Network discovery
- UpdatedAug 1, 2024
- 7 minutes to read
- Xanadu
- Discovery
Network Discovery discovers the internal IP networks and subnets within your organization.
How network discovery works
Discovery uses the information it gathers to update routers and Layer 3 switches in the CMDB. A single MID Server that begins its scan on a configurable list of starting (or seed) routers performs network Discovery. Typically, the starting routers are the default routers used by all the MID Server host machines in the network, but can be any designated routers. The MID Server uses the router tables on the starting routers to discover other routers in the network. The MID Server then spreads out through the network, using router tables it finds to discover other routers. It continues until all the routers and switches have been explored.
After running Network Discovery, convert the IP networks it finds into IP address Range Sets that you use in Discovery schedules to discover configuration items (CI).
Configure SNMP credentials or (optionally) SSH credentials. Port 161 must be open for SNMP access and port 22 for SSH access.
Network Discovery properties
| Field | Description |
|---|---|
| glide.discovery.bgp_router_disable | BGP router exploration disable: Disables running the SNMP – Routing probe or pattern when discovering a router running the BGP protocol. Normally such exploration IS inactive because of the huge size of BGP routing tables, and because generally such routers are only operating at the edge of large networks where further network discovery would be irrelevant. This value could be set to false if your organization only uses BGP routers as edge routers between relatively small networks (such as between buildings on a single campus). If you must populate the [discovery_device_neighbors] table during horizontal layer 2 discovery of the bgp-enabled devices, set the BGP router exploration disable property to No. Notice that enabling this property can cause performance issues including out-of-memory issues on the MID Server.
|
| glide.discovery.debug.network_discovery | Network discovery debugging: Enables extensive logging of all Network Discovery activities on the instance.
|
| glide.discovery.discoverable.network.max.netmask.bits | Maximum netmask size for discoverable networks (bits): The maximum number of bits in a regular netmask for networks that are discovered by Network Discovery. A regular netmask is a netmask that can be expressed in binary as a string of ones followed by a string of zeroes. For example, 255.255.255.0 is regular and 255.255.255.64 is irregular. Regular networks are commonly expressed like: 10.0.0.0/24, which means a network address of 10.0.0.0 with a netmask of 255.255.255.0. Larger bit numbers mean networks with smaller numbers of addresses in them. For example, the network 10.128.0.128/30 has four addresses in it: one network address (10.128.0.128), one broadcast address (10.128.0.131), and two usable addresses (10.128.0.129 and 10.128.0.130). Small networks are commonly configured in network gear to provide loopback addresses or networks used strictly by point-to-point connections. Since these sorts of networks generally don't need to be discovered by Network Discovery, it would be useful to filter them out. By setting this property to a value of 1 through 32, you can limit the sizes of regular networks that are discovered. Setting it to any other value causes all networks to be discovered. Irregular networks are always discovered. The default value is 28, which means that regular networks with 8 or fewer addresses cannot be discovered.
|
| glide.discovery.network_owner_method | Network router selection method: This property controls the method used to decide (during Network Discovery) which router should be selected as the router to be associated with a given IP Network. The possible values are:
|
| glide.discovery.physical_interface_types | Physical interface types: A comma-separated list of interface types that are considered physical for the purposes of network discovery. If a router (or device capable of routing) has an interface of
this type, the networks connected to that interface are considered locally connected to that device. The default interface types include Ethernet, 802.11, and Token Ring types. Interface type numbers are defined in
the SNMP MIB-2, specifically in OID 1.3.6.1.2.1.2.2.1.3.
|
| glide.discovery.switch_interface_types | Switch interface types: A comma-separated list of interface types that are considered. Interface type numbers are defined in the SNMP MIB-2, specifically in OID 1.3.6.1.2.1.2.2.1.3. Devices with any interface
types that do NOT appear in this list are classified as routers, when they have routing. A complete list of the interface type numbers may be found on the IANA web site, in the section "ifType definitions".
|
Learn
Run network Discovery
Configure network Discovery from a Discovery schedule.
Before you begin
Configure SNMP credentials or (optionally) SSH credentials. Port 161 must be open for SNMP access and port 22 for SSH access.
Role required: none
Procedure
Convert IP networks into Discovery range sets
After you conduct a network Discovery, you must convert the IP networks that were found into range sets for use in discovering other devices.
Before you begin
Procedure
What to do next
Add a Discovery range set to a Discovery schedule
After creating discovery range sets from a network discovery, add the sets to a discovery schedule. This process narrows down the range of IP addresses that Shazzam probes can scan. You can also add a behavior.
Before you begin
Procedure