Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Updated the digi-accordion macro with the following parameter(s): []


Panel
borderColor#72B0DE
bgColor#72B0DE#F0F0F0


Digi accordionexpand
titleGeneral

About SummitAI IT Management Suite

Signing In

Describing the User Interface

Alerts and Approvals

Viewing and Updating Your Profile Details

Global Search

Personalizing Pages

Forgot Password

Logging Out

Delegating Role

Signing In As Another User

Switching Tenant

Searching Users

Help File Conventions


Digi accordionexpand
titleConcepts

Document Repository

Global Tenant

Multi-tenancy

Concurrent License Allocation

Digi accordion
expandedtrue


Expand
titleAdministrators


Expand
titleBasic


Expand
titleUsers

Adding Users

Viewing User List

Configuring Role Templates

Role Template Menu Configuration_GM

Role Template Other Configuration

Configuring Custom Tabs

Resigned Approver List

Viewing Switch User List

Configuring Switch User

Importing User Details Using Excel_General

Importing User Details from DB_General

Importing Active Directory User Details_General


Expand
titleInfrastructure


Expand
titleTheme Configuration

Configuring Themes

Previewing and Editing Themes


Expand
titleSSO Configuration

SSO Configuration: OAuth Gen

SSO Configuration : SAML Gen

SSO Configurations: Forms Gen

SSO Configurations: Proxy Gen


Expand
titleForm Builder

Form Builder

Custom Fields

Configuring Custom Fields for Customers

Configuring Custom Fields for Users


Expand
titleCommon Masters

Configuring Common Master Types

Configuring Common Masters

Configuring Geographic Location


Expand
titleWidgets

Configuring Widgets

Configuring Widget Tabs

Configuring Widget Reports

Configuring Widget Report Access


Expand
titleExport/Import

Importing Configurations by Template

Exporting Configurations by File

Importing Configurations by File

Configuring Tenant

Configuring Domain

Configuring Dashboards

Configuring Application Settings

Importing Master Template

Configuring Analysts

Mapping Language Translation

Configuring Workgroups

Report Builder

Configuring Custom Scheduler

Archiving Data

Configuring Periodic Survey

Configuring Simple Mail Transfer Protocol (SMTP)

Configuring Web Services

External Web Service Mapping

Proxy View

Viewing Proxy Server Details

Configuring VLAN

Mapping VLAN to Proxy

Configuring Digital Signature

Configuring ServiceNow


Expand
titleWorkflow

Configuring SR Approval Workflow

Configuring CR Approval Workflow


Expand
titleCustomers

Adding Customers

Viewing Customer List

Configuring Customer SLA Matrix

Configuring Custom Tabs for Customers


Expand
titleVendors

Adding Vendors

Viewing Vendor List



Expand
titleAdvanced


Expand
titleDiscovery and Monitoring

Configuring Vendor MIBs

Discovery Configuration

Configuring Monitoring Accounts

Configuring Scripts

Configuring Scripts Based Monitoring

Configuring SNMP MIB

Configuring SNMP Based Monitoring


Expand
titleDocuments

Configuring Standard Operating Procedures

Viewing Documents

Uploading Documents


Expand
titleNotifications

E-mail Parsing

Configuring Mailbox

Configuring Notification Parser

Configuring Notification Templates

Configuring SMS Gateway

Configuring Voice Call Gateway

Configuring Bulletins

Configuring Alerts

Adding Master Configuration

Configuring Conference Call

Configuring Push Notifications


Expand
titleCompliance

Configuring Compliance Profiles

Allocating Compliance Profiles

Agent Contact Information

Viewing Modifying Profile Configuration


Expand
titleProductivity

Configuring Skills Gen

Configuring Skill Category

Configuring Core Competency

Adding Holidays

Expand
titleShift Management

Configuring Shifts

Allocating Shifts

Viewing Shift Roster Gen


Expand
titleEscalations

Configuring Auto Escalations

Configuring Manual Escalations



Expand
titleLicense

License Usage

License Acceptance

License Monitoring

Allocating Concurrent License


Expand
titleGDPR

GDPR

Configuring GDPR

Guide Me


Expand
titlePassword Management

Password Management

Configuring Administrator

Configuring Security Questions

Mapping Security Questions

Configuring Keyword Message

Managing User Account

Configuring Password Expiry

Status Details Report

User Registration Details Report

Configuring Password Expiry

Password E-mail Audit Log

Creating AD Property



Digi accordionexpand
titleReports and Dashboards

Viewing Reports

Creating New BI Report

Creating New BI Dashboard

Discovery Scan Error Report

Summit Audit Log for Login Accounts

SUMMIT Configuration Audit Report

Survey Report

License Trend Report

GDPR Status Report


Digi accordionexpand
titleOthers

Tenant Department Customer

Configuring Auto Escalation for Incident By SLA

Configuring Auto Escalation for Incident By Time

Configuring Auto Escalation for SR by Time

Configuring Auto Escalation for SR by SLA

Configuring Mailbox

Proxy View

Configuring Vendor MIBs

Summit Audit Log for Login Accounts Gen

Scripting



Scroll export button
scopecurrent
template-idc9a14909-8f27-452d-bca0-164bee1a9265
captionDownload this Page
add-onScroll PDF Exporter

Based on the Discovery configuration, the Servers, Networks, Links, Printers, and Laptop devices in the organization can be identified. The discovered devices are saved in their respective modules. You can configure multiple subnets for a job and configure protocols, such as WMI, SNMP, SSH and Telnet to discover devices in the given subnet range. You can configure the order of execution of the protocols. After the devices are discovered, you can view the listed devices in the Scanned Result section and the devices that are not listed can be viewed in the Errors Result section.

Prerequisites

Requirements for Network Connectivity

Purpose

Source

Destination

Outbound

E-mail Communications

Summit Web

Exchange

POP [110] / 465

Database Communications

Summit Web

Summit DB

SQL [1433]

AD Authentication

Summit Proxy

Active Directory

LDAPS[636] or LDAP[389]

Domain Name Service

Summit Proxy

Domain Name Server

DNS[53]

Availability Management

Summit Proxy

Network Device

SNMP Polling [161]

Availability Management

Summit Proxy

Windows Server

WMI [135-139]

Availability Management

Summit Proxy

Linux/Unix/Mac

SSH [22]

Discovery Common

Summit Proxy

All

PING [ICMP]

Discovery Common

Summit Proxy

Network Device

SNMP Polling [161]

Discovery Common

Summit Proxy

Windows Server

WMI [135-139]

Discovery Common

Summit Proxy

Linux/Unix/Mac

SSH [22]

Windows Servers

Requirement

Description

Common requirements

  • An administrative service account:
    • Member of local Administrators group (either domain or local)
    • Stored in monitoring accounts (customer can manage the password)
  • Bidirectional Ping [ICMP]:
    • Used for the latency graph up/down alerts

Agent Based (Preferred Option)

  • Simple low footprint agent
  • Only requires http/s from target to proxy
  • Supports other functions - Asset/Proxy

Windows Management Instrumentation (Alternative Option)

  • WMI requires Ports 135-139 from Proxy to Target
    • It depends on the port mapper configuration.
    • Fixed or dynamic ports for return communications.
      • Dynamic ports will cause more effort in secure networks.

Linux Servers

Requirement

Description

Common requirements

  • An administrative service account:
    • Read only but able to run privileged commands.
  • Bidirectional Ping [ICMP]
    • Used for the latency graph up/down alerts.

Agent Based (Preferred Option)

Agent requires http/s from target to proxy.

Secure Shell (SSH) (Alternative Option)

SSH requires Ports 22from Proxy to Target server.

Network and Other Requirements

Requirement

Description

Account requirements

  • Domain Administrator credential ID is required for the Auto Discovery functionality of the Asset Management.
  • SSH credentials with port number shall be made available for Linux/Unix device discovery.
  • SNMP V2c community read only string or V3 account, password, authorization and privacy information.
  • Account Names and Passwords shall be stored in the Monitoring Account UI, where the passwords can be managed independent of the implementation staff.

