Device Scout Discovery Utility

Document created by on May 13, 2015Last modified by on Oct 9, 2018
Version 28Show Document
  • View in full screen mode


The Device Scout Discovery Utility is an application installed with the Device Scout that allows you to perform any of the following tasks:

  • Manually initiate a device discovery -  Typically, the Device Scout picks up the new IP addresses/ranges from the Beacon server and discover them within 24 hours, but you can use the Device Scout Discovery Utility to initiate device discovery manually.
  • Configure SNMPv3 settings - To discover SNMPv3 network print devices, you will need to configure SNMPv3 settings using the Device Discovery tool. SNMPv3 configuration is not yet available on the web portal.
  • Test scanning settings - The Device Discovery is a useful tool for testing scanning settings and inspecting the data collected from devices. Things that you may want to test using this utility:
    • Scanning a new IP range
    • New device types
    • Investigating a specific device
    • Firewall and/or network changes to ensure you are not blocking SNMP traffic.

Note: If you do not want device information and configuration settings to be pushed through to the Beacon server, you will need to turn off the following settings: Auto Upload Scan Results and Auto Upload Configuration.


Launching the Device Discovery Utility

From the Device Scout server, navigate to Programs > Pharos Systems International > Pharos Device Scout > Device Scout Discovery.

Click the Modify button to configure scanning and/or SNMPv3.

The Scan Configuration Tab

On the Scan Configuration tab, you can configure the IP range(s) of the devices you want to scan. Communication settings specific to the discovery process can also be configured here.

Enter Network Ranges to Scan

Manual Entry of a Single IP Address

  1. In the first text field, enter a single IP Address.
  2. Click Include to add the IP address or Exclude to exclude the IP address.

Manual Entry of an IP Address Range

  1. In the first text field, enter a starting IP Address.
  2. In the second text field, enter an ending IP Address.
  3. Click Include to add the IP address range or Exclude to exclude the IP address range.

Delete IP or IP Address Range

To delete an IP address or an IP address range, select the IP or IP range you want to delete and then click the Delete Selected button.

Import IP Addresses/Ranges from a File

You can import IP addresses or IP address ranges from a simple text file using the Load from file button. The file may contain IP addresses/ranges to include and/or exclude. Each IP address should be a single line item in the file. An IP address range should consist of a single line item with two IP addresses separated by a hyphen. To exclude an IP address/range, enclose the excluded item in parentheses.

Below is a CSV file showing an included IP scan range, included IP Address, included IP in CIDR format, and excluded IP scan range (from top to bottom):



Load IP Addresses/Ranges from server

Selecting the Load from server option pulls the IP addresses/ranges defined in the Beacon server (Discover > Device Scout > Configure screen). It is a way of synching IP addresses/range from the Beacon server. For example, you are adding new IP ranges in the Discovery utility, but have no intention of saving these IP ranges, clicking the Load from server restores previous network ranges.

Use Local Network

When you select the Use local network option, the Device Scout will scan the local subnet only based on the IP address and subnet mask of the server on which the Device Scout is running.


On the Advanced tab, you can configure special case settings. Unless specifically directed, the settings on the Advanced tab should remain at their defaults. The following table summarizes each setting.


Note: Most of the following settings also exist in the Web UI (Discover > Device Scout > Configure button). Changing these settings in the Device Discovery Utility will override the value set on the Web UI.


This setting refers to the total number of attempts to discover a device at an address or to collect a single piece of information from a device.

Note: This setting overrides the Retries value set on the General tab of the Web UI. Timeouts will be more common when scanning a range of addresses and altering this setting can impact network load.

The default value is 3 retries.

Is the length of time to wait for a response from a device when scanning addresses or communicating directly with a device.

Note:This setting overrides the Timeout value set on the General tab of the Web UI. Timeouts will be more common when scanning a range of addresses and altering this setting can impact network load. The default value is 2000 milliseconds (2 seconds).

2000 milliseconds

Ping Frequency

Is the time between retries. The default value is 20 milliseconds.

Note:This setting overrides the Ping Frequency value set on the General tab of the Web UI.

