| Shinken Enterprise allows you to detect network checks and physical type of your servers located in your IT. | |||||||||||||||||||||||||||||||||||||||
Edit and add new network scan list | |||||||||||||||||||||||||||||||||||||||
| The network scan can be setup directly in the Administration Interface. | |||||||||||||||||||||||||||||||||||||||
| First click on the discovery source in the home page. | |||||||||||||||||||||||||||||||||||||||
| Then click on the "See nework scan list" button: | |||||||||||||||||||||||||||||||||||||||
You can list the current network scan in the Discovery menu. You can enable new scan with the Add new scan button. | |||||||||||||||||||||||||||||||||||||||
| And you will see the configuration of a new scan: | |||||||||||||||||||||||||||||||||||||||
You must set up the following parameters:
for example: 172.16.1.1-254
Adding a new scan will automatically enable it and your new hosts or your new tags will appears in a few minutes. | |||||||||||||||||||||||||||||||||||||||
Add new port to host template rule | |||||||||||||||||||||||||||||||||||||||
| Without rules, the raw data that is being generated by the discovery scripts is useless. The rules are defined in the /etc/shinken/discovery_rules.cfg file. | |||||||||||||||||||||||||||||||||||||||
Here is an example of how to set the ftp host template for anything that is detected by nmap with the TCP/21 port open: There are three main parts for a rule:
| define discoveryrule {
discoveryrule_name FtpRule
creation_type host
openports ^21$
+use ftp
}
| ||||||||||||||||||||||||||||||||||||||
Here is the list of the default port to Host templates rules: | |||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||
Security: nmap command parameters | |||||||||||||||||||||||||||||||||||||||
Here are the the parameters used by the nmap command used by this module:
| |||||||||||||||||||||||||||||||||||||||
