Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Updated the panel macro with the following parameter(s): [bgColor]
Panel
borderColor#72B0DE
bgColor#72B0DE#F0F0F0
Digi accordion
titleGeneral

About SummitAI IT Management Suite 1

Signing In 1

Describing the User Interface 1

Alerts and Approvals 1

Viewing and Updating Your Profile Details 1

Global Search 1

Personalizing Pages 1

Forgot Password 1

Logging Out 1

Delegating Role 1

Signing In As Another User 1

Switching Tenant 1

Searching Users 1

Help File Conventions 1

Digi accordion
titleConcepts

Document Repository

Global Tenant

Multi-tenancy

Concurrent License Allocation 1

Digi accordion
expandedtrue
titleAdministrators
Expand
titleBasic
Expand
titleUsers

Adding Users 1

Viewing User List 1

Configuring Role Templates 1

Role Template Menu Configuration_GM 1

Role Template Other Configuration 1

Configuring Custom Tabs 1

Resigned Approver List 1

Viewing Switch User List 1

Configuring Switch User 1

Importing User Details Using Excel

Importing User Details from DB

Importing Active Directory User Details

Expand
titleInfrastructure
Expand
titleTheme Configuration

Configuring Themes 1

Previewing and Editing Themes 1

Expand
titleSSO Configuration

SSO Configuration Wizard

SSO Configurations: Forms

SSO Configuration : SAML

SSO Configuration: OAuth

SSO Configurations: Proxy

Expand
titleForm Builder

Form Builder 1

Custom Fields

Configuring Custom Fields for Customers

Configuring Custom Fields for Users

Expand
titleCommon Masters

Configuring Common Master Types 1

Configuring Common Masters 1

Configuring Geographic Location 1

Expand
titleWidgets

Configuring Widgets 1

Configuring Widget Tabs 1

Configuring Widget Reports 1

Configuring Widget Report Access 1

Expand
titleExport/Import

Importing Configurations by Template

Exporting Configurations by File

Importing Configurations by File

Configuring Tenant 1

Configuring Dashboards 1

Configuring Domain 1

Configuring Application Settings 1

Importing Master Template

Configuring Analysts 1

Mapping Language Translation

Configuring Workgroups

Report Builder

Configuring Custom Scheduler 1

Archiving Data 1

Configuring Periodic Survey 1

Configuring Simple Mail Transfer Protocol 1

Configuring Web Services

External Web Service Mapping

Proxy View Admin 1

Viewing Proxy Server Details

Configuring VLAN 1

Mapping VLAN to Proxy 1

Configuring Digital Signature 1

Configuring ServiceNow 1

Expand
titleWorkflow

Configuring SR Approval Workflow

Configuring CR Approval Workflow 1

Expand
titleCustomers

Adding Customers 1

Viewing Customer List 1

Configuring Customer SLA Matrix 1

Configuring Custom Tabs for Customers 1

Expand
titleVendors

Adding Vendors 1

Viewing Vendor List 1

Expand
titleAdvanced
Expand
titleDiscovery and Monitoring

Configuring Vendor MIBs

Discovery Configuration

Configuring Monitoring Accounts 1

Configuring Scripts

Configuring Scripts Based Monitoring 1

Configuring SNMP MIB 1

Configuring SNMP Based Monitoring

Expand
titleDocuments

Configuring Standard Operating Procedures

Viewing Documents

Uploading Documents

Expand
titleNotifications

E-mail Parsing 1

Configuring Mailbox

Configuring Templates for Free-Form E-Mail Type 1

Configuring Templates for Line E-mail Type 1

Configuring Notification Parser 1

Configuring Notification Templates 1

Configuring SMS Gateway 1

Configuring Voice Call Gateway 1

Configuring Bulletins 1

Configuring Alerts 1

Adding Master Configuration 1

Configuring Conference Call 1

Configuring Push Notifications 1

Expand
titleCompliance

Configuring Compliance Profiles 1

Allocating Compliance Profiles 1

Agent Contact Information 1

Viewing Modifying Profile Configuration 1

Expand
titleProductivity

Configuring Skills

Configuring Skill Category

Configuring Core Competency 1

Adding Holidays 1

Expand
titleShift Management

Configuring Shifts 1

Allocating Shifts 1

Viewing Shift Roster

Expand
titleEscalations

Configuring Auto Escalations 1

Configuring Manual Escalations

Expand
titleLicense

License Usage

License Acceptance

License Monitoring

Allocating Concurrent License 1

Expand
titleGDPR

GDPR 1

Configuring GDPR 1

Guide Me 1

Expand
titlePassword Management

Password Management

Configuring Administrator 1

Configuring Security Questions 1

Mapping Security Questions 1

Configuring Keyword Message 1

2019-10-17_09-08-12_Managing User Account

Configuring Password Expiry 1

Password E-mail Audit Log 1

Creating AD Property 1

User Registration Details Report 1

Status Details Report 1

Digi accordion
titleReports and Dashboards

Viewing Reports

Creating New Reports_Gen 1

Creating New Dashboards 1

Creating New Advanced Reports 1

Discovery Scan Error Report 1

Summit Audit Log for Login Accounts 1

SUMMIT Configuration Audit Report

Survey Report 1

License Trend Report 1

GDPR Status Report 1

Digi accordion
titleOthers

Tenant Department Customer 1

Configuring Auto Escalation for Incident By SLA 1

Configuring Auto Escalation for Incident By Time 1

Configuring Auto Escalation for SR by Time 1

Configuring Auto Escalation for SR by SLA 1

2019-09-30_08-38-31_Configuring Mailbox

2020-04-07_12-45-08_Proxy View

2019-09-30_07-46-16_Configuring Vendor MIBs

Summit Audit Log for Login Accounts

Scripting 1


Scroll export button
scopecurrent
template-idc9a14909-8f27-452d-bca0-164bee1a9265
captionDownload this Page
add-onScroll PDF Exporter

Based on the Discovery configuration, the Servers, Networks, Links, Printers, and Laptop devices in the organization can be identified. The discovered devices are saved in their respective modules. You can configure multiple subnets for a job and configure protocols, such as WMI, SNMP, SSH and Telnet to discover devices in the given subnet range. You can configure the order of execution of the protocols. After the devices are discovered, you can view the listed devices in the Scanned Result section and the devices that are not listed can be viewed in the Errors Result section.

Prerequisites

Requirements for Network Connectivity

Purpose

Source

Destination

Outbound

E-mail Communications

Summit Web

Exchange

POP [110] / 465

Database Communications

Summit Web

Summit DB

SQL [1433]

AD Authentication

Summit Proxy

Active Directory

LDAPS[636] or LDAP[389]

Domain Name Service

Summit Proxy

Domain Name Server

DNS[53]

Availability Management

Summit Proxy

Network Device

SNMP Polling [161]

Availability Management

Summit Proxy

Windows Server

WMI [135-139]

Availability Management

Summit Proxy

Linux/Unix/Mac

SSH [22]

Discovery Common

Summit Proxy

All

PING [ICMP]

Discovery Common

Summit Proxy

Network Device

SNMP Polling [161]

Discovery Common

Summit Proxy

Windows Server

WMI [135-139]

Discovery Common

Summit Proxy

Linux/Unix/Mac

SSH [22]

Windows Servers

Requirement

Description

Common requirements

  • An administrative service account:
    • Member of local Administrators group (either domain or local)
    • Stored in monitoring accounts (customer can manage the password)
  • Bidirectional Ping [ICMP]:
    • Used for the latency graph up/down alerts

Agent Based (Preferred Option)

  • Simple low footprint agent
  • Only requires http/s from target to proxy
  • Supports other functions - Asset/Proxy

Windows Management Instrumentation (Alternative Option)

  • WMI requires Ports 135-139 from Proxy to Target
    • It depends on the port mapper configuration.
    • Fixed or dynamic ports for return communications.
      • Dynamic ports will cause more effort in secure networks.

Linux Servers

Requirement

Description

Common requirements

  • An administrative service account:
    • Read only but able to run privileged commands.
  • Bidirectional Ping [ICMP]
    • Used for the latency graph up/down alerts.

Agent Based (Preferred Option)

Agent requires http/s from target to proxy.

Secure Shell (SSH) (Alternative Option)

SSH requires Ports 22from Proxy to Target server.

Network and Other Requirements

Requirement

Description

Account requirements

  • Domain Administrator credential ID is required for the Auto Discovery functionality of the Asset Management.
  • SSH credentials with port number shall be made available for Linux/Unix device discovery.
  • SNMP V2c community read only string or V3 account, password, authorization and privacy information.
  • Account Names and Passwords shall be stored in the Monitoring Account UI, where the passwords can be managed independent of the implementation staff.

Ports that are to be opened

All devices that require Ping:

  • ICMP is required from the Proxy to all the targeted systems
  • ICMP is required from the Summit server to the Proxy

Proxy to Summit server (in Azure cloud)

  • Proxy to Web server, port HTTPS [443] is required for traversing the internet.

Windows servers to proxy (with agents installed)

  • Port 443 https agent to proxy only
  • If required, port 80 can be configured.

Linux servers to Proxy (no agent is installed)

  • SSH port 22 linux server to proxy

Linux servers to Proxy with agents installed)

  • Port 443 https agent to proxy

Network devices

  • SNMPV2c or v3 port 161 proxy to network device.

Recommended browser

Internet Explorer 10x and above


To configure Discovery:

  1. Select Admin > Advanced > Discovery & Monitoring > Discovery.
  2. On the DISCOVERY page, click ADD NEW on the ACTIONS panel.
  3. Select the Tenant and fill in the required details. For more information about the fields and icons on the DISCOVERY page, see Field Description.
  4. Click SUBMIT. The Discovery details are configured.

    DISCOVERY page
    Figure: DISCOVERY page

Anchor
Field Description
Field Description
Field Description

The following table describes the fields on the DISCOVERY page:

Field

Description

DETAILS

Monitoring Source

Lists the configured monitoring source types as Summit Server and Summit Proxy.

  • Summit Server: It refers to the machine, where SUMMIT Suite is installed using the SUMMIT Installer. It is also referred to as SUMMIT Centralized Server. Select this option to perform the discovery from this centralized server.
  • Proxy Server: It refers to the machine configured at a client location for sending monitored data of the client machines to the SUMMIT Server. Select this option to execute the discovery from the Proxy Server.

Discovery From (Proxy)

If you select Proxy Server in the Monitoring Source field, the Discovery From (Proxy) field is displayed.
Select the Proxy device from the list to discover devices from the selected proxy server.

Job Name

Type in the job name that will perform the Common Discovery.

Subnet

Type in the subnet numbers.

Protocols

The following protocols are available to select:

  • SNMP: The Simple Network Management Protocol (SNMP) is a set of protocols for managing and monitoring complex networks. if SNMP check box is selected, then SNMP Version has to be specified. Select the SNMP version from the list:
    • SNMPV1
    • SNMPV2c
    • SNMPV3

Note: SNMP V3 requires an authentication and login credentials for managing a device on the network. SNMP V3 provides important security features such as confidentiality to prevent snooping by an unauthorized source, message integrity to avoid data tampering, and authentication to validate the source.
If SNMPV3 is selected, the AuthType field is displayed. Select the Authentication

Type from the list:

      • AuthNoPriv: If selected you have to specify the authentication details. You have to select the SNMP user and authentication mode( SHA or MD5)
      • AuthPriv: If selected you have to specify the SNMP user, authentication mode, privilege password, and privilege protocol.
      • NoAuthNoPriv: If selected authentication and privilege is not applicable. You have to select the SNMP user from the list.
  • You can provide ping time out for each protocol. Select any one monitoring protocol option. Type in the respective protocol details, as required.WMI: The Windows Management Interface (WMI) is a set of extensions to the Windows Driver Model that provides an operating system interface through which instrumented components provide information and notification.
    Note: The WMI protocol is used to mainly monitor the event status that is configured in the server.
  • SSH: SSH Is used in case of other than windows OS. The Secure Shell (SSH) is a Unix Shell program for logging into, and executing commands on, a remote computer. The protocol provides secure encrypted communications between two untrusted hosts over an insecure network.
  • Telnet: Telnet offers users the capability of running programs remotely and facilitates remote administration. Telnet is available for all operating systems and eases integration in varied networking environments.