20 milliseconds

Concurrency Limit

The Concurrency Limit controls how many devices can be communicated with at the same time. Increasing this setting can result in quicker scan times but at the cost of higher network load.

Note: This setting overrides the Concurrency Limit value set on the Advanced tab of the Web UI

Collect StatusCollect device status and alert information at the designated frequency.Collect every 2 hours
Perform Hostname Lookup

Enable/Disable hostname lookup. On some networks, the hostname lookup for a device address can be invalid or meaningless, especially those using static IP addresses for devices.

Note: This setting overrides the Perform Hostname Lookup value set on the Advanced tab of the Web UI

Auto Upload Scan ResultsAutomatically upload devices to the Beacon server after scan.ON
Auto Upload ConfigurationAutomatically upload configuration settings to the Beacon server after clicking OK.ON


The SNMP Configuration Tab

The Device Scout uses the Simple Network Management Protocol (SNMP) to discover and retrieve device information of network print devices within your organization. It supports the following versions: SNMPv1, v2 and v3. Support for v3 provides additional security for querying devices using SNMP by providing authentication, encryption, and access control.

The SNMP Configurations tab of the Device Discovery Utility allows you to define the SNMP settings used to communicate with devices via SNMP to discover devices. You can create, view, modify, delete, and change the priority of an SNMP configuration on this screen.




Adding SNMP Communities

In SNMPv1/v2, security is implemented through the use of communities. Beacon includes a default v1 SNMP configuration called public, which uses the default SNMP Community string “public”.

To add a new SNMP Community:

  1. In the text field under SNMP Communities, enter the community name that matches the SNMP Community string configured in your devices.
  2. Click Add New.
  3. Update SNMP port if required. Default port is 161. The firewall must be configured to allow access through this port.
  4. Click OK. The settings are pushed to the Beacon server (if Auto Upload Configuration is ON).


Adding new SNMP V3 Configuration

Note: While SNMP Communities are used per Device Scout, SNMPv3 configurations are shared by all the Device Scouts in your organization.

  1. Click Add New.
  2. Enter the SNMP v3 details of the devices.
    • Title – Enter a name to identify the SNMPv3 configuration.
    • Username – Specify the username of the device.
    • Context Name – If configured for a device, enter the context name. This string is case-sensitive.
    • Authentication – Select the authentication protocol and enter the password associated with the Authentication protocol. Choose from the following options:
      • None
      • MD5

Note: MD5 is not compatible with FIPS (Federal Information Processing Standards). If you have FIPS enabled and use MD5 as your authentication protocol for a device, you will get the error  "Scan ended with error: This implementation is not part of the Windows Platform FIPS validated cryptographic algorithms".

      • SHA1

               Privacy Protocol – Select the privacy protocol and enter the password associated with the privacy protocol.

      • None
      • DES
      • AES
  1. Click OK to save changes.



  • Make sure that all fields exactly match the SNMPv3 settings configured in your network print devices otherwise, the devices may not be discovered.


How does the Device Scout determine which SNMP configuration to use

If there are multiple SNMP configurations defined in the Device Discovery tool, the order in which they are listed in the SNMP Configuration screen determines which configuration has precedence over other configurations. If the configuration with the highest priority fails, then the succeeding configurations are tried in order until one succeeds or the SNMP query fails. For example, on performing device discovery, it starts with the SNMP Community strings as they appear in the SNMP configuration screen and then goes through the SNMPv3 list one by one.


The first matching SNMPv1 configuration that is encountered will be the one that is associated with a device. If no match is found, no information is collected for that particular device. Once a matching configuration is found for a device, the association is stored and our tool uses the last known SNMP configuration. This prevents us from cycling through all possible options each time we communicate with the device.


Use the Up or Down buttons to change the priority of an SNMP Configuration.


Scanning the Network

When you click Scan Now, the tool returns a list of all discovered devices and submits it to the Beacon server right away. If you do not want discovered devices to be sent to Beacon automatically, you can turn off the Auto Upload options (Scan Configuration > Advanced).