Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Devices: The broadest information category, includes five distinct subcategories to allow for more-specific exploration: Infrastructure Devices, Device Components, Connected End Hosts (client systems connected to access ports on switches, for example), Connected IP Phones, and All Devices. For more information, see the Viewing Devices topic.
  • Virtual Devices: All network infrastructure devices discovered by NetMRI that possess virtualization capabilities. Each device in this category hosts one or more virtual device contexts, which are virtual machine-based switches, firewalls, and routers housed by each virtual host. For more information, see see the Viewing Virtual Device Contexts topic.
  • Interfaces: A listing of all network interfaces, divided into four functional categories: Interface Config, Unused Down Ports, Unused Up Ports, and Recently Changed Ports. For more information, see the Viewing Network Interfaces topic.
  • OSs: Counts of operating systems and OS versions from all devices discovered and cataloged by NetMRI. For more information, see see the Viewing Network Operating Systems Systems topic.
  • Models: Counts of all hardware models discovered and cataloged by NetMRI. For more information, see Viewing Network Device Models Viewing Network Device Models topic.

The Inventory tab (Network Explorer –> Inventory tab) provides basic information about four key categories of network elements managed by NetMRI: Devices, interfaces, operating systems, and device models discovered in the network. From here, you drill down to features such as the Device Viewer to inspect details about individual devices and their current states.

...

Each individual virtual device context appears in the Device Viewer, in the Network Explorer –> Inventory page, and in other locations of the NetMRI UI. NetMRI treats virtual device contexts identically to conventional routers, switches and firewall appliances, including the ability to send commands, schedule and execute jobs, display running configurations, view change histories and issues reported from the virtual device, apply compliance policies, run traces and SNMP walks, and many other operations.

...