Вы находитесь на странице: 1из 33

Altiris Inventory for Network Devices 7.

5 from Symantec User Guide

Altiris Inventory for Network Devices 7.5 from Symantec User Guide
The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

Legal Notice
Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Altiris, and any Altiris or Symantec trademarks used in the product are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party (Third Party Programs). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Licensed Software does not alter any rights or obligations you may have under those open source or free software licenses. For more information on the Third Party Programs, please see the Third Party Notice document for this Symantec product that may be available at http://www.symantec.com/about/profile/policies/eulas/, the Third Party Legal Notice Appendix that may be included with this Documentation and/or Third Party Legal Notice ReadMe File that may accompany this Symantec product. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.

Symantec Corporation 350 Ellis Street Mountain View, CA 94043 http://www.symantec.com

Technical Support
Symantec Technical Support maintains support centers globally. Technical Supports primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates. Symantecs support offerings include the following:

A range of support options that give you the flexibility to select the right amount of service for any size organization Telephone and/or Web-based support that provides rapid response and up-to-the-minute information Upgrade assurance that delivers software upgrades Global support purchased on a regional business hours or 24 hours a day, 7 days a week basis Premium service offerings that include Account Management Services

For information about Symantecs support offerings, you can visit our website at the following URL: www.symantec.com/business/support/ All support services will be delivered in accordance with your support agreement and the then-current enterprise technical support policy.

Contacting Technical Support


Customers with a current support agreement may access Technical Support information at the following URL: www.symantec.com/business/support/ Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at the computer on which the problem occurred, in case it is necessary to replicate the problem. When you contact Technical Support, please have the following information available:

Product release level Hardware information

Available memory, disk space, and NIC information Operating system Version and patch level Network topology Router, gateway, and IP address information Problem description:

Error messages and log files Troubleshooting that was performed before contacting Symantec Recent software configuration changes and network changes

Licensing and registration


If your Symantec product requires registration or a license key, access our technical support Web page at the following URL: www.symantec.com/business/support/

Customer service
Customer service information is available at the following URL: www.symantec.com/business/support/ Customer Service is available to assist with non-technical questions, such as the following types of issues:

Questions regarding product licensing or serialization Product registration updates, such as address or name changes General product information (features, language availability, local dealers) Latest information about product updates and upgrades Information about upgrade assurance and support contracts Information about the Symantec Buying Programs Advice about Symantec's technical support options Nontechnical presales questions Issues that are related to CD-ROMs, DVDs, or manuals

Support agreement resources


If you want to contact Symantec regarding an existing support agreement, please contact the support agreement administration team for your region as follows:
Asia-Pacific and Japan Europe, Middle-East, and Africa North America and Latin America customercare_apac@symantec.com semea@symantec.com supportsolutions@symantec.com

Contents

Technical Support ............................................................................................... 4 Chapter 1 Introducing Inventory for Network Devices .................... 8
About Inventory for Network Devices .................................................. 8 About licensing Inventory for Network Devices ..................................... 9 Components of Inventory for Network Devices ................................... 10 Where to get more information ........................................................ 10

Chapter 2

Gathering agentless inventory ......................................... 13


About gathering agentless inventory ................................................. Gathering agentless inventory ......................................................... Creating agentless inventory tasks using the wizard ............................ Manually creating, scheduling, modifying, and stopping agentless inventory tasks ....................................................................... Viewing agentless inventory results .................................................. 13 14 15 17 18

Chapter 3

Mapping network device data .......................................... 20


About SNMP data mapping ............................................................ 20 Using SNMP data mapping tables .................................................... 21

Appendix A

Altiris Inventory for Network Devices 7.5 from Symantec Third-Party Legal Notices ...................... 24
Third-Party Legal Attributions .......................................................... RegExp ...................................................................................... Linux PCI ID Repository ................................................................. Linux USB ID Repository ............................................................... Microsoft Windows Server 2008 Redistributables ................................ 24 25 25 26 27

Index

.................................................................................................................... 33

Chapter

Introducing Inventory for Network Devices


This chapter includes the following topics:

About Inventory for Network Devices About licensing Inventory for Network Devices Components of Inventory for Network Devices Where to get more information

About Inventory for Network Devices


Inventory for Network Devices gathers inventory data from discovered devices in your network. This inventory is gathered from the devices that are not managed through the Symantec Management Agent. Because a management agent is not required, this inventory is considered an agentless inventory. Agentless inventory gathers inventory on the devices that are already discovered and exist as resources in the Symantec Management Platform's Configuration Management Database (CMDB). Agentless inventory tasks run on discovered devices and report the data to Notification Server. The discovery data is stored in the CMDB. You can configure the automated tasks that are scheduled to run at regular intervals to keep your inventory data current. You can gather inventory on the following types of devices:

Cluster Computer

Introducing Inventory for Network Devices About licensing Inventory for Network Devices

Computer: virtual machine Infrastructure device IP phone KVM device Network-attached storage Network backup device Network printer Out-of-band management device Out-of-band management device: chassis management controller Physical rack Physical enclosure Physical bay

See Gathering agentless inventory on page 14. Inventory for Network Devices gathers inventory only on SNMP-enabled network devices. You can determine the type of inventory that is gathered through SNMP data mapping tables. The tables identify the data fields that you want to collect and apply the settings to selected device types. Before you gather inventory on network devices, you must collect the data about the SNMP-enabled devices on your network. Use the Network Discovery task to discover your network devices. Make sure that the connection profile of the Network Discovery task has the SNMP turned on. For more information, see topics about Network Discovery in the IT Management Suite 7.5 Administration Guide at the following URL: http://www.symantec.com/docs/DOC5330

About licensing Inventory for Network Devices


Each Symantec product includes a trial license that is installed by default. You can register and obtain an extended trial license through the Symantec website at the following URL: http://www.symantec.com/business/products/activating/ You can also purchase a full product license. Use the Symantec Installation Manager to install licenses.

Introducing Inventory for Network Devices Components of Inventory for Network Devices

10

For more information about applying licenses to a solution, see the IT Management Suite 7.5 Administration Guide at the following URL: http://www.symantec.com/docs/DOC5330 See About Inventory for Network Devices on page 8.

Components of Inventory for Network Devices


Inventory for Network Devices runs on the Symantec Management Platform and uses the components of the platform. See About Inventory for Network Devices on page 8. Inventory for Network Devices includes the following components: Table 1-1 Component
Inventory for Network Devices tasks (also known as agentless inventory tasks)

Components of Inventory for Network Devices Description


You create and schedule tasks to collect inventory on discovered devices. See Gathering agentless inventory on page 14.

Agentless inventory wizard

You can use the wizard to easily create agentless inventory tasks. See Creating agentless inventory tasks using the wizard on page 15.

Agentless Inventory Home page

This portal page provides links to the commonly used tasks and a summary of inventory data. These tables define the type of inventory data that is gathered.

SNMP data mapping tables

Where to get more information


Use the following documentation resources to learn about and use this product.

Introducing Inventory for Network Devices Where to get more information

11

Table 1-2 Document


Release Notes

Documentation resources Location


The Supported Products A-Z page, which is available at the following URL: http://www.symantec.com/business/support/index?page=products Open your product's support page, and then under Common Topics, click Release Notes.

Description
Information about new features and important issues.

User Guide

Information about how to use this product, including detailed technical information and instructions for performing common tasks. Information about how to use this product, including detailed technical information and instructions for performing common tasks. Help is available at the solution level and at the suite level. This information is available in HTML help format.

The Documentation Library, which is available in the Symantec Management Console on the Help menu. The Supported Products A-Z page, which is available at the following URL: http://www.symantec.com/business/support/index?page=products Open your product's support page, and then under Common Topics, click Documentation.

Help

The Documentation Library, which is available in the Symantec Management Console on the Help menu. Context-sensitive help is available for most screens in the Symantec Management Console. You can open context-sensitive help in the following ways:

Click the page and then press the F1 key. Use the Context command, which is available in the Symantec Management Console on the Help menu.

In addition to the product documentation, you can use the following resources to learn about Symantec products. Table 1-3 Resource Description Symantec product information resources Location
http://www.symantec.com/business/theme.jsp?themeid=support-knowledgebase

SymWISE Articles, incidents, and Support issues about Symantec Knowledgebase products.

Introducing Inventory for Network Devices Where to get more information

12

Table 1-3 Resource


Symantec Connect

Symantec product information resources (continued) Location


http://www.symantec.com/connect/endpoint-management/forums/ endpoint-management-documentation Here is the list of links to various groups on Connect:

Description
An online resource that contains forums, articles, blogs, downloads, events, videos, groups, and ideas for users of Symantec products.

Deployment and Imaging http://www.symantec.com/connect/groups/deployment-and-imaging Discovery and Inventory http://www.symantec.com/connect/groups/discovery-and-inventory ITMS Administrator http://www.symantec.com/connect/groups/itms-administrator Mac Management http://www.symantec.com/connect/groups/mac-management Monitor Solution and Server Health http://www.symantec.com/connect/groups/monitor-solution-and-server-health Patch Management http://www.symantec.com/connect/groups/patch-management Reporting http://www.symantec.com/connect/groups/reporting ServiceDesk and Workflow http://www.symantec.com/connect/workflow-servicedesk Software Management http://www.symantec.com/connect/groups/software-management Server Management http://www.symantec.com/connect/groups/server-management Workspace Virtualization and Streaming http://www.symantec.com/connect/groups/ workspace-virtualization-and-streaming

Chapter

Gathering agentless inventory


This chapter includes the following topics:

About gathering agentless inventory Gathering agentless inventory Creating agentless inventory tasks using the wizard Manually creating, scheduling, modifying, and stopping agentless inventory tasks Viewing agentless inventory results

About gathering agentless inventory


Inventory for Network Devices lets you gather agentless inventory data from the discovered SNMP network devices such as computers, network printers, network-attached storage devices, and network backup devices. To gather inventory, agentless tasks run on discovered devices and report the data to Notification Server. The data is stored in the Configuration Management Database (CMDB). You can configure the automated tasks that are scheduled to run at regular intervals to keep your inventory data current. See About Inventory for Network Devices on page 8. See Gathering agentless inventory on page 14. When you configure agentless inventory tasks, you specify the following:

Which devices to inventory When to run the task

Gathering agentless inventory Gathering agentless inventory

14

You can configure multiple tasks to meet your needs. You can create and configure agentless inventory tasks in the following ways:
Creating a task with Agentless Inventory wizard. The wizard guides you through the creation and configuration of agentless inventory tasks. You can later edit the advanced settings and schedules of a task on the task page. See Creating agentless inventory tasks using the wizard on page 15. Creating a task manually You can manually create tasks from the Agentless Inventory Tasks Web Part. This option lets you configure more advanced settings and schedules. See Manually creating, scheduling, modifying, and stopping agentless inventory tasks on page 17.

You can only gather inventory from the SNMP-enabled devices on your network that are already discovered. Run the Network Discovery task to discover your network devices and create resources for them in the CMDB. Make sure that the connection profile of the Network Discovery task has the SNMP turned on. For more information, see topics about Network Discovery in the IT Management Suite 7.5 Administration Guide at the following URL: http://www.symantec.com/docs/DOC5330 Agentless inventory tasks use connection profiles to manage the protocols that are used to communicate with network devices. Connection profiles are components of the Symantec Management Platform. When a device is discovered, a resource for that device is created in the CMDB. The resource keeps a record of the protocols that were used to communicate with the device. When you use agentless inventory tasks, you do not specify a connection profile or protocols. Agentless inventory tasks automatically use the same protocols that were enabled when the device was discovered. For more information, see the topics about resource discovery and using connection profiles in the IT Management Suite 7.5 Administration Guide at the following URL: http://www.symantec.com/docs/DOC5330

Gathering agentless inventory


You can gather agentless inventory data from discovered SNMP-enabled network devices and enter that data in the Configuration Management Database (CMDB). See About gathering agentless inventory on page 13.

Gathering agentless inventory Creating agentless inventory tasks using the wizard

15

The process for gathering agentless inventory from network devices is as follows: Table 2-1 Step
Step 1

Process for gathering inventory of network devices Action


Discover network devices.

Description
You can only gather inventory of the devices that are already discovered. For more information, see topics about Network Discovery in the IT Management Suite 7.5 Administration Guide at the following URL: http://www.symantec.com/docs/DOC5330

Step 2

Use SNMP data mapping tables to SNMP data mapping tables identify the define how to map SNMP devices data fields that you want to gather and to the data that you want to gather. apply the settings to the selected device types. See Using SNMP data mapping tables on page 21.

Step 3

Create agentless inventory tasks. You create and schedule tasks to collect inventory. You can create the tasks either with inventory wizard or manually. See Creating agentless inventory tasks using the wizard on page 15. See Manually creating, scheduling, modifying, and stopping agentless inventory tasks on page 17.

Step 4

View agentless inventory data.

You can view the gathered inventory data in the Resource Manager or on the Agentless Inventory page. See Viewing agentless inventory results on page 18.

Creating agentless inventory tasks using the wizard


The wizard guides you through the process of creating agentless inventory tasks and configuring basic settings. You can later configure the advanced settings and schedule the tasks on the task page. This task is a step in the process of gathering agentless inventory from network devices.

Gathering agentless inventory Creating agentless inventory tasks using the wizard

16

See Gathering agentless inventory on page 14. Before you perform theis step, ensure that you have mapped the SNMP devices to the data that you want to gather. See Using SNMP data mapping tables on page 21. To create agentless inventory tasks for network devices using the inventory wizard

1 2 3

In the Symantec Management Console, on the Home menu, click Discovery and Inventory > Agentless Inventory. In the Agentless Inventory Quick Start Web Part, click Run inventory wizard. In the Agentless inventory task creation wizard, on the Choose devices to inventory page, do the following:

Select Choose devices, and then, in the drop-down list, click the group of target devices that you want to gather inventory from. For more information, see topics about using filters and organizational views in the IT Management Suite 7.5 Administration Guide at the following URL: http://www.symantec.com/docs/DOC5330 Under Include Device Types, check the types of devices that you want to gather inventory from. (Optional) To gather inventory from an individual device, in the wizard, select Individual device, and then, in the drop-down list, click the device that you want to gather inventory from This list includes all SNMP-enabled devices that have been previously discovered and have resources in the Configuration Management Database (CMDB).

4 5 6

On the Inventory network task name page, type a name for the task, and then click Next. On the Schedule task page, configure the task schedule, and then click Finish. (Optional) To view the created task, do one of the following:

In the Symantec Management Console, on the Home menu, click Discovery and Inventory > Agentless Inventory, and then view the task in the Agentless Inventory Tasks Web Part. Note that to view the newly created task, you may need to click the Refresh symbol. In the Symantec Management Console, on the Manage menu, click Jobs and Tasks, and then, in the left pane, under Jobs / Tasks, expand System Jobs and Tasks > Discovery and Inventory.

The next step is to view the agentless inventory data.

Gathering agentless inventory Manually creating, scheduling, modifying, and stopping agentless inventory tasks

17

See Viewing agentless inventory results on page 18.

Manually creating, scheduling, modifying, and stopping agentless inventory tasks


You can manually create, modify, and stop agentless inventory tasks on the Agentless Inventory Home page. See About gathering agentless inventory on page 13. This task is a step in the process for gathering agentless inventory. See Gathering agentless inventory on page 14. Before you perform these steps, ensure that you have mapped the SNMP devices to the data that you want to gather. See Using SNMP data mapping tables on page 21. To manually create agentless inventory tasks

1 2 3

In the Symantec Management Console, on the Home menu, click Discovery and Inventory > Agentless Inventory. In the Agentless Inventory Tasks Web Part, on the Available Tasks tab, on the toolbar, click New. In the New Agentless Inventory Task dialog box, give the task a descriptive name, and then do the following:

Select Group of Devices, and then, in the drop-down list, click the group of devices that you want to gather inventory from. For more information, see the topics about using filters and organizational views in the IT Management Suite 7.5 Administration Guide at the following URL: http://www.symantec.com/docs/DOC5330 Under Group of Devices, check the types of devices that you want to gather inventory from. (Optional) To gather inventory from an individual device, select Individual device, and then, in the drop-down list, click the device that you want to gather inventory from This list includes all SNMP-enabled devices that have been previously discovered and have resources in the Configuration Management Database (CMDB). (Optional) Click Advanced, specify the maximum number of threads per inventory task, and then click OK.

Gathering agentless inventory Viewing agentless inventory results

18

During the inventory process, a separate thread is used for each device. The maximum number of threads is based on the amount of traffic that you want this task to generate and on the capacity of your Notification Server computer.

Click OK.

To schedule agentless inventory tasks

1 2 3

In the Symantec Management Console, on the Home menu, click Discovery and Inventory > Agentless Inventory. In the Agentless Inventory Tasks Web Part, on the Available Tasks tab, click the task that you want to schedule, and then click Schedule. In the New Schedule dialog box, configure the task schedule according to your needs, and then click Schedule.

To configure or stop agentless inventory tasks

1 2

In the Symantec Management Console, on the Home menu, click Discovery and Inventory > Agentless Inventory. In the Agentless Inventory Tasks Web Part, on the Available Tasks tab, click the task that you want to schedule, and then do one of the following:

To configure the task run schedule, on the toolbar, click Schedule. In the New Schedule dialog box, configure the task according to your needs, and then click Schedule. To configure the task settings, on the toolbar, click the Edit symbol. In the New Agentless Inventory Task dialog box, configure the task according to your needs, and then click OK. To stop the task, click the Tasks Run tab, click the task that you want to stop, and then, on the toolbar, click Stop.

The next step is to view the agentless inventory data. See Viewing agentless inventory results on page 18.

Viewing agentless inventory results


The data collected by the inventory tasks is stored in the CMDB. You can view the collected data and the additional details about the devices in the Resource Manager or on the Agentless Inventory Home page For more information, see the topics about Resource Manager in the IT Management Suite 7.5 Administration Guide at the following URL:

Gathering agentless inventory Viewing agentless inventory results

19

http://www.symantec.com/docs/DOC5330 The Agentless Inventory Home page presents a data summary of inventoried network devices. On this page you can also see the status of agentless inventory tasks. This task is a step in the process for gathering agentless inventory. See Gathering agentless inventory on page 14. To view agentless inventory data in the Resource Manager

1 2 3

In the Symantec Management Console, on the Manage menu, click Resource. In the Select Resource dialog box, click the resource that you want to view, and then click OK.

To view agentless inventory data on the Agentless Inventory Home page

1 2 3

In the Symantec Management Console, on the Home menu, click Dicovery and Inventory > Agentless Inventory. On the Agentless Inventory Home page, view the Devices Inventoried By Type (Last 30 Days) and Agentless Inventory Tasks Web Parts. On the Resource Manager page, on the toolbar, click View > Inventory, and then, in the navigation pane, under Data Classes, navigate to Network Device Data to view the inventory data.

Chapter

Mapping network device data


This chapter includes the following topics:

About SNMP data mapping Using SNMP data mapping tables

About SNMP data mapping


SNMP data mapping tables let you define how to map SNMP devices to the data that you want to gather. Inventory for Network Devices provides predefined SNMP data mapping tables for common SNMP devices. The predefined tables are read-only and cannot be edited. You can also create your own custom SNMP data mapping tables. See Using SNMP data mapping tables on page 21. When you create a new SNMP data mapping table, you specify Management Information Base (MIB) data objects, also known as MIB files or MIBs. MIBs are the data objects that are defined in the database. An SNMP manager uses them to control hardware and software resources. MIBs let you expand the data fields that can be collected when inventory runs. Inventory for Network Devices provides many MIBs of the leading hardware manufacturers. You can also import additional MIBs using the MIB Import task. The MIB files that you import with the MIB Import task can have the .MIB, .MY, or any other file extension for MIB files. For more information, see the topic about importing MIB files using the MIB import task in the IT Management Suite 7.5 Administration Guide at the following URL: http://www.symantec.com/docs/DOC5330

Mapping network device data Using SNMP data mapping tables

21

When you map SNMP data mapping tables to a device, you choose a device from a list of classified SNMP devices. This list includes the SNMP devices that are configured on the SNMP Device Classifications page of Network Discovery.

Using SNMP data mapping tables


SNMP data mapping tables let you define how to map SNMP devices to the data that you want to gather. Inventory for Network Devices provides predefined SNMP data mapping tables for common SNMP devices. The predefined tables are read-only and cannot be edited. See About SNMP data mapping on page 20. If you manage network devices in a large infrastructure, you can export configured SNMP data mapping tables and send them to other locations within your organization. This method is an easy way to ensure that all Notification Servers that use Inventory for Network Devices gather the same inventory. See To export an SNMP data mapping table on page 22. You can also test table definitions to ensure that you have defined the field values for a table definition correctly. When you test the table, you test it on a single device that you specify. See To test an SNMP data mapping table on a single device on page 22. To view an SNMP data mapping table

1 2 3 4

In the Symantec Management Console, on the Home menu, click Discovery and Inventory > Agentless Inventory. On the Agentless Inventory Home page, in the Agentless Inventory Quick Start Web Part, click Data mapping tables. On the SNMP Data Mapping Tables page, in the left pane, click the table that you want to view. In the right pane, on the Table details tab, view table details. On the Device mappings tab, view the SNMP devices to which the table is mapped.

To create a new SNMP data mapping table

1 2 3

In the Symantec Management Console, on the Home menu, click Discovery and Inventory > Agentless Inventory. On the Agentless Inventory Home page, in the Agentless Inventory Quick Start Web Part, click Data mapping tables. On the SNMP Data Mapping Tables page, on the toolbar, click New.

Mapping network device data Using SNMP data mapping tables

22

4 5 6

In the New Table dialog box, type a new table name, and then click OK. In the right pane, under Table Columns, on the toolbar, click New. In the Edit Row Values dialog box, do the following:

Type the name and length of the row. The length of some types is predefined. (Optional) Check Key to enable the row to be a primary key in the data table. Click Select OID to select an Object ID. The Object ID is mapped to the source of the protocol information. For example, it can map to the Object ID for an SNMP query. In the Object ID Selection Tool dialog box, in the mib drop-down list, choose an Object ID according to your needs, and then click Save changes.

7 8 9

Click OK. Click Save changes. Click the Device Mappings tab, and check the devices that you want to apply this table to.

10 Click Test on device.


In the Test Table Mappings on Device dialog box, in the Host address box, type the host address or host name of the device that you want to test, and then click Test. The data appears if a valid response is received from the device. Click Close.

11 Click Save changes.


To test an SNMP data mapping table on a single device

1 2 3

Either in a new table or in the details of an existing table, click Test on Device. Enter the host address or host name of the device you want to test. Click Test. The data appears if a valid response is received from the device.

To export an SNMP data mapping table

1 2

In the Symantec Management Console, on the Home menu, click Discovery and Inventory > Agentless Inventory. On the Agentless Inventory Home page, in the Agentless Inventory Quick Start Web Part, click Data mapping tables.

Mapping network device data Using SNMP data mapping tables

23

On the SNMP Data Mapping Tables page, in the left pane, click the table that you want to export, in the upper left corner, click the Tools icon, and then click Export. In the dialog box that open, choose the directory where you want to export the file, and then click Save. By default, the file name is the same as the table name.

To import an SNMP data mapping table

1 2 3 4

In the Symantec Management Console, on the Home menu, click Discovery and Inventory > Agentless Inventory. On the Agentless Inventory Home page, in the Agentless Inventory Quick Start Web Part, click Data mapping tables. On the SNMP Data Mapping Tables page, in the left pane, click Import. Browse to the file that you want to import, and then click OK.

Appendix

Altiris Inventory for Network Devices 7.5 from Symantec Third-Party Legal Notices
This appendix includes the following topics:

Third-Party Legal Attributions RegExp Linux PCI ID Repository Linux USB ID Repository Microsoft Windows Server 2008 Redistributables

Third-Party Legal Attributions


This Symantec product may contain third party software for which Symantec is required to provide attribution (Third Party Programs). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. This appendix contains proprietary notices for the Third Party Programs and the licenses for the Third Party Programs, where applicable.

Altiris Inventory for Network Devices 7.5 from Symantec Third-Party Legal Notices RegExp

25

RegExp
Copyright (C) 1991 Texas Instruments Incorporated Copyright (c) 1986 by University of Toronto, Written by Henry Spencer MIT License This code is licensed under the license terms below, granted by the copyright holder listed above. The term copyright holder in the license below means the copyright holder listed above. Copyright (c) <year> <copyright holders> Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

Linux PCI ID Repository


Copyright (c) 2007, pciids project All rights reserved. This code is licensed under the license terms below, granted by the copyright holder listed above. The terms owner and organization in the license below mean the copyright holder listed above. Copyright (c) <YEAR>, <OWNER> All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

Altiris Inventory for Network Devices 7.5 from Symantec Third-Party Legal Notices Linux USB ID Repository

26

Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. Neither the name of the <ORGANIZATION> nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Linux USB ID Repository


Copyright (c) 2008, Stephen J. Gowdy All rights reserved. Copyright (c) <YEAR>, <OWNER> All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. Neither the name of the <ORGANIZATION> nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

Altiris Inventory for Network Devices 7.5 from Symantec Third-Party Legal Notices Microsoft Windows Server 2008 Redistributables

27

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Microsoft Windows Server 2008 Redistributables


Copyright 2008 Microsoft Corporation. All rights reserved. Microsoft Chart Controls for Microsoft .NET Framework MICROSOFT SOFTWARE LICENSE TERMS MICROSOFT WINDOWS SOFTWARE DEVELOPMENT KIT for Windows Server 2008 and .NET Framework 3.5 These license terms are an agreement between Microsoft Corporation (or based on where you live, one of its affiliates) and you. Please read them. They apply to the software named above, which includes the media on which you received it, if any. The terms also apply to any Microsoft

updates, supplements, Internet-based services, and support services

for this software, unless other terms accompany those items. If so, those terms apply. BY USING THE SOFTWARE, YOU ACCEPT THESE TERMS. IF YOU DO NOT ACCEPT THEM, DO NOT USE THE SOFTWARE. If you comply with these license terms, you have the rights below. 1. INSTALLATION AND USE RIGHTS.

Altiris Inventory for Network Devices 7.5 from Symantec Third-Party Legal Notices Microsoft Windows Server 2008 Redistributables

28

a. Installation and Use. One user may install and use any number of copies of the software on your devices to design, develop and test your programs that run on a Microsoft Windows operating system. b. Included Microsoft Programs. The software contains other Microsoft programs. These license terms apply to your use of those programs. 2. ADDITIONAL LICENSING REQUIREMENTS AND/OR USE RIGHTS. a. Distributable Code. The software contains code that you are permitted to distribute in programs you develop if you comply with the terms below. i. Right to Use and Distribute. The code and text files listed below are Distributable Code.

REDIST.TXT Files. You may copy and distribute the object code form of code listed in REDIST.TXT files. Sample Code. You may modify, copy, and distribute the source and object code form of code marked as sample. Microsoft Merge Modules. You may copy and distribute the unmodified output of Microsoft Merge Modules. Third Party Distribution. You may permit distributors of your programs to copy and distribute the Distributable Code as part of those programs.

ii. Distribution Requirements. For any Distributable Code you distribute, you must

add significant primary functionality to it in your programs; for any Distributable Code having a filename extension of .lib, distribute only the results of running such Distributable Code through a linker with your application; distribute Distributable Code included in a setup program only as part of that setup program without modification; require distributors and external end users to agree to terms that protect it at least as much as this agreement; display your valid copyright notice on your programs; for Distributable Code from the Windows Media Services SDK portions of the software, include in your programs Help-About box (or in another obvious place if there is no box) the following copyright notice: Portions utilize Microsoft Windows Media Technologies. Copyright (c) 2006 Microsoft Corporation. All Rights Reserved; and indemnify, defend, and hold harmless Microsoft from any claims, including attorneys fees, related to the distribution or use of your programs.

iii. Distribution Restrictions. You may not

Altiris Inventory for Network Devices 7.5 from Symantec Third-Party Legal Notices Microsoft Windows Server 2008 Redistributables

29

alter any copyright, trademark or patent notice in the Distributable Code; use Microsofts trademarks in your programs names or in a way that suggests your programs come from or are endorsed by Microsoft; include Distributable Code in malicious, deceptive or unlawful programs; or modify or distribute the source code of any Distributable Code so that any part of it becomes subject to an Excluded License. An Excluded License is one that requires, as a condition of use, modification or distribution, that the code be disclosed or distributed in source code form; or others have the right to modify it.

b. Additional Functionality. Microsoft may provide additional functionality for the software. Other license terms and fees may apply. 3. INTERNET-BASED SERVICES. Microsoft provides Internet-based services with the software. It may change or cancel them at any time. You may not use this service in any way that could harm it or impair anyone elses use of it. You may not use the service to try to gain unauthorized access to any service, data, account or network by any means. 4. MICROSOFT .NET BENCHMARK TESTING. The software includes one or more components of the .NET Framework 3.5 (.NET Components). You may conduct internal benchmark testing of those components. You may disclose the results of any benchmark test of those components, provided that you comply with the conditions set forth at http://go.microsoft.com/fwlink/?LinkID=66406. Notwithstanding any other agreement you may have with Microsoft, if you disclose such benchmark test results, Microsoft shall have the right to disclose the results of benchmark tests it conducts of your products that compete with the applicable .NET Component, provided it complies with the same conditions set forth at http://go.microsoft.com/fwlink/?LinkID=66406. 5. Scope of License. The software is licensed, not sold. This agreement only gives you some rights to use the software. Microsoft reserves all other rights. Unless applicable law gives you more rights despite this limitation, you may use the software only as expressly permitted in this agreement. In doing so, you must comply with any technical limitations in the software that only allow you to use it in certain ways. For more information, see www.microsoft.com/licensing/userights. You may not

work around any technical limitations in the software; reverse engineer, decompile or disassemble the software, except and only to the extent that applicable law expressly permits, despite this limitation; make more copies of the software than specified in this agreement or allowed by applicable law, despite this limitation;

Altiris Inventory for Network Devices 7.5 from Symantec Third-Party Legal Notices Microsoft Windows Server 2008 Redistributables

30

publish the software for others to copy; rent, lease or lend the software; or use the software for commercial software hosting services.

6. CODE GENERATION AND OPTIMIZATION TOOLS. You may not use the code generation or optimization tools in the software (such as compilers, linkers, assemblers, runtime code generators, and code generating design and modeling tools) to create programs, object code, libraries, assemblies, or executables to run on a platform other than Microsoft operating systems, run-time technologies, or application platforms. 7. BACKUP COPY. You may make one backup copy of the software. You may use it only to reinstall the software. 8. DOCUMENTATION. Any person that has valid access to your computer or internal network may copy and use the documentation for your internal, reference purposes. 9. TRANSFER TO A THIRD PARTY. The first user of the software may transfer it, and this agreement, directly to a third party. Before the transfer, that party must agree that this agreement applies to the transfer and use of the software. The first user must uninstall the software before transferring it separately from the device. The first user may not retain any copies. 10. Export Restrictions. The software is subject to United States export laws and regulations. You must comply with all domestic and international export laws and regulations that apply to the software. These laws include restrictions on destinations, end users and end use. For additional information, see www.microsoft.com/exporting. 11. SUPPORT SERVICES. Because this software is as is, we may not provide support services for it. 12. Entire Agreement. This agreement, and the terms for supplements, updates, Internet-based services and support services that you use, are the entire agreement for the software and support services. 13. Applicable Law. a. United States. If you acquired the software in the United States, Washington state law governs the interpretation of this agreement and applies to claims for breach of it, regardless of conflict of laws principles. The laws of the state where you live govern all other claims, including claims under state consumer protection laws, unfair competition laws, and in tort. b. Outside the United States. If you acquired the software in any other country, the laws of that country apply. 14. Legal Effect. This agreement describes certain legal rights. You may have other rights under the laws of your country. You may also have rights with respect to the

