Shinken Enterprise allows you to detect network checks and physical type of your servers located in your IT.

Edit and add new network scan list

The network scan can be setup directly in the Adminstration Interface.

First click on the disocvery source in the home page.
Then click on the "See nework scan list" button:

You can list the current network scan in the Discovery menu.

You can enable new scan with the Add new scan button.

And you will see the configuration of a new scan:

You must set up the following parameters:

  • Name
  • IP range: must match a nmap command range definition
  • Scan interval, in minutes
  • You can setup notes about this scan

Adding a new scan will automatically enable it and your new hosts or your new tags will appears in a few minutes.

 

 

Add new port to host template rule

 Without rules, the raw data that is being generated by the discovery scripts is useless. The rules are defined in the /etc/shinken/discovery_rules.cfg file.

Here is an example of how to set the ftp host template host for anything that is detected by nmap with the TCP/21 port open:

define discoveryrule {
   discoveryrule_name         FtpRule
   creation_type              host
   openports                  ^21$
   +use                        ftp
}



There are three main parts for a rule:

 

List of default port to template rules

Here is the list of the default port to Host templates rules:

PortHost template 
27017mongodb 
53dns 
25smtp 
465smtps 
3306mysql 
22ssh 
110pop3 
995pop3s 
9100printer-hp 
1521oracle 
80http 
443https 
1433mssql 
2301hp-asm 
143imap 
993imaps 
389ldap 
636ldaps 

Security: nmap command parameters

Here are the the parameters used by the nmap command used by this module: