Shinken Enterprise allows you to detect network checks and physical type of your servers located in your IT.
The network scan can be setup directly in the Adminstration Interface. First click on the disocvery source in the home page.

Then click on the "See nework scan list" button:

You can list the current network scan in the Discovery menu.
You can enable new scan with the Add new scan button.

And you will see the configuration of a new scan:

You must set up the following parameters:
Adding a new scan will automatically enable it and your new hosts or your new tags will appears in a few minutes.
Without rules, the raw data that is being generated by the discovery scripts is useless. The rules are defined in the /etc/shinken/discovery_rules.cfg file.
Here is an example of how to set the ftp host template host for anything that is detected by nmap with the TCP/21 port open:
define discoveryrule {
discoveryrule_name FtpRule
creation_type host
openports ^21$
+use ftp
} |
There are three main parts for a rule:
Here is the list of the default port to Host templates rules:
| Port | Host template | |
|---|---|---|
| 27017 | mongodb | |
| 53 | dns | |
| 25 | smtp | |
| 465 | smtps | |
| 3306 | mysql | |
| 22 | ssh | |
| 110 | pop3 | |
| 995 | pop3s | |
| 9100 | printer-hp | |
| 1521 | oracle | |
| 80 | http | |
| 443 | https | |
| 1433 | mssql | |
| 2301 | hp-asm | |
| 143 | imap | |
| 993 | imaps | |
| 389 | ldap | |
| 636 | ldaps |
Here are the the parameters used by the nmap command used by this module: