Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »


Based on the Discovery configuration, the Servers, Networks, Links, Printers, and Laptop devices in the organization can be identified. The discovered devices are saved in their respective modules. You can configure multiple subnets for a job and configure protocols, such as WMI, SNMP, SSH and Telnet to discover devices in the given subnet range. You can configure the order of execution of the protocols. After the devices are discovered, you can view the listed devices in the Scanned Result section and the devices that are not listed can be viewed in the Errors Result section.

Prerequisites

Requirements for Network Connectivity

Purpose

Source

Destination

Outbound

E-mail Communications

Summit Web

Exchange

POP [110] / 465

Database Communications

Summit Web

Summit DB

SQL [1433]

AD Authentication

Summit Proxy

Active Directory

LDAPS[636] or LDAP[389]

Domain Name Service

Summit Proxy

Domain Name Server

DNS[53]

Availability Management

Summit Proxy

Network Device

SNMP Polling [161]

Availability Management

Summit Proxy

Windows Server

WMI [135-139]

Availability Management

Summit Proxy

Linux/Unix/Mac

SSH [22]

Discovery Common

Summit Proxy

All

PING [ICMP]

Discovery Common

Summit Proxy

Network Device

SNMP Polling [161]

Discovery Common

Summit Proxy

Windows Server

WMI [135-139]

Discovery Common

Summit Proxy

Linux/Unix/Mac

SSH [22]

Windows Servers

Requirement

Description

Common requirements

  • An administrative service account:
    • Member of local Administrators group (either domain or local)
    • Stored in monitoring accounts (customer can manage the password)
  • Bidirectional Ping [ICMP]:
    • Used for the latency graph up/down alerts

Agent Based (Preferred Option)

  • Simple low footprint agent
  • Only requires http/s from target to proxy
  • Supports other functions - Asset/Proxy

Windows Management Instrumentation (Alternative Option)

  • WMI requires Ports 135-139 from Proxy to Target
    • It depends on the port mapper configuration.
    • Fixed or dynamic ports for return communications.
      • Dynamic ports will cause more effort in secure networks.

Linux Servers

Requirement

Description

Common requirements

  • An administrative service account:
    • Read only but able to run privileged commands.
  • Bidirectional Ping [ICMP]
    • Used for the latency graph up/down alerts.

Agent Based (Preferred Option)

Agent requires http/s from target to proxy.

Secure Shell (SSH) (Alternative Option)

SSH requires Ports 22from Proxy to Target server.

Network and Other Requirements

Requirement

Description

Account requirements

  • Domain Administrator credential ID is required for the Auto Discovery functionality of the Asset Management.
  • SSH credentials with port number shall be made available for Linux/Unix device discovery.
  • SNMP V2c community read only string or V3 account, password, authorization and privacy information.
  • Account Names and Passwords shall be stored in the Monitoring Account UI, where the passwords can be managed independent of the implementation staff.

Ports that are to be opened

All devices that require Ping:

  • ICMP is required from the Proxy to all the targeted systems
  • ICMP is required from the Summit server to the Proxy

Proxy to Summit server (in Azure cloud)

  • Proxy to Web server, port HTTPS [443] is required for traversing the internet.

Windows servers to proxy (with agents installed)

  • Port 443 https agent to proxy only
  • If required, port 80 can be configured.

Linux servers to Proxy (no agent is installed)

  • SSH port 22 linux server to proxy

Linux servers to Proxy with agents installed)

  • Port 443 https agent to proxy

Network devices

  • SNMPV2c or v3 port 161 proxy to network device.

Recommended browser

Internet Explorer 10x and above


To configure Discovery:

  1. Select Admin > Advanced > Discovery & Monitoring > Discovery.
  2. On the DISCOVERY page, click ADD NEW on the ACTIONS panel.
  3. Select the Tenant and fill in the required details. For more information about the fields and icons on the DISCOVERY page, see Field Description.
  4. Click SUBMIT. The Discovery details are configured.

    DISCOVERY page
    Figure: DISCOVERY page

Field Description

The following table describes the fields on the DISCOVERY page:

Field

Description

DETAILS

Monitoring Source

Lists the configured monitoring source types as Summit Server and Summit Proxy.

  • Summit Server: It refers to the machine, where SUMMIT Suite is installed using the SUMMIT Installer. It is also referred to as SUMMIT Centralized Server. Select this option to perform the discovery from this centralized server.
  • Proxy Server: It refers to the machine configured at a client location for sending monitored data of the client machines to the SUMMIT Server. Select this option to execute the discovery from the Proxy Server.

Discovery From (Proxy)

If you select Proxy Server in the Monitoring Source field, the Discovery From (Proxy) field is displayed.
Select the Proxy device from the list to discover devices from the selected proxy server.

Job Name

Type in the job name that will perform the Common Discovery.

Subnet

Type in the subnet numbers.

Protocols

The following protocols are available to select:

  • SNMP: The Simple Network Management Protocol (SNMP) is a set of protocols for managing and monitoring complex networks. if SNMP check box is selected, then SNMP Version has to be specified. Select the SNMP version from the list:
    • SNMPV1
    • SNMPV2c
    • SNMPV3

Note: SNMP V3 requires an authentication and login credentials for managing a device on the network. SNMP V3 provides important security features such as confidentiality to prevent snooping by an unauthorized source, message integrity to avoid data tampering, and authentication to validate the source.
If SNMPV3 is selected, the AuthType field is displayed. Select the Authentication

Type from the list:

      • AuthNoPriv: If selected you have to specify the authentication details. You have to select the SNMP user and authentication mode( SHA or MD5)
      • AuthPriv: If selected you have to specify the SNMP user, authentication mode, privilege password, and privilege protocol.
      • NoAuthNoPriv: If selected authentication and privilege is not applicable. You have to select the SNMP user from the list.
  • You can provide ping time out for each protocol. Select any one monitoring protocol option. Type in the respective protocol details, as required.WMI: The Windows Management Interface (WMI) is a set of extensions to the Windows Driver Model that provides an operating system interface through which instrumented components provide information and notification.
    Note: The WMI protocol is used to mainly monitor the event status that is configured in the server.
  • SSH: SSH Is used in case of other than windows OS. The Secure Shell (SSH) is a Unix Shell program for logging into, and executing commands on, a remote computer. The protocol provides secure encrypted communications between two untrusted hosts over an insecure network.
  • Telnet: Telnet offers users the capability of running programs remotely and facilitates remote administration. Telnet is available for all operating systems and eases integration in varied networking environments.

Discovery Scripts

Lists the configured scripts. Select the script from the list to monitor the parameters defined in the scripts through discovery and click the ADD TO LIST button to add the selected script for execution.

Select the script from the list and click the DELETE button to remove the script from the ADD TO LIST section.

Discovery SNMP

Lists the configured SNMP. Select the SNMP from the list to monitor the parameters  through discovery and click the ADD TO LIST button to add the selected SNMP for execution.

Select the SNMP from the list and click the DELETE button to remove the SNMP from the ADD TO LIST section.

Note: The Discovery Scripts and Discovery SNMP fields are displayed based on the selected Protocols. If a Script or an SNMP MIB is configured for the selected protocol then Discovery Script or Discovery SNMP fields are displayed respectively.

Ping Protocol

The Ping Protocols are used for diagnostics (like Ping), error messages, moving data between applications, and so on. Select the Ping Protocol from the drop-down list.

Add For Monitoring

If selected, you can assign a default template to the discovered servers.

Default Configuration Template

Select a default configuration template from the drop-down list.

Set Time For

In this section, you can specify the ping retry and ping time out.

Protocol Execution Order

Allows to specify the order of protocols if more than one protocols are selected. You can move the protocol up and down to specify the order.

ADD TO LIST

Click the ADD TO LIST button to execute the protocols. All the selected protocols are added in the table below the button.

Delete

Allows you to delete the protocol from the table. Select the check box for the protocol you want to delete and click the DELETE button.

Notify Once Complete

If selected, after completing the discovery task an e-mail notification is sent to the Administrator.

Execute Job

Select Now to execute the job now. If you select Later to run the job later. Specify the values for the following fields:

  • Run As User: Type in the user name.
  • Password: Type in the password to run the job.
  • Re-enter Password: Re-type the password.
  • Start Date: Specify the date when the job should be started.
  • End Date: Specify the date when the job should end.
  • Repeat Job: If you select Repeat, you need to specify the frequency of repeating the job.

Note: These fields will vary based on the selected option.

ACTIONS

This section explains all the icons displayed on the ACTIONS panel of DISCOVERY page.

SHOW LIST

Click SHOW LIST to display the LIST table showing all the configured discovery values for the selected Tenant.


Figure: DISCOVERY page: List of Common Discovery configurations

  • Click View Jobs icon to view the job details. The Green Tick in the Status column indicates that the job was successful.
  • Click the Delete icon to delete the job from the list. Click Re-run icon to re-run the job.
  • Click ADD NEW on the ACTIONS panel to configure a new Common Discovery value.

On the Job Details pop-up, you can view the scan details,device details discovered in the specified sub net range, and error details. If the devices present within the given sub-net range are not discovered, the reason for the error is displayed.

  • Click the Serial Number hyperlink to view the device details.
  • Click the Host Name hyperlink to view the Network Device Interface Details.

Note:

The Serial Number hyperlink is not displayed for Network devices.


JOB DETAILS pop-up page
Figure: JOB DETAILS pop-up page

You can also view additional parameters, such as Base Board, Bios, Ram details, CD ROM details, and so on for Non-Wintel systems, such as Ubuntu and linux.


Figure: JOB DETAILS: Additional parameters

On the Device Details pop-up, you can view the list of parameters and value of the corresponding parameter. You can also view the parameter values for the selected discovery script and discovery SNMP. Based on the selected script, you can view the parameter values under the SCRIPT BASED DISCOVERY VALUE section. Similarly, you can view the parameter values of the selected SNMPs under the SNMP BASED DISCOVERY VALUE section. The parameter values are categorized into single value output, multi-value output and free form text. Based on the parameter value type, the discovered device details are categorized and displayed in each section.

Filters

Click the Filters icon to specify a particular filter criteria to display Common Discovery values. The FILTERS pop-up page is displayed. Select the filter criteria and click SUBMIT.

FILTERS pop-up page
Figure: FILTERS pop-up page



  • No labels