Hitachi

JP1 Version 12 JP1/IT Desktop Management 2 Configuration Guide


1.5.1 Searching for devices connected to the network

This approach is one way of searching for devices used in your organization. You can search for devices connected to the network.

In the Settings module, select Discovery, Configuration, and then IP Address Range. In the IP Address Range view that appears, set the range of IP addresses to be searched and the authentication information to be used during the search. When you click the Start Discovery button, the search begins according to the specified schedule.

To search for devices connected to the network:

  1. In the Settings module, select Discovery, Configuration, and then IP Address Range to display the IP Address Range view.

  2. In Search Node Locations, set the range of IP addresses to be searched.

    By default, Management Server is set as the IP address range. Management Server is a network segment that contains a management server.

    Important

    If you want to specify a period of time to intensively search, specify settings so that the number of IP addresses that are contained in the IP address range is 50,000 or lower. If the number of IP addresses exceeds 50,000, the network search might stop.

    If you discover more than 50,000 IP addresses, disable the Intensive Discovery option.

    Important

    In a multi-server configuration, do not specify the same search range for different management servers. If you do so, you might not be able to manage device information normally because the server that manages the information about a device might be changed unintentionally each time the device is detected.

  3. In Credentials Used, set the authentication information to be used during the search.

  4. In Search Node Locations, set the authentication information to be used for each IP address range.

    Important

    If an IP address range includes devices that are configured to lock the account after a specific number of failed logon attempts, assign specific authentication information for each IP address range. If you select Any, all authentication information items are used in an attempt to access devices, which might cause some users to be unexpectedly locked out of their accounts.

    Important

    If you select Any, each authentication information item is used in an attempt to access devices. The high network access frequency imposes a heavy load on the network. Select this option only after carefully considering the possible network load.

  5. In Auto Discovery Schedule, specify the search schedule.

  6. In Edit Discovery Option, specify whether to automatically include the discovered devices as management targets and whether to automatically deploy agents to them.

  7. To send a notification email to yourself (administrator) after completion of the search, specify the notification destination in Notification of Discovery Completion.

  8. Click the Start Discovery button in the upper right corner of the window.

  9. In the dialog box that opens, confirm the search settings, and then click the OK button.

    If you select the Intensive Discovery check box, a network search is repeated without a break in the specified period of time. Therefore, we recommend that you select this check box if you want to discover as many devices as possible at the initial stage of operation. For example, if you repeat a search, devices that were turned off and could not be discovered during the first search are more likely to be discovered during the second and subsequent searches.

    Important

    With the Intensive Discovery check box selected, a search that is continuously repeated imposes a heavy load on the network during the specified period of time. Select this check box after due consideration of the load on the network.

The display changes to the IP Address Range view (that is displayed by selecting, Discovery, Discovery Log, and then IP Address Range in the Settings module), and then the search is performed according to the specified search schedule.

Tip

When performing Discovery from IP Address Range to network devices that are in a redundant configuration, a device may be registered as two devices. If you do not want to manage one of devices, set either device to Ignored Node.

Related Topics: