Solarwinds: Network Topology Mapper Administrator Guide
Solarwinds: Network Topology Mapper Administrator Guide
Solarwinds: Network Topology Mapper Administrator Guide
About SolarWinds
SolarWinds, Inc develops and markets an array of network management, monitoring, and
discovery tools to meet the diverse requirements of todays network management and consulting
professionals. SolarWinds products continue to set benchmarks for quality and performance and
have positioned the company as the leader in network management and discovery technology.
The SolarWinds customer base includes over 45 percent of the Fortune 500 and customers from
over 90 countries. Our global business partner distributor network exceeds 100 distributors and
resellers.
Contacting SolarWinds
You can contact SolarWinds in a number of ways, including the following:
Team
Contact Information
[email protected]
www.solarwinds.com
Sales
1.866.530.8100
+353.21.5002900
Technical Support
www.solarwinds.com/support
User Forums
http://thwack.solarwinds.com/
Conventions
The documentation uses consistent conventions to help you identify items throughout the printed
and online library.
Convention
Specifying
Bold
Italics
Fixed font
Straight brackets, as
in [value]
Curly braces, as in
{value}
Logical OR, as in
value1|value2
Contents iii
Contents
About SolarWinds ........................................................................................... iii
Contacting SolarWinds .................................................................................... iii
Conventions .................................................................................................... iii
Chapter 1
FAQ ............................................................................................................... 69
vi Contents
Chapter 1
Monitoring nodes, users, applications, and the different kinds of network traffic,
and addressing issues that impact performance and security are twin daily
challenges. And a good alerting system is the key to efficiently relating
monitoring to management.
Encrypting Maps
Enables stored and exported maps to be encryption protected with a password.
This secures detailed network information contained in maps from being used by
unauthorized persons. NTM uses FIPS-compliant encryption to secure map data
in native NTM map files.
Notes:
You can use maps from earlier versions of NTM but you will be prompted to
change all SNMP v3 credentials which are not using FIPS compliant
algorithms.
"Proxy maps" created in previous versions of NTM and Network Atlas are not
compatible with new version of NTM running in FIPS mode. If you need to
use such older maps, you must disable the FIPS requirement on the
operating system.
Reporting
NTM can generate reports on switch ports, VLANs, subnets, and device
inventory.
VMware Management
MIB2:sysInfo
IF MIB
Cisco MIB
Note: NTM cannot poll the ipRouteTable MIB for Cisco devices running on IOS
release 12.4(13b) and later releases.
After node detail and connectivity data is retrieved from nodes, NTM uses bridge
table information if you chose that option in Discovery Settings.
Chapter 2
Installing NTM
NTM provides a simple, wizard-driven installation. Licensing, hardware and
software requirements are nominal. Typically, it takes less than 30 minutes to
install NTM and discover your network devices and connections.
The following are detailed in this chapter:
Installing NTM
Software
Requirements
Operating System
Languages:
English
German
Japanese
Chinese
Application
Framework
Hardware
CPU Speed
Hard Drive
Space
10 GB
Memory
500 MB
Note: Device discovery and map rendering are CPU intensive. We recommend
installing NTM on the fastest CPU PC available.
The following table describes the requirements for optimal device discovery:
Node Type
Network Device
Windows Device
WMI enabled
Installing NTM
NTM uses a simple wizard driven interface during the installation process.
Note: The you must run the NTM installer from an account on the operating
system that has Administrator privileges.
To install Network Topology Mapper:
Click Finish.
Chapter 3
Scheduling a Discovery
Rescanning a Network
Automatically stored Private and Public credentials are listed under the
Discovery Credentials currently available to use.
Note: For any credentials in Stored Credentials that you want to activate,
select the credential and click the right arrow to move it into Discovery
Credentials. If an active credential by the same name already exists, NTM
prompts you either to save the credential you are activating under another
name or to overwrite the currently active credential. For any active
credentials in Discovery Credentials that you need to deactivate, select the
credential and click the left arrow.
2. If you are not using the default public and private community strings,
select public and click Remove Credential. Repeat this process for the
private string.
These credentials remain in Stored Credentials repository but cannot be
used. To use them again, you would need to select them in the repository
and use the arrow to move them into Discovery Credentials.
g. Click Save.
4. If you need to activate or deactivate a credential, select the credential and
move it with the arrows.
5. If you use SNMP v3, complete the following steps:
a. Click New Credential and select SNMPv3.
b. Enter a unique Name.
c. Enter a User Name.
For Cisco devices, this is defined in the snmp-server users
configuration command.
Note: NTM cannot poll the ipRouteTable MIB for Cisco devices running
on IOS release 12.4(13b) and later releases.
d. Enter the Context. For Cisco devices, this is defined in the snmp-server
group configuration command.
e. Select the Authentication Method. For Cisco devices, this is defined in
the snmp-server user configuration command.
f.
j.
If the test fails, review the device SNMP v3 configurations and ensure
you are using the proper fields.
Click Save.
For any credentials in Stored Credentials that you want to activate, select the
credential and click the right arrow to move it into Discovery Credentials. If an
active credential by the same name already exists, NTM prompts you either
to save the credential you are activating under another name or to overwrite
the currently active credential. For any active credentials in Discovery
Credentials that you need to deactivate, select the credential and click the
left arrow.
Click Save.
Specifying Subnets
Use these steps to discover nodes by the subnet to which they belong.
Caveat: An address range that include more than 2000 nodes takes much longer
(one to two days, for example) to discover than the same number of nodes split
up into multiple smaller ranges. Additionally, with so many nodes on a map, the
user interface and NTM operations may run with noticeable lag.
For example, if you are subnetting with the mask of 255.255.248.0, then the
maximum number of nodes within the subnet will be 8 X 255 = 2040. In discovery
nodes, the software engine creates a lookup table in memory that includes as
many rows as nodes in the defined IP range or subnet. The more rows the more
time the engine must spend in finding its point of reference in the table as it
iterates through the table. Walking a larger lookup table takes significantly more
time than walking smaller tables the cumulatively contain the same number of
arrayed items. So the time it takes the engine to complete its discovery task
directly depends on the number of possible nodes in the specified range or
subnet.
To discover devices by subnets:
1. Click the Subnets tab.
2. If you want to add discovery subnets, click Add a New Subnet.
3. Enter a Subnet Address and a Subnet Mask.
4. To add additional subnets repeat steps 2 and 3.
5. If you have finished specifying your discovery nodes, ranges and
subnets, click Next.
To discover devices by seed device:
1. Click the Subnets tab.
2. Click Add a Seed Device.
3. Enter the IP Address of the seed device, and then click Add.
4. When the discovery engine populates the Subnet dialog, select the subnets
to be removed from discovery, and then click Remove Selected.
5. If you only want to discover these subnets, click Next.
6. If you want to specify other devices by IP address range, or as a freeform set of hostnames and addresses (in either IPv4 or IPv6 networks),
click the IP Ranges or Free-form IPs tab.
7. If you want to create a Do Not Scan list of devices within the subnets
you have defined, click Do-Not-Scan List.
4. If you want to create a Do Not Scan list of devices within the ranges you
have defined, click Do-Not-Scan List.
Scheduling a Discovery
NTM provides controls for scheduling a discovery either once or recurrently. For
scheduled discoveries, NTM must be running in order to apply latest results to
the relevant map(s).
Discovery may take several minutes depending on the discovery IP range and
complexity of device connectivity.
If you want to run the discovery later, select No, dont run now, and
then click Next.
d. Review your selections and click Discover (if you selected to scan now)
or Save (if you selected to scan later).
2. If you want to run a scheduled discovery, select a schedule interval under
Frequency.
a. If you select Daily, then select a time for executing the scan each day.
b. If you select Weekly, then select a day and time for executing the scan
each week.
c. If you select Monthly, then select a day and time for executing the scan
each month.
d. If you select Custom, then define the pattern for recurrently executing
the scan.
3. Select an option under execute immediately.
a. If you want to activate the scheduled discovery now, select Yes, run
this discovery now and then click Next.
b. If you want to activate the scheduled discovery later, select No,
dont run now, and then click Next.
4. Select an option for saving the results of your scan.
a. If you want NTM not to add newly discovered nodes but to remove
nodes from maps that are not found in any scheduled rescans,
select the option: Save results but do not add new nodes to my
maps.
b. If you want NTM to add new nodes to maps based on your filter
settings, select the option: Save results and automatically add new
nodes to my maps.
Clicking Edit Filter lets you select the types of new nodes NTM will add
to your maps.
Note:
Do not use this option if you intend to manually edit a map whose scan
file is setup for automatic updates. Instead, to preserve your manual
edits, use the option: Do not touch my existing maps. Create a new
copy of my topology database and add new nodes to those maps.
c. If you want NTM to copy your existing topology database and add
new nodes to those maps, select the option: Do not touch my
existing maps. Create a new copy of my topology database and add
new nodes to those maps.
Clicking Edit Filter lets you select the types of new nodes NTM will add
to your maps in the copy of the scan.
Note:
Use this option especially if you intend to manually edit a map whose
scan file is setup for automatic updates.
5. If you have Network Performance Manager and you intend to export your
map data to Network Atlas, then select Automatically sync updates to
Network Atlas.
Note: Exporting node data between NTM and Network Atlas requires that
the relevant nodes are managed in NPM.
8. Review your selections and click Discover (if you selected to activate the
scheduled discovery) or Save (if you selected to activate the scheduled
discovery later).
Rescanning a Network
NTM enables you to rescan (rediscover) the network based on the existing
settings. You can also adjust settings and rescan based on the modified settings;
in this case, NTM overwrites the data in the existing scan file.
Notes:
If you are rediscovery your network based on an NTM 1.0 map, then as part
of the results you will see Network Segment nodes added to the existing
map. For more information about Network Segment nodes, see Opening
Maps from Earlier Versions of NTM.
To rescan a network:
1. If the scan file is not already open, open it (File > Open).
2. If you do not need to adjust any settings, simply click Rescan on the
toolbar.
3. If you need to adjust settings, click Discovery Settings at the lower left
and make your changes, as needed, and then click Discover in the Summary
screen.
Note: NTM will overwrite the data in the existing scan file based on the
modified settings. If you do not want to change the data in the existing scan
file, use the Discovery Wizard to create a new scan.
Missing Connections
NTM may be unable to generate connections among discovered nodes for the
following reasons:
Invalid credentials
Use Test at the bottom of the Add Credential resource to verify before
adding or modifying credential.
...
<add key="NtmICMPTimeout" value="5000"/>
<add key="NtmMaxSnmpReplies" value="5"/>
<add key="NtmSnmpTimeout" value="3000"/>
<add key="NtmSnmpRetries" value="0"/>
...
<add key="NtmWmiRetryInterval" value="1000"/>
<add key="NtmWmiRetries" value="3"/>
...
<add key="NTMVIMTimeout" value="3000"/>
...
</appSettings>
Chapter 4
Summarizing Endpoints
NTM generates Network Segment nodes based on the three types of connection
information that it collects and builds:
Based on connections that it discovers for these three connection types, NTM
creates a virtual node that points the way to figuring out how an ambiguously
connected device is positioned on the network.
Example
Lets assume we discover 4 nodes2 via SNMP and 2 via ICMP. The SNMP
nodes are directly connected; the ICMP nodes are indrectly connected as part of
the same subnet. Here is how the map objects appear:
Node 10.199.3.0 is a Network Segment node that indicates the subnet in which
the two discovered ICMP nodes are connected.
Though it generates network segment nodes as part of the scan file for a
discovery, NTM automatically displays network segments on a default mapthe
one created after the Discovery Wizard completes its scanif the total number of
switches and routers the wizard discovers is less than 100. If 100 or more
switches or routers are discovered, NTM omits network segments from the
default map. However, you can always reveal a network segment to which one or
more of your nodes is connected by using the Neighbors feature.
For more information, see Showing and Hiding Neighbors.
Clicking the Neighbors icon inset at the top right on a node, or right-clicking the
node and selecting Add Neighbors, shows all nodes to which the selected node
is connected. In many cases, the neighboring node is a network segment node.
For detailed information about Network Segments, see Opening Maps from
Earlier Versions of NTM.
In discovering your network based on your selections in the Discovery Wizard,
and if there are more than 100 discovered nodes, NTM automatically shows all
switches and routers on a default map (Map1). Use the Neighbors icon on
these network devices to reveal more connections on the default map, as
needed. Before revealing neighbors of device, if you want to know how many
neighbors are currently hidden, hold the mouse over the device to see a
summary that includes Hidden Neighbors.
As you increase the detail on the default map, consider selecting and copying
sections of the map to a new map (File > New Map). This new map, along with
any others you make based on the single scan file, will always appear in its own
tab when you open the relevant scan file.
You can hide neighbors from a map either by undoing the action of revealing
them (Edit > Undo) or simply by deleting them (right-click > Delete node).
Nodes deleted from a map remain in the scan file and can be re-added to the
same map or to any other map at any time.
Summarizing Endpoints
By default, when you drag nodes onto a map, if the total number of endpoints
(servers, virtual machines, printers) is 50 or more, NTM automatically displays
endpoints in lists within an Endpoints window attached to each node.
