NetMRI collects large quantities of low-level device data that can be viewed at any time. During troubleshooting, experienced admins can use low-level device information to help solve problems. The tool for viewing any device's diverse array of information is called the Device Viewer.
...
- VRF Name –The listed name of the local interface's VRF network, if applicable.
- Neighbor VRF Name –The listed name of the neighboring interface's VRF, if applicable.
- Neighbor Network View –The listed name of the neighboring device's network view, if the device is in a different network view.
- Network View – The network view to which the device belongs.
- Root Bridge Address, which is the MAC address ID of the root bridge in the spanning tree;
- Interface MAC and Neighbor MAC, which are MAC addresses of the listed local and neighboring interfaces;
- Neighbor Type, typically Switch or Switch-Router in NetMRI;
- Device Assurance, which is an optional CiscCisco
o Spanning Spanning Tree feature to help prevent neighboring switches from malfunctioning and sending invalid frames, and engaging in what is otherwise known as a forwarding loop. The associated feature is called Bridge Assurance, and it runs only in RSTP or MST-based switching networks. (Search for Optional STP Features on the Cisco Web site for more information.)Anchor bookmark442 bookmark442 - Ifindex, the local interface index value into the SNMP table (ifTable);
- Interface Type, typically appears as ethernet-csmacd on switched-Ethernet networks;
- Neighbor Location, a plain-language notation of the physical location of the device associated with the neighboring interface;
- Neighbor ifindex, the index value into the SNMP table (ifTable) that the L2 neighbor is associated with.
...
- Interface – Lists the interface for the device. As an example, for Cisco devices you will typically see interfaces such as
Do0
fordot11radio 0
. This item is also a link to the Interface Viewer. - Auth Enabled – Shows whether authentication is required in the authentication configuration group. This field will show a value of Yes or No.
- EAP Required – Indicates whether the access point requires the Extensible Authentication Protocol to provide dynamic WEP keys to wireless devices. Will show a value of Yes or No.
- EAP Method – If enabled, possible EAP values include Open or Shared Key authentication.
- MAC Auth Required – Indicates whether the AP uses MAC Address authentication, using the wireless client's MAC address to verify with an authentication server whether the MAC is allowed on the network. Will show a value of Yes or No.
- MAC Auth Method – If enabled, this indicates whether EAP authentication is required for MAC address authentication or if a MAC address list is being used. An access point configured for EAP authentication forces all client devices that associate to it, to perform EAP authentication.
- Default VLAN – Cisco Aironet wireless access points use three VLANs: VLAN 2, VLAN 20 and VLAN 30. One is set as the 'native' VLAN, one as the SSID administrative VLAN, and one as the SSID guest VLAN. The value shown here is the discovered listing for the default native VLAN on the radio interface.
- Auth Algorithm – The discovered SSID authentication algorithm that is configured for each settings group.
Anchor | ||||
---|---|---|---|---|
|
Anchor | ||||
---|---|---|---|---|
|
Anchor | ||||
---|---|---|---|---|
|
...
Device
Anchor | ||||
---|---|---|---|---|
|
...
Note: After a device is discovered by NetMRI, its detected Name, Device Type (Switch, Router, Switch-Router, etc...) or its management IP address can be edited by hand in this section. Doing so will remove the device from auto-discovery. To re-enable auto-discovery for that device, go to the Network Explorer–>Discovery page and delete the device from the table. NetMRI will then re-discover the device after its defined time period between Discovery passes elapses.
...
- SNMP Collection (whether SNMP collection is enabled or disabled);
- Port Scanning (whether TCP/UDP port scanning is enabled or disabled);
- Finger Printing (whether finger printing is enabled or disabled);
- NetBIOS Scanning (whether NetBIOS Name scanning is enabled or disabled);
- ARP Cache Refresh (whether ARP cache refresh is enabled or disabled);
- Config Collection (whether configuration file collection is enabled or disabled);
- CCS Collection (whether CCS scripting data collection is enabled or disabled);
- Vendor Default Collection (whether vendor default SNMP credentials collection is enabled or disabled);
- Analysis (whether the device allows analysis functions from NetMRI);
- Config Change (whether configuration file editing is enabled or disabled);
- Switch Port Mgmt (whether Switch Port Manager is enabled or disabled for the device);
- Privileged Polling (whether CLI polling in privileged exec (enable) mode is enabled or disabled for the device).
In all cases, a state of N/A indicates either the device has not been fully discovered and cannot currently support the feature, or the feature does not apply to the device.
...
- You can disable SNMP data collection if a specific device has a memory leak in its SNMP process, or if you don't need detailed information about the device. If disabled, existing network data (if any) remains available for analysis and reporting, and no additional monitoring data is added until this option is enabled.
- If SNMP Status is enabled for a device, SNMP collection will also be determined by collection settings for groups and for the entire network.
To use SNMP debugging as a troubleshooting aid, select Enable for SNMP Debug.
To enable or disable the option CLI polling in privileged mode (i.e. Enable mode) for this device in particular, select the necessary option for Privileged Polling. This setting overrides the device group's CLI polling in privileged mode setting. You can also specify to use the Group Default setting here.
To show or hide passwords: In the Show Passwords field, select Yes (to show) or No (to obscure).
...