Closest Server Rules
101
n
ov
do
cx (e
n)
16
Ap
ril 20
10
Device:
The rules apply only to the device for which they are configured. They override the
settings set at the Management Zone and folder levels.
Each device can have only one Closest Server rule applied to it. A device’s effective rule is
determined as follows:
1. Device Settings:
Evaluate all rules that are set on the device. If the device meets a rule’s
criteria, that rule becomes the device’s effective rule.
2. Folder settings:
If no device rule applies, evaluate all rules that are set on the device’s parent
folder. If the device meets a rule’s criteria, that rule becomes the device’s effective rule. If not,
evaluate the rules on the next folder up in the hierarchy.
3. Management Zone:
If no folder rule applies, evaluate all rules that are set in the Management
Zone. If the device meets a rule’s criteria, that rule becomes the device’s effective rule. If not,
apply the
Default rule
to the device.
4. Default Rule:
If no device, folder, or Management Zone rule applies, apply the default rule to
the device. The Default rule is simply a listing of all content servers in the order you want
devices to contact them.
9.2 Configuring the Closest Server Default Rule
The Closest Server Default rule lets you define the rule that is used by a device to determine the
closest authentication, collection, content, and configuration servers when no Closest Server rules
have been defined or when none apply. This rule is simply a listing of the servers in the order you
want devices to contact them. You cannot add or remove servers from the lists.
For Closest Server Default rules, devices that are Satellites are considered as servers and can be
listed for selection in the appropriate lists.
By default, all ZENworks Servers function as authentication, collection, content, and configuration
servers and are displayed in the appropriate lists. In addition, any devices that are defined with the
Content or Imaging roles are also displayed in the Content Servers list, any devices that are defined
with the Collection role are also displayed in the Collection Servers list, and any devices that are
defined with the Authentication role are also displayed in the Authentication Servers list.