The inventory provides a list overview of sites, devices, modules, interfaces, and users discovered within the network.
The site inventory provides an overview of discovered sites, the number of devices and users present at the site, and enables the generation of site-specific reports and diagrams. Sites are automatically calculated based on the administrative domain boundaries, such as carrier networks and other unmanaged infrastructure. A single, unmanaged traceroute hop is not considered a site boundary, so unmanaged infrastructure is reconstructed from the probes. The specific method of site boundary calculation can be changed in the settings.
The site inventory also enables the renaming of the site. To rename the site, select the site from the list and then click on the “Rename Site” button in the pop-up menu above the table.
Figure 3 : Renaming the site
In the popup box, enter the desired site name and click “Save”.
An unknown site is either a collection of isolated devices or when a device forms a single-device site.
The device inventory represents all logical managed network infrastructure devices that have been discovered and analyzed. Each entry provides the following information:
Modules and Part Numbers
The part numbers inventory provides information about every identifiable module through device inventories.
The operating system versions inventory provides an overview of the unique operating systems used in the network and their variation.
The interface inventory provides information about every unique network interface discovered and includes information such as state, description, speed, duplex, and media type.
The hosts' inventory provides information about every discovered host and user utilizing network infrastructure. A host is any unique IP or MAC address, or an IP/MAC tuple, that is not part of the network infrastructure. Following rules may prevent the IP addresses from the ARP to be included in the Hosts' inventory:
- There can’t be any route pointing to that interface
- No CDP/LLDP information should be coming from that IP
- The MAC shouldn’t be in the OUI flagged as ‘Enabled for Discovery’
End of Life Milestones
EoX reports provide an overview of the announced end-of-life milestones. Network infrastructure vendors use end-of-life milestones to communicate stages of the product life cycle, allowing sufficient time to migrate to next-generation products.