a ping is repeated before giving
up.
Increment ping timeout on retries by: Adds the specified amount of time to each retry.
For example, if the initial ping timeout is 200 milliseconds, the maximum ping retries is 3,
and the increment is 200 milliseconds, the first retry timeout is 400, the second retry
timeout is 600, and the third retry timeout is 800.
Discovering Devices By Using IP Addresses25
Perform name lookups: Uses a reverse lookup to associate the target IP address with a
DNS name. Deselect this option if you do not want the DNS name discovered.
SNMP Settings: These settings apply when using the SNMP discovery technology.
Initial SNMP timeout: Specifies how long the discovery technology waits for a response
to an SNMP query before assuming that the packet is lost.
Maximum SNMP retries: Specifies the number of times an SNMP query is repeated
before giving up.
Increment SNMP timeout on retries by: Adds the specified amount of time to each
retry. For example, if the initial SNMP timeout is 500 milliseconds, the maximum SNMP
retries is 3, and the increment is 1000 milliseconds, the first retry timeout is 1500, the
second retry timeout is 2500, and the third retry timeout is 3500.
6 Click OK to save the changes.
2.2 Designating a Discovery and Deployment
Proxy Server
ZENworks Servers running on Linux cannot perform discovery tasks that use Windows-specific
technologies such as WMI and WinAPI. Linux servers also cannot perform deployment of
ZENworks Adaptive Agents to Windows devices, as deployment uses Windows-specific
technologies. In order to enable the execution of discovery and deployment tasks by Linux
ZENworks Servers, you can designate a managed Windows device in your zone to function as a
discovery and deployment proxy server. The managed device can be either a Windows server or
workstation.
novdocx (en) 16 April 2010
When a Linux ZENworks Server receives a discovery task that includes Windows-specific
technologies, it processes the non-Windows discovery technologies and offloads the Windowsspecific technologies to the proxy. The proxy performs the discoveries and returns the results to the
Linux ZENworks Server. The deployment task is totally offloaded to the Windows Proxy.
If you have only Linux servers in your environment, you must first manually install ZENworks
Adaptive Agent on a Windows device by downloading the agent from
1 In ZENworks Control Center, click the Configuration tab.
, then designate the device
26ZENworks 10 Configuration Management Discovery, Deployment, and Retirement Reference
novdocx (en) 16 April 2010
2 In the Management Zone Settings panel, click Discovery and Deployment, then click the
Windows Proxy option.
3 Fill in the following fields:
Windows Proxy: Click to browse for and select the managed Windows device (server or
workstation) on which you want to perform discovery tasks on behalf of Linux-based
ZENworks Servers.
Windows Proxy Timeout: Specify the number of seconds you want the ZENworks Server to
wait for a response from the Windows Proxy. Any responses received after the specified
timeout period are discarded.
4 Click OK to save the changes.
2.3 Creating an IP Discovery Task
You use the Create New Discovery Task Wizard to create and schedule the tasks used by ZENworks
Servers to discover devices on your network and add them to the ZENworks database.
Discovering Devices By Using IP Addresses27
When a discovery task runs, the ZENworks Server creates a discovery request for each IP address
and discovery technology (WMI, WinAPI, MAC Address, NMAP, ZENworks, SNMP, SSH) used.
For example, if you specify one IP address and use all seven discovery technologies, the ZENworks
Server initiates seven discovery requests. Therefore, the more IP addresses you specify and the more
discovery processes you use, the longer the discovery task takes to complete. For fastest results, you
should create tasks that target smaller ranges of IP addresses and, if possible, assign different
ZENworks Servers to process the tasks.
1 In ZENworks Control Center, click the Deployment tab.
novdocx (en) 16 April 2010
2 In the Discovery Tasks panel, click New to launch the New Discovery Task Wizard.
3 Complete the wizard by using information from the following table to fill in the fields.
28ZENworks 10 Configuration Management Discovery, Deployment, and Retirement Reference
Wizard PageDetails
Select Discovery Type pageSelect IP Discovery Task.
Specify a name for the task. The name cannot include any of the
following invalid characters: / \ * ? : " ' < > | ` % ~
novdocx (en) 16 April 2010
Discovery Settings page >
Override Zone Discovery
Settings field
Discovery Settings page >
Discovery Technologies
Chose whether to override the discovery settings configured at the
Management Zone.
If you want to configure the settings on a device folder or a device,
you must select Override Zone Discovery Settings before you can
modify the settings.
The discovery process can utilize a variety of different technologies.
When more than one technology is used, the discovery process
initiates a discovery request for each technology, with all technology
requests running simultaneously. This is done for each target IP
address. For example, if you use MAC Address, SNMP, and WMI,
the discovery process creates three requests for each target IP
address. The requests are queued and run according to the
Maximum Concurrent Discoveries setting.
If more than one technology request returns information for a
discovered device, the information is merged together. In the case
of conflicting information, the discovery process chooses the “best”
information.
Using fewer discovery technologies reduces the time required to
complete the discovery task but might also reduce the amount of
information received.
For more information about each technology, see Section 1.3, “IP
Discovery Technologies,” on page 13.
Discovering Devices By Using IP Addresses29
Wizard PageDetails
novdocx (en) 16 April 2010
Enter IP Discovery Settings
page > Range field
To specify a range of IP addresses for the discovery task:
1. In the Range field, specify an IP address range using one of
the following formats:
xxx.xxx.xxx.xxx: Standard dotted-decimal notation for a
single address. For example, 123.45.167.100.
xxx.xxx.xxx.xxx - xxx.xxx.xxx.xxx: Standard dotted-decimal
notation for a range of addresses. For example,
123.45.167.100 - 123.45.167.125.
xxx.xxx.xxx.xxx/n: Standard CIDR (Classless Inter-Domain
Routing) notation. With CIDR, the dotted decimal portion of the
IP address is interpreted as a 32-bit binary number that has
been broken into four 8-bit bytes. The number following the
slash (/n) is the prefix length, which is the number of shared
initial bits, counting from the left side of the address. The /n
number can range from 0 to 32, with 8, 16, 24, and 32 being
commonly used numbers. For example, 123.45.167.100/24
matches all IP addresses that start with 123.45.167. When you
add the IP address range to the Selected IP Ranges list (see
the next step), it is automatically expanded to show the range
of addresses in dotted-decimal notation.
You are recommended to specify an IP address range that
does not contain more than 50,000 devices. A task that has a
large IP address range does not get started. For more
information, see the troubleshooting scenario “Discovery task
remains in a pending state if it has a large IP address range”
on page 128.
2. To add an IP address range to the Selected IP Ranges list,
click Add.
3. (Optional) To exclude the IP subnets or address ranges from
the discovery, click Exclude.
The Excluded Addresses dialog box is displayed.
For more information on how to exclude the IP subnets or
address ranges, see “Enter IP Discovery Settings page >
Excluded Addresses dialog box” on page 31.
4. To add additional ranges, repeat Step 1 and Step 2.
30ZENworks 10 Configuration Management Discovery, Deployment, and Retirement Reference
Loading...
+ 102 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.