This page contains
There are two conditions which cause
During discovery, for WMI, SSH, and VMware protocols,
Polling occurs when
Network protocol and ports
Protocol | Transfer protocol | Port(s) | Network | Credentials/Access | Encryption | Commands |
|---|---|---|---|---|---|---|
WMI | TCP | Request: 135 Response: 1024-65535 | Discovery queries between 3K and 10K of data (on average) per discovered asset. Polling queries approx. 60 bytes of data per asset per poll. Polling interval can be configured in the external system configuration. | WMI connections between hosts require valid user credentials on the remote system. The credentials should be encrypted on Linux (using j-Interop) as well as Windows (using the native Windows libraries). | Credential information is always encrypted using NTLM and/or Kerberos encryption. | |
SNMP | TCP/UDP | 161, 162 | Discovery queries between 3K and 10K of data (on average) per discovered asset. Polling queries approx. 60 bytes of data per asset per poll. Polling interval can be configured in the external system configuration. | No encryption is used for SNMP communication Both SNMP v1 and v2 are supported. | ||
VMware vSphere Web Service | TCP | 80, 443 | Discovery queries between 3K and 10K of data (on average) per discovered asset. Polling queries approx. 60 bytes of data per asset per poll. Polling interval can be configured in the external system configuration. Connections are made on port 443 by default | SSL connections to VMware web services api's to pull ESX server and guest utilization information Password authentication is used, no keys are stored on the VMware protocol discoveries require a local user account on each ESX host. The account must belong to at least the readonly role. It does NOT require access to the ESX shell. | Encrypted connection (SSL) to the default https port (443) key length is determined by server | |
SSH | TCP | 22 | Discovery queries between 3K and 10K of data (on average) per discovered asset. Polling queries approx. 60 bytes of data per asset per poll. Polling interval can be configured in the external system configuration. | Discovery commands require root level access. "sudo" may be used to complete this task a guide can be found
| Server determine cipher type and key length. SSH v2 is supported, v1 is not supported. | |
TCP ECHO | TCP | 7 | Echo functionality to make sure discovered device is alive | - | - | - |
ICMP ECHO | IP | N/A | Ping/Echo functionality to make sure discovered device is alive | - | - | - |
IPMI | UDP | 623 | Discovery queries between 3K and 10K of data (on average) per discovered asset. Polling queries approx. 60 bytes of data per asset per poll. Polling interval can be configured in the external system configuration. | IPMI connections between hosts require valid user credentials on the remote system. | Depending on configuration and BMC interface | |
| Postgres | UDP | 3306 | Localhost only - internal ITO database connection | Handled by ITO system | Yes | - |
| HTTP | TCP | 8090 | Management Console interface for ITO | Handled by DCO/ITO integration interface | - | - |
HTTPs | TCP | 8643 | Management Console interface for Intel DCM | Localhost only | - | - |
HTTP | UDP | 8688 | Management Console interface for Intel DCM | Localhost only | - | - |
Postgres | UDP | 6443 | Localhost only - internal Intel DCM database connection | Localhost only | - | - |
| Server Access - related protocols | ||||||
| VNC | RFB | 5900 (default) | Bandwidth usage is very depended on screen activity and usage | More info can be found | The encryption is depended on the OS and the installed VNC application | - |
| SSH | TCP | 22 | Since text only is transferred the bandwidth requirement is very limited. | More info can be found | Server determine cipher type and key length | - |
| RDP | TCP | 3389 (default) | Bandwidth usage is very depended on screen activity and usage | More info can be found | The encryption is depended on the OS and the installed application. Default 128-bit encryption, using the RC4 encryption algorithm | - |
A 1024-bit RSA key is generated and used for SSL communication. The key is self- signed and will generally require the user to trust the signing authority. When connecting to an
Packages and their version numbers being used in
Status in terms of general known vulnerabilities can be found
Antivirus tools are not provided with the
Log files can be found in the .log folder in the installation directory of the
See also |
|---|