Altiris Inventory for Network Devices 7.5 from Symantec Third-Party Legal Notices Microsoft Windows Server 2008 Redistributables

31

party from whom you acquired the software. This agreement does not change your rights under the laws of your country if the laws of your country do not permit it to do so. 15. Disclaimer of Warranty. The software is licensed as-is. You bear the risk of using it. Microsoft gives no express warranties, guarantees or conditions. You may have additional consumer rights under your local laws which this agreement cannot change. To the extent permitted under your local laws, Microsoft excludes the implied warranties of merchantability, fitness for a particular purpose and non-infringement. 16. Limitation on and Exclusion of Remedies and Damages. You can recover from Microsoft and its suppliers only direct damages up to U.S. $5.00. You cannot recover any other damages, including consequential, lost profits, special, indirect or incidental damages. This limitation applies to

anything related to the software, services, content (including code) on third party Internet sites, or third party programs; and claims for breach of contract, breach of warranty, guarantee or condition, strict liability, negligence, or other tort to the extent permitted by applicable law.

It also applies even if Microsoft knew or should have known about the possibility of the damages. The above limitation or exclusion may not apply to you because your country may not allow the exclusion or limitation of incidental, consequential or other damages. Please note: As this software is distributed in Quebec, Canada, some of the clauses in this agreement are provided below in French. Remarque : Ce logiciel tant distribu au Qubec, Canada, certaines des clauses dans ce contrat sont fournies ci-dessous en franais. EXONRATION DE GARANTIE. Le logiciel vis par une licence est offert tel quel . Toute utilisation de ce logiciel est votre seule risque et pril. Microsoft naccorde aucune autre garantie expresse. Vous pouvez bnficier de droits additionnels en vertu du droit local sur la protection dues consommateurs, que ce contrat ne peut modifier. La ou elles sont permises par le droit locale, les garanties implicites de qualit marchande, dadquation un usage particulier et dabsence de contrefaon sont exclues. LIMITATION DES DOMMAGES-INTRTS ET EXCLUSION DE RESPONSABILIT POUR LES DOMMAGES. Vous pouvez obtenir de Microsoft et de ses fournisseurs une indemnisation en cas de dommages directs uniquement hauteur de 5,00 $ US. Vous ne pouvez prtendre aucune indemnisation pour les autres dommages, y compris les dommages spciaux, indirects ou accessoires et pertes de bnfices.

Altiris Inventory for Network Devices 7.5 from Symantec Third-Party Legal Notices Microsoft Windows Server 2008 Redistributables

32

Cette limitation concerne :

tout ce qui est reli au logiciel, aux services ou au contenu (y compris le code) figurant sur des sites Internet tiers ou dans des programmes tiers ; et les rclamations au titre de violation de contrat ou de garantie, ou au titre de responsabilit stricte, de ngligence ou dune autre faute dans la limite autorise par la loi en vigueur.

Elle sapplique galement, mme si Microsoft connaissait ou devrait connatre lventualit dun tel dommage. Si votre pays nautorise pas lexclusion ou la limitation de responsabilit pour les dommages indirects, accessoires ou de quelque nature que ce soit, il se peut que la limitation ou lexclusion ci-dessus ne sappliquera pas votre gard. EFFET JURIDIQUE. Le prsent contrat dcrit certains droits juridiques. Vous pourriez avoir dautres droits prvus par les lois de votre pays. Le prsent contrat ne modifie pas les droits que vous confrent les lois de votre pays si celles ci ne le permettent pas.

Index

A
agentless inventory about 8, 13 customizing 20 data mapping 21 gathering 14 home page 10 portal page 19 SNMP data mapping tables 10 task status 19 agentless inventory task 8, 10, 14 connection profile 14 creating 15, 17 protocol settings 14 schedule 18 viewing status 19 agentless inventory wizard 10, 1415

Inventory for Network Devices (continued) task. See agentless inventory tasks

M
MIB files importing 20 valid extensions to import 20

N
network devices data mapping 21 inventory 8, 14. See agentless inventory network devices inventory. See agentless inventory

P
protocol settings agentless inventory task 14

C
connection profiles agentless inventory 1314 context-sensitive help 10

R
Release Notes 10

D
data mapping network devices 21 documentation 10

S
SNMP data mapping 10 network devices 21 SNMP data mapping table creating 21 export 22 import 23 testing 22 viewing 21 SNMP-enabled devices inventory. See agentless inventory

H
help context-sensitive 10

I
inventory agentless inventory 13 network devices 8, 1415. See agentless inventory SNMP devices 13 Inventory for Network Devices about 8

T
task. See see agentless inventory task

Вам также может понравиться