-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Not really an issue but a feature request/enhancement (scan/discovery of screens)... #10
Comments
I really believe nmap here is much better use and i'm sure we don't need to implement such kind of things here, but I agree with you that some README updates or instructions to use nmap to generate list of detected devices that is compatible to use with this project is a nice thing to have! That's a great idea, PR is welcome. |
Thanks for replying! And yeah, I had already taken the steps to do that. If anyone is interested, here's some sample code anyone can use to auto-configure all screens on an asset's network to point to a specific MagicINFO server: `#!/bin/bash server="PUT_YOUR_MAGICINFO_URL_HERE" echo "Scanning for all Samsung Screens and registering against $server..." Alternative method using netcat if nmap not allowed or unavailable:
Hope this is helpful... Thanks again for the great tool! Warmest regards, |
AFAIK the MDC tool is simply sending the status command to every ID defined in the SET ID Range field. Those who respond with ACK are considered to be found. You can open up tracing window in the MDC tool to check commands sent. EDIT: I've reread the original issue and realized you wanted to identify the IP addresses, not display ID's |
Hi there -
Is there any way to add an additional command that run a discovery/scan via this tool? The only reason I ask is because currently, I'd need to use something like nmap to scan for all devices exposing port 1515 but ideally I'd like to encapsulate all functionality into one app. The MDC Unified Control program for Windows has "detect" feature as per the below which would be handy to execute via cmd line:
![image](https://private-user-images.githubusercontent.com/46659262/260315287-15574bf5-3a15-4edf-94da-f5eab5bfc13b.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.SbqI3OQUKcCyJXrpeXDEbkJjMCZ90F_MwXLobRaxUwY)
Warmest regards,
--Adam
The text was updated successfully, but these errors were encountered: