Shinken Enterprise allows you to detect network checks and physical type of your servers located in your IT.
Edit and add new network scan list
The network scan can be setup directly in the Adminstration Interface. First click on the disocvery source in the home page.
...
Adding a new scan will automatically enable it and your new hosts or your new tags will appears in a few minutes.
Add new port to host template rule
Without rules, the raw data that is being generated by the discovery scripts is useless. The rules are defined in the /etc/shinken/discovery_rules.cfg file.
...
- +use: This mentions the template from which the generated object will inherit from. You can add as many properties as you want.
List of default port to template rules
Here is the list of the default port to Host templates rules:
| Port | Host template | |
|---|---|---|
| 27017 | mongodb | |
| 53 | dns | |
| 25 | smtp | |
| 465 | smtps | |
| 3306 | mysql | |
| 22 | ssh | |
| 110 | pop3 | |
| 995 | pop3s | |
| 9100 | printer-hp | |
| 1521 | oracle | |
| 80 | http | |
| 443 | https | |
| 1433 | mssql | |
| 2301 | hp-asm | |
| 143 | imap | |
| 993 | imaps | |
| 389 | ldap | |
| 636 | ldaps |
Security: nmap command parameters
Here are the the parameters used by the nmap command used by this module:
...