\
Note: Though NTM automatically displays the Endpoint window when you
manually drag nodes onto a map; it does not do this when displaying the default
map after a new scan.
Use the following procedures to work with endpoints and the Endpoints window.
To manually open the Endpoints window (for all mapped nodes):
Working with Maps 37
The Endpoints window opens on each node with endpoints. See the section
on Understanding how NTM Creates an Endpoints Summary for details on
when NTM can display endpoints.
To manually delete the Endpoints window (for all mapped nodes):
1. Open the relevant scan file (File > Open)
2. If there are multiple maps, select the relevant one.
3. Click Map Layouts.
4. Click Unsummarize All
The Endpoints window close on each node with endpoints. The endpoints
instead appear in the map as connected nodes.
To manually open the Endpoints window (for one mapped node):
1. Select a node in the map.
2. Right-click > Summarize Children.
The Endpoints window opens with a list of nodes connected to the selected
node.
To show node details:
Select and double-click any item in the Endpoints list to show node details.
See the section on Viewing and Editing Nodes and Node Details for additional
information on what that resource shows.
To move a node out of the Endpoints window:
Select and drag the node from the list onto the map.
All other nodes remain in the Endpoints window.
To return a node to the Endpoints window:
Select the node and right-click > Summarize.
The node returns to the list in the Endpoints window.
To delete a node from the Endpoints window:
Select the node and press Delete.
All other nodes remain in the Endpoints window.
38 Working with Maps
Any device to which a manual connection is added will not be included in the
Endpoints window list if the node has other connections..
For example, if node A is endpoint for node B and we create a link from A to
node C, node A is no longer considered an endpoint.
Zoom bar
Snap In
To move the navigator selection window, click and hold inside the red selection
window and drag the box to a new location. You can change the area of the map
selection window by clicking the edges or corners of the selection and dragging
to a new location within the navigator.
To zoom in or out, use the zoom bar controls or the zoom slider. You can also
zoom using the zoom option on the top map menu bar. The map navigator
automatically adjusts to display the selected zoom area.
Use the Snap In
To select the grouping, click Group by: and select a grouping option from the
list. The display options are described below:
VLAN: The configured VLAN from the IF MIB. The view displays the ID with
VLAN Name; if a VLAN Name is not defined the VLAN shows as Unknown.
To view node within a group (except Unknown nodes) click the expand triangle
next to the group.
To select a node and highlight it on the map, click the node name.
Click one of the shortcuts to highlight all the relevant nodes in the currently
displayed map. To locate and highlight a specific node in a shortcut category,
click the triangle next to the shortcut to reveal a list of all nodes in the category,
and then click a specific node.
The Link Speed options only affect the displayed coloring of layer 2 links by
speed range, and the display of Speed by text. When link speed is cleared, all
connections show as grey lines.
The Connection Display Options allow you to view layer 2 (Link layer), layer 3
(IP layer) information, virtual infrastructure and custom/manual connections.
When a connection has information from both layers 2 and 3, the connection only
displays layer 2 information. To switch to layer 3 information, clear the Layer 2
(Switches) check box in Connection Display Options and select Layer 3.
Select Virtual Infrastructure to see the virtual machines running on discovered
nodes
A custom connection is one that you manually add to the map with the Connect
Devices tool.
You can rollover any link on your map to see for each device in the link the
Interface Name, Port Number, and any STP details; and the link speed by which
data passes between the devices.
If you select Layer 3 for your Connection Display, you see the IP Address and
Subnet for the devices.
If you select Layer 2 VLAN then you see any VLANS running through a
connection; rolling-over the VLAN indications shows you the VLAN IDs
associated with the connection along with the other connection information
related to the devices.
Finally, Connection Jumps indicate the separation of links where they seem to
intersect in your maps.
You can edit the node name, change the Node Role or Polling IP Address from
dropdown lists; and review information on the discovered IP Address(es),
Hostname, System Name, System Description, Machine Type, Vendor, System
Location, Contact, and Polling Method.
You can review the nodes Interface Data, including the ARP cache related to
MAC/IP Address matches.
And you can review the nodes VLAN Data: the name, status, and interfaces for
each VLAN for which the node is configured.
By default NTM uses node names for map displays. To select the node
information displayed on maps, click Node Display Options on the left option
bar.
To enable any of the Node Display Options, select the check box next to the
option name. The map updates when the check boxes are selected.
Notes:
Options can only be selected one at a time. Allow the map to update a
selected option before selecting an additional option.
Layered: Nodes are arranged orthogonally and sorted by map object type
such as multiple connections (core) or single connection (leaf) devices.
Working with Maps 49
Use the option that best fits your preference or mapping standards.
With Align options you can align selected nodes left, right, top, bottom, and
center them vertically or horizontally. With Distribute options you can arrange
selected nodes with respect to each other either horizontally or vertically.
Importing Maps
NTM allows you to import Orion Network Atlas maps. For more information about
Orion Network Atlas, see the SolarWinds Orion Network Atlas Administrator
Guide.
To import a map:
1. Click File > Import > Network Atlas Maps.
2. Create a file password as needed.
3. Navigate to a saved Network Atlas map and click Open.
Saving Maps
Follow these steps to save a map.
To save a map:
1. Click File > Save as.
2. Navigate to the folder you want to save map files in, enter a File Name, and
then click Save.
Opening a Saved Map
Follow these steps to open a map.
To open a saved map:
1. Click File > Open.
2. Navigate to the folder containing the map, and then click Open.
Using Map Backgrounds
Map backgrounds allow you to arrange nodes in NTM to the fit layout of your
network. Backgrounds should show network locations and not include Network
nodes or connections. NTM nodes and connections overlay backgrounds. You
have two sample map backgrounds available in NTM. These backgrounds are
meant to demonstrate how map backgrounds look. They are not specific to any
actual network.
Notes:
For best fit and resolution files should be 1600 X 1024 at 72 DPI.
Exporting Maps
You can export maps as Visio, PNG, Network Atlas (SolarWinds Orion), PDF, or
map (native NTM) files. When exporting to Network Atlas or NTM formats you will
be prompted for a map password. Enter any password as an encryption key for
that export.
Note:
NTM 2.1.1 exported maps work in NPM 10.6 but not 10.4.2.
In exporting from NTM, keep in mind that:
NTM exports data on nodes, interfaces, edges, and map styles and general
map-making information.
NTM does not export credentials; accessing the exported data depends on
credentials selected in Orion Platform.
Only Network Atlas edges are exported; labels and custom objects are not
exported.
EnergyWise Device
Firewall
Hyper-V Guest
Hyper-V Host
ICMP Node
L3/L2 Switch
Printer
Router
Router Wireless AP
EnergyWise Device
Switch
Working with Maps 53
VMWare Datacenter
VMWare Guest
VMWare Host
VOIP Phone
Wireless AP
Wireless Controller
WMI Node
Shadow Node
SNMP Node
Additionally, you can use custom icons on your computer to represent any
node.
To adjust the icon for a node:
1. Right-click a node and select Custom Icon.
5. If you want to use a custom icon for the machine type, click Browse and
locate the desired image file on your computer.
6. Click OK.
7. To resize the icon, right-click, select Icon Size >
Small/Medium/Large/Default.
Remote Desktop
Traceroute
Ping
Telnet
Traceroute
Enhanced Ping
Lookup IP Address
Lookup Hostname
CPU Gauge
Switchport Mapper
1. Right-click any node and then select Integration with Custom Tools > Add
Custom Tools.
2. Add a custom tool defined as follows:
Name: SSH
Executable Path: C:\Program Files (x86)\OpenSSH\bin\ssh.exe
Command line arguments: Administrator@${IP}
Now when you want to SSH to a node, you:
Right-click any node and then select Integration with Custom Tools >
SSH.
Text
Number (Integers)
Decimal
Yes/No (true/false)
Date/Time
Map Reports
NTM offers the following reports:
Inventory
Known Connections
Switch Ports
STP
ARP Cache
Subnets
Scheduled Discoveries
To run a report click Reports >New Report, and then select the report you want
to run.
Use the Search tool to find specific string patterns among the report data.
To remove columns from a report click Options >Display Columns, and click
the column you want to remove from the report.
To sort on any column, click the column header.
To apply the node display options used on the map, click Options > Apply map
filters.
Log Adjuster
Log adjuster allows you to change the level of event logging for NTM. This
may be required if you are troubleshooting an issue with SolarWinds
Technical Support. Do not change the settings in this tool unless you are
requested to do so by Technical Support.
Grab SNMPWalk
The SNMPWalk tool begins with the specified Root OID and queries the
device for each OID in sequence, displaying its current value.
Appendix A
About SNMP
About Subnets
Map Encryption
About SNMP
NTM uses Simple Network Management Protocol (SNMP) to retrieve information
about device interfaces, ARP cache, CDP data, and a variety of other statistics.
SNMP queries (polls) devices for specific information, and NTM acts as an
SNMP manager, polling SNMP agents installed on managed devices. The
following requirement must be met for NTM to successfully poll devices:
The device and NTM must share the same SNMPv2c community strings
or SNMPv3 security access.
SNMP (UDP port 161) must not be blocked between the device and
NTM.
Getting Started 61
Run a test from the NTM Add Credential interface before running
discovery.
Use a third party protocol analyzer to capture packets between NTM and
the node to evaluate the issue.
62 Getting Started
About Subnets
An IP subnet is a logical division of a network into one or more smaller networks.
This is accomplished by borrowing some of the host IP address space in a
network and allocating a portion of that space to a subnet address. For example,
the IP network 10.0.0.0 has 224 host IP addresses. By specifying some of the
host bits as subnet bits and assigning a subnet address the 10.0.0.0 network can
contain a 10.1.1.0 subnet with 28 host addresses. A subnet mask is used to
specify which part of the host bits are used to identify a subnet.
The sub-netting of the 10.0.0.0 network to the 10.1.1.0 subnet is accomplished
by adding the subnet mask shown below.
Subnet = 10.1.1.0
Subnet mask = 255.255.255.0
This subnet mask indicates that the first three octets of the IP address specify the
subnet and only the last octet specifies host addresses. The range of usable
hosts is 10.110.1.0 to 10.110.1.254 (with .0 host allowed).
Getting Started 63
A one hop discovery discovers all of the devices specified in the above zero hop
discovery and all networks, subnets, and devices directly connected to all
devices on the edge of the zero hops discovery.
Depending on the complexity of your network, discovering past zero hops has
the potential to discover several times the number of subnets and hundreds of
times the number of total devices. Discovering two hops or more has the
potential of discovering thousands of subnets and devices.
Any discovery using more than zero hops may have a large impact on discovery
performance.
IP Address
Node name
System Description
System Location
Contact
Note: All of the above except Machine Type are discovered in SNMP discovery
as well.
64 Getting Started
Map Encryption
NTM offers encryption for NTM files and Orion Network Atlas files.
66 Getting Started
Getting Started 67
68 Getting Started
Appendix B
FAQ
What does Requests made mean in discovery?
Request made represents the sum of the SNMP, WMI, VMware and ICMP
requests sent by the NTM discovery engine to all of the nodes. This number
will increment through the discovery process and will be several times larger
than the number of nodes discovered.
Why does my map show unidentified devices or unknown device types
connected to one of my routers or switches?
NTM can determine that an unknown device is connected to a specific
interface on a fully discovered device using the IP address of the discovered
devices interfaces and the IP address of the unknown device.
Why are some unknown devices shown with no connectivity?
Devices that only respond to ICMP and cannot be determined to be directly
connected to a known device can only be shown as unknown devices. Use
the Ignore nodes that only respond to ICMP (ping) discovery option to
discover only connected devices.
What database does NTM use?
NTM uses Microsoft SQL server Compact v3.5 SP2. This database is
installed in \Program Files\Microsoft SQL Server during NTM installation.
This database is not accessible from outside the system on which NTM is
installed.
What does the log adjuster tool do?
Log adjuster allows you to change the level of event logging for NTM. This
may be required if you are troubleshooting an issue with SolarWinds
Technical Support. Do not change the settings in this tool unless you are
requested to do so by Technical Support.
What does the Create Tech diagnostic file tool do?
The diagnostics tool creates files for SolarWinds Technical Support. This
may be required if you are troubleshooting an issue with SolarWinds
Technical Support. Do not use this tool unless you are requested to do so by
Technical Support.
What does the Grab SNMPWalk tool do?
Getting Started 69
The SNMPWalk tool begins with the specified Root OID and queries the
device for each OID in sequence, displaying its current value.
What does the Discovery Log Utility do?
For any node discovery the Discovery Log records devices for which SNMP
information could not be retrieved.
How long does it take to complete a discovery?
The length of discovery depends on several factors including:
o
1 = disabled
2 = listening
3 = learning
4 = blocking
5 = forwarding
Note: NTM supports only Common Spanning Tree (CST) data; IEEE 802.1Q.
Which map layout option should I use?
The layout options are available to make it easier for you to use maps in a
format that you prefer. You can use the layout that makes the best fit for your
network and any existing maps you have.
70 Index