Ports that are to be opened

All devices that require Ping:

  • ICMP is required from the Proxy to all the targeted systems
  • ICMP is required from the Summit server to the Proxy

Proxy to Summit server (in Azure cloud)

  • Proxy to Web server, port HTTPS [443] is required for traversing the internet.

Windows servers to proxy (with agents installed)

  • Port 443 https agent to proxy only
  • If required, port 80 can be configured.

Linux servers to Proxy (no agent is installed)

  • SSH port 22 linux server to proxy

Linux servers to Proxy with agents installed)

  • Port 443 https agent to proxy

Network devices

  • SNMPV2c or v3 port 161 proxy to network device.

Recommended browser

Internet Explorer 10x and above


To configure Discovery:

  1. Select Admin > Advanced > Discovery & Monitoring > Discovery.
  2. On the DISCOVERY page, click ADD NEW on the ACTIONS panel.
  3. Select the Tenant and fill in the required details. For more information about the fields and icons on the DISCOVERY page, see Field Description 21476599.
  4. Click SUBMIT. The Discovery details are configured.

    DISCOVERY page
    Figure: DISCOVERY page

Anchor
Field Description
Field Description
Field Description

The following table describes the fields on the DISCOVERY page:

Field

Description

DETAILS

Monitoring Source

Lists the configured monitoring source types as Summit Server and Summit Proxy.

  • Summit Server: It refers to the machine, where SUMMIT Suite is installed using the SUMMIT Installer. It is also referred to as SUMMIT Centralized Server. Select this option to perform the discovery from this centralized server.
  • Proxy Server: It refers to the machine configured at a client location for sending monitored data of the client machines to the SUMMIT Server. Select this option to execute the discovery from the Proxy Server.

Discovery From (Proxy)

If you select Proxy Server in the Monitoring Source field, the Discovery From (Proxy) field is displayed.
Select the Proxy device from the list to discover devices from the selected proxy server.

Job Name

Type in the job name that will perform the Common Discovery.

Subnet

Type in the subnet numbers.

Protocols

The following protocols are available to select:

  • SNMP: The Simple Network Management Protocol (SNMP) is a set of protocols for managing and monitoring complex networks. if SNMP check box is selected, then SNMP Version has to be specified. Select the SNMP version from the list:
    • SNMPV1
    • SNMPV2c
    • SNMPV3

Note: SNMP V3 requires an authentication and login credentials for managing a device on the network. SNMP V3 provides important security features such as confidentiality to prevent snooping by an unauthorized source, message integrity to avoid data tampering, and authentication to validate the source.
If SNMPV3 is selected, the AuthType field is displayed. Select the Authentication

Type from the list:

      • AuthNoPriv: If selected you have to specify the authentication details. You have to select the SNMP user and authentication mode( SHA or MD5)
      • AuthPriv: If selected you have to specify the SNMP user, authentication mode, privilege password, and privilege protocol.
      • NoAuthNoPriv: If selected authentication and privilege is not applicable. You have to select the SNMP user from the list.
  • You can provide ping time out for each protocol. Select any one monitoring protocol option. Type in the respective protocol details, as required.WMI: The Windows Management Interface (WMI) is a set of extensions to the Windows Driver Model that provides an operating system interface through which instrumented components provide information and notification.
    Note: The WMI protocol is used to mainly monitor the event status that is configured in the server.
  • SSH: SSH Is used in case of other than windows OS. The Secure Shell (SSH) is a Unix Shell program for logging into, and executing commands on, a remote computer. The protocol provides secure encrypted communications between two untrusted hosts over an insecure network.
  • Telnet: Telnet offers users the capability of running programs remotely and facilitates remote administration. Telnet is available for all operating systems and eases integration in varied networking environments.

Discovery Scripts

Lists the configured scripts. Select the script from the list to monitor the parameters defined in the scripts through discovery and click the ADD TO LIST button to add the selected script for execution.

Select the script from the list and click the DELETE button to remove the script from the ADD TO LIST section.

Discovery SNMP

Lists the configured SNMP. Select the SNMP from the list to monitor the parameters  through discovery and click the ADD TO LIST button to add the selected SNMP for execution.

Select the SNMP from the list and click the DELETE button to remove the SNMP from the ADD TO LIST section.

Note: The Discovery Scripts and Discovery SNMP fields are displayed based on the selected Protocols. If a Script or an SNMP MIB is configured for the selected protocol then Discovery Script or Discovery SNMP fields are displayed respectively.

Ping Protocol

The Ping Protocols are used for diagnostics (like Ping), error messages, moving data between applications, and so on. Select the Ping Protocol from the drop-down list.

Add For Monitoring

If selected, you can assign a default template to the discovered servers.

Default Configuration Template

Select a default configuration template from the drop-down list.

Set Time For

In this section, you can specify the ping retry and ping time out.

Protocol Execution Order

Allows to specify the order of protocols if more than one protocols are selected. You can move the protocol up and down to specify the order.

ADD TO LIST

Click the ADD TO LIST button to execute the protocols. All the selected protocols are added in the table below the button.

Delete

Allows you to delete the protocol from the table. Select the check box for the protocol you want to delete and click the DELETE button.

Notify Once Complete

If selected, after completing the discovery task an e-mail notification is sent to the Administrator.

Execute Job

Select Now to execute the job now. If you select Later to run the job later. Specify the values for the following fields:

  • Run As User: Type in the user name.
  • Password: Type in the password to run the job.
  • Re-enter Password: Re-type the password.
  • Start Date: Specify the date when the job should be started.
  • End Date: Specify the date when the job should end.
  • Repeat Job: If you select Repeat, you need to specify the frequency of repeating the job.

Note: These fields will vary based on the selected option.

ACTIONS

This section explains all the icons displayed on the ACTIONS panel of DISCOVERY page.

SHOW LIST

Click SHOW LIST to display the LIST table showing all the configured discovery values for the selected Tenant.


Figure: DISCOVERY page: List of Common Discovery configurations

  • Click View Jobs icon to view the job details. The Green Tick in the Status column indicates that the job was successful.
  • Click the Delete icon to delete the job from the list. Click Re-run icon to re-run the job.
  • Click ADD NEW on the ACTIONS panel to configure a new Common Discovery value.

On the Job Details pop-up, you can view the scan details,device details discovered in the specified sub net range, and error details. If the devices present within the given sub-net range are not discovered, the reason for the error is displayed.

  • Click the Serial Number hyperlink to view the device details.
  • Click the Host Name hyperlink to view the Network Device Interface Details.
Note
titleNote:

The Serial Number hyperlink is not displayed for Network devices.


JOB DETAILS pop-up page
Figure: JOB DETAILS pop-up page

You can also view additional parameters, such as Base Board, Bios, Ram details, CD ROM details, and so on for Non-Wintel systems, such as Ubuntu and linux.
Image Removed
Image Added
Figure: JOB DETAILS: Additional parameters

On the Device Details pop-up, you can view the list of parameters and value of the corresponding parameter. You can also view the parameter values for the selected discovery script and discovery SNMP. Based on the selected script, you can view the parameter values under the SCRIPT BASED DISCOVERY VALUE section. Similarly, you can view the parameter values of the selected SNMPs under the SNMP BASED DISCOVERY VALUE section. The parameter values are categorized into single value output, multi-value output and free form text. Based on the parameter value type, the discovered device details are categorized and displayed in each section.

Filters

Click the Filters icon to specify a particular filter criteria to display Common Discovery values. The FILTERS pop-up page is displayed. Select the filter criteria and click SUBMIT.

FILTERS pop-up page
Figure: FILTERS pop-up page


Scroll ignore
scroll-pdftrue
scroll-officetrue
scroll-chmtrue
scroll-docbooktrue
scroll-eclipsehelptrue
scroll-epubtrue
scroll-htmltrue

truenoneRelease Noteshttp://summitconfluence.symphonysummit.com:8090/display/PD/SUMMIT+Release+NotestruenoneInstallation Guide http://summitconfluence.symphonysummit.com:8090/display/PD/Installation+GuidetruenoneOther Documents http://summitconfluence.symphonysummit.com:8090/display/PD/Other+Documents