Discovery

Tools for your network and infrastructure devices

With in the Ardexa Web App, the following section describes each of the utility tabs under the selected Device's[DISCOVERY] tab:

MENU: > [DEVICES] > (select device) > [DISCOVERY]

Discovery provides you with a number of tools to gain insight into your network and infrastructure devices.

NETWORK SCAN

MENU: [DEVICES] > [DISCOVERY] > [NETWORK SCAN] tab

The default tab provided when you first arrive on the selected Device's [DISCOVERY] component tab.

Select a network interface and click on the RUN button; a report will be generated and after a duration will returned to the open NETWORK SCANtab.

The contents of the report will show what devices can be found on the local network with their local IP address, MAC address and device name provided.

Install arp-scan

  • not required for ArdexaLinux Devices

Before your device can run a network scan it must have arp-scan installed. If your device does not arp-scan installed you will be prompted to install. Installing may take a few minutes depending on your internet connection to and from the device.

If your connection is very poor there is a chance of a timeout error; no problem, just wait a minute or so and then refresh your page - it may have installed. If the module hasn't installed then try again.

All devices running ArdexaLinux will have this installed out-of-the-box. Once installed you are ready to start scanning.

Results for the most recent Network scan on a given device will be available in the app until the user leaves the workgroup, logs out or closes their browser.

PORT SCAN

MENU: [DEVICES] > [DISCOVERY] > [PORT SCAN] tab

Select a network interface, choose which ports to interrogate and click on the RUN button; a report will be generated and after a duration will returned to the open PORT SCAN tab. Ports can be select from a predefined list of common ports or manually entered using the Custom text field. The Custom text field accepts a comma-separated list of port numbers.

The contents of the report will show what devices can be found on the local network and a list of open ports from the pre-selected ports list.

Install nmap

  • not required for ArdexaLinux Devices

Before your device can run a port scan it must have nmap installed. If your device does not nmap installed you will be prompted to install. Installing may take a few minutes depending on your internet connection to and from the device.

If your connection is very poor there is a chance of a timeout error; no problem, just wait a minute or so and then refresh your page - it may have installed. If the module hasn't installed then try again.

All devices running ArdexaLinux will have this installed out-of-the-box. Once installed you are ready to start scanning

Results for the most recent Port scan on a given device will be available in the app until the user leaves the workgroup, logs out or closes their browser.

MODBUS

MENU: [DEVICES] > [DISCOVERY] > [MODBUS] tab

Reads values from one or more Modbus slave devices over the Modbus TCP protocol.

See Modbus for more information.

OPEN SERVICES

MENU: [DEVICES] > [DISCOVERY] > [OPEN SERVICES] tab

The OPEN SERVICES tab is a network tool that you can use to discover the description and status of your open ports on your public network (available to anyone over the internet).

Included Ports

The following common ports are included in the scan:

21: file transfer / ftp
22: secure shell / ssh
23: telnet
25: mail server routing / smtp
53: address name resolving / dns
69: trivial file transfer protocol / tftp
80: web server / HTTP
88: Kerberos authentication system
102: PLC/IEC
110: Pop3
135: end point mapper for remote management services / EPMAP DHCP
137: name registration and resolution / netBIOS
139: session service / netBIOS
143: imap
161: SNMP Simple Network Management Protocol
443: secure web server / HTTPS
445: SMB
465: smtps
500: ISAKMP / IKE
502: Modbus Protocol
554: camera-video streaming / RTSP
2342:
3306: Mysql
3389: Remote Desktop Protocol
4343: TCP / UDP
5060: SIP
5900: NFS or IIS
8000: HTTP Alternative
8008: HTTP Alternative
8080: HTTP Proxy
8443: HTTPS Alternative

Example Report