Document toolboxDocument toolbox

Configuration Collection Settings

The Collection and Groups feature set also specifies the protocols allowed for configuration collection. You specify the Collectors of network data for NetMRI through the Config Management section on the Global page (Settings icon > Setup > Collection and Groups > Global > Config Management).

Note

Disabling the Config Collection checkbox will disable configuration data collection for the current NetMRI appliance.

The protocols are listed as checkboxes under Config Management:

  • Config Collection: If enabled, the current NetMRI virtual is able to collect configuration data from network devices using enabled protocols.
  • Config Locked: Devices with collected information that show changes during subsequent config collections can be reported as showing "Unauthorized Changes".
  • Use Telnet Protocol: NetMRI opens Telnet terminal sessions with devices that support this option and reads the configurations. Individual devices can make use of Telnet login credentials.
  • Use SSH Protocol: NetMRI opens SSH terminal sessions with devices that support this option and reads the configurations. Individual devices can make use of SSH login credentials.
  • Use HTTP Protocol: NetMRI opens HTTP browser sessions with devices that support this option and reads the configurations. Individual devices can make use of HTTP login credentials.
  • Use Vendor Default Credentials: Enables NetMRI to use its library of vendor-default credentials as part of the process of collecting configuration data. For more information, see Adding and Editing Device Credentials.
  • Script Execution: If enabled, Configuration Command Scripts or Perl scripts can be executed by NetMRI users with the correct privileges.
  • Vendor Default Credential Collection: If enabled, NetMRI will automatically check for default vendor credentials at the interval specified in Frequency (Daily or Weekly). Checking for vendor default credentials ensures that the network meets compliance standards.

For more information about configuration collection and related operations, see Configuration Management.