Discovery Scripts

Lists the configured scripts. Select the script from the list to monitor the parameters defined in the scripts through discovery and click the ADD TO LIST button to add the selected script for execution.

Select the script from the list and click the DELETE button to remove the script from the ADD TO LIST section.

Discovery SNMP

Lists the configured SNMP. Select the SNMP from the list to monitor the parameters  through discovery and click the ADD TO LIST button to add the selected SNMP for execution.

Select the SNMP from the list and click the DELETE button to remove the SNMP from the ADD TO LIST section.

Note: The Discovery Scripts and Discovery SNMP fields are displayed based on the selected Protocols. If a Script or an SNMP MIB is configured for the selected protocol then Discovery Script or Discovery SNMP fields are displayed respectively.

Ping Protocol

The Ping Protocols are used for diagnostics (like Ping), error messages, moving data between applications, and so on. Select the Ping Protocol from the drop-down list.

Add For Monitoring

If selected, you can assign a default template to the discovered servers.

Default Configuration Template

Select a default configuration template from the drop-down list.

Set Time For

In this section, you can specify the ping retry and ping time out.

Protocol Execution Order

Allows to specify the order of protocols if more than one protocols are selected. You can move the protocol up and down to specify the order.

ADD TO LIST

Click the ADD TO LIST button to execute the protocols. All the selected protocols are added in the table below the button.

Delete

Allows you to delete the protocol from the table. Select the check box for the protocol you want to delete and click the DELETE button.

Notify Once Complete

If selected, after completing the discovery task an e-mail notification is sent to the Administrator.

Execute Job

Select Now to execute the job now. If you select Later to run the job later. Specify the values for the following fields:

  • Run As User: Type in the user name.
  • Password: Type in the password to run the job.
  • Re-enter Password: Re-type the password.
  • Start Date: Specify the date when the job should be started.
  • End Date: Specify the date when the job should end.
  • Repeat Job: If you select Repeat, you need to specify the frequency of repeating the job.

Note: These fields will vary based on the selected option.

ACTIONS

This section explains all the icons displayed on the ACTIONS panel of DISCOVERY page.

SHOW LIST

Click SHOW LIST to display the LIST table showing all the configured discovery values for the selected Tenant.


Figure: DISCOVERY page: List of Common Discovery configurations

  • Click View Jobs icon to view the job details. The Green Tick in the Status column indicates that the job was successful.
  • Click the Delete icon to delete the job from the list. Click Re-run icon to re-run the job.
  • Click ADD NEW on the ACTIONS panel to configure a new Common Discovery value.

On the Job Details pop-up, you can view the scan details,device details discovered in the specified sub net range, and error details. If the devices present within the given sub-net range are not discovered, the reason for the error is displayed.

  • Click the Serial Number hyperlink to view the device details.
  • Click the Host Name hyperlink to view the Network Device Interface Details.
Note
titleNote:

The Serial Number hyperlink is not displayed for Network devices.


JOB DETAILS pop-up page
Figure: JOB DETAILS pop-up page

You can also view additional parameters, such as Base Board, Bios, Ram details, CD ROM details, and so on for Non-Wintel systems, such as Ubuntu and linux.


Figure: JOB DETAILS: Additional parameters

On the Device Details pop-up, you can view the list of parameters and value of the corresponding parameter. You can also view the parameter values for the selected discovery script and discovery SNMP. Based on the selected script, you can view the parameter values under the SCRIPT BASED DISCOVERY VALUE section. Similarly, you can view the parameter values of the selected SNMPs under the SNMP BASED DISCOVERY VALUE section. The parameter values are categorized into single value output, multi-value output and free form text. Based on the parameter value type, the discovered device details are categorized and displayed in each section.

Filters

Click the Filters icon to specify a particular filter criteria to display Common Discovery values. The FILTERS pop-up page is displayed. Select the filter criteria and click SUBMIT.

FILTERS pop-up page
Figure: FILTERS pop-up page


Scroll ignore
scroll-pdftrue
scroll-officetrue
scroll-chmtrue
scroll-docbooktrue
scroll-eclipsehelptrue
scroll-epubtrue
scroll-htmltrue
1

| |