inventory for network devices 7.5 user guide

33
AltirisInventory for Network Devices 7.5 from SymantecUser Guide

Upload: shahid-wahab-nawab

Post on 26-Nov-2015

48 views

Category:

Documents


0 download

DESCRIPTION

Symantec Altiris 7.5

TRANSCRIPT

Altiris™ Inventory forNetwork Devices 7.5 fromSymantec™ User Guide

Altiris™ Inventory for Network Devices 7.5 fromSymantec™ User Guide

The software described in this book is furnished under a license agreement and may be usedonly in accordance with the terms of the agreement.

Legal NoticeCopyright © 2013 Symantec Corporation. All rights reserved.

Symantec, the Symantec Logo, the Checkmark Logo, Altiris, and any Altiris or Symantectrademarks used in the product are trademarks or registered trademarks of SymantecCorporation or its affiliates in the U.S. and other countries. Other names may be trademarksof their respective owners.

This Symantec product may contain third party software for which Symantec is required toprovide attribution to the third party (“Third Party Programs”). Some of the Third Party Programsare available under open source or free software licenses. The License Agreementaccompanying the Licensed Software does not alter any rights or obligations you may haveunder those open source or free software licenses. For more information on the Third PartyPrograms, please see the Third Party Notice document for this Symantec product that maybe available at http://www.symantec.com/about/profile/policies/eulas/, the Third Party LegalNotice Appendix that may be included with this Documentation and/or Third Party Legal NoticeReadMe File that may accompany this Symantec product.

The product described in this document is distributed under licenses restricting its use, copying,distribution, and decompilation/reverse engineering. No part of this document may bereproduced in any form by any means without prior written authorization of SymantecCorporation and its licensors, if any.

THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIEDCONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIEDWARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE ORNON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCHDISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALLNOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTIONWITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THEINFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGEWITHOUT NOTICE.

The Licensed Software and Documentation are deemed to be commercial computer softwareas defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights inCommercial Computer Software or Commercial Computer Software Documentation", asapplicable, and any successor regulations. Any use, modification, reproduction release,performance, display or disclosure of the Licensed Software and Documentation by the U.S.Government shall be solely in accordance with the terms of this Agreement.

Symantec Corporation350 Ellis StreetMountain View, CA 94043

http://www.symantec.com

Technical SupportSymantec Technical Support maintains support centers globally. Technical Support’sprimary role is to respond to specific queries about product features and functionality.The Technical Support group also creates content for our online Knowledge Base.The Technical Support group works collaboratively with the other functional areaswithin Symantec to answer your questions in a timely fashion. For example, theTechnical Support group works with Product Engineering and Symantec SecurityResponse to provide alerting services and virus definition updates.

Symantec’s support offerings include the following:

■ A range of support options that give you the flexibility to select the right amountof service for any size organization

■ Telephone and/or Web-based support that provides rapid response andup-to-the-minute information

■ Upgrade assurance that delivers software upgrades

■ Global support purchased on a regional business hours or 24 hours a day, 7days a week basis

■ Premium service offerings that include Account Management Services

For information about Symantec’s support offerings, you can visit our website atthe following URL:

www.symantec.com/business/support/

All support services will be delivered in accordance with your support agreementand the then-current enterprise technical support policy.

Contacting Technical SupportCustomers with a current support agreement may access Technical Supportinformation at the following URL:

www.symantec.com/business/support/

Before contacting Technical Support, make sure you have satisfied the systemrequirements that are listed in your product documentation. Also, you should be atthe computer on which the problem occurred, in case it is necessary to replicatethe problem.

When you contact Technical Support, please have the following informationavailable:

■ Product release level

■ Hardware information

■ Available memory, disk space, and NIC information

■ Operating system

■ Version and patch level

■ Network topology

■ Router, gateway, and IP address information

■ Problem description:

■ Error messages and log files

■ Troubleshooting that was performed before contacting Symantec

■ Recent software configuration changes and network changes

Licensing and registrationIf your Symantec product requires registration or a license key, access our technicalsupport Web page at the following URL:

www.symantec.com/business/support/

Customer serviceCustomer service information is available at the following URL:

www.symantec.com/business/support/

Customer Service is available to assist with non-technical questions, such as thefollowing types of issues:

■ Questions regarding product licensing or serialization

■ Product registration updates, such as address or name changes

■ General product information (features, language availability, local dealers)

■ Latest information about product updates and upgrades

■ Information about upgrade assurance and support contracts

■ Information about the Symantec Buying Programs

■ Advice about Symantec's technical support options

■ Nontechnical presales questions

■ Issues that are related to CD-ROMs, DVDs, or manuals

Support agreement resourcesIf you want to contact Symantec regarding an existing support agreement, pleasecontact the support agreement administration team for your region as follows:

[email protected] and Japan

[email protected], Middle-East, and Africa

[email protected] America and Latin America

Technical Support ............................................................................................... 4

Chapter 1 Introducing Inventory for Network Devices .................... 8

About Inventory for Network Devices .................................................. 8About licensing Inventory for Network Devices ..................................... 9Components of Inventory for Network Devices ................................... 10Where to get more information ........................................................ 10

Chapter 2 Gathering agentless inventory ......................................... 13

About gathering agentless inventory ................................................. 13Gathering agentless inventory ......................................................... 14Creating agentless inventory tasks using the wizard ............................ 15Manually creating, scheduling, modifying, and stopping agentless

inventory tasks ....................................................................... 17Viewing agentless inventory results .................................................. 18

Chapter 3 Mapping network device data .......................................... 20

About SNMP data mapping ............................................................ 20Using SNMP data mapping tables .................................................... 21

Appendix A Altiris™ Inventory for Network Devices 7.5 fromSymantec™ Third-Party Legal Notices ...................... 24

Third-Party Legal Attributions .......................................................... 24RegExp ...................................................................................... 25Linux PCI ID Repository ................................................................. 25Linux USB ID Repository ............................................................... 26Microsoft Windows Server 2008 Redistributables ................................ 27

Index .................................................................................................................... 33

Contents

Introducing Inventory forNetwork Devices

This chapter includes the following topics:

■ About Inventory for Network Devices

■ About licensing Inventory for Network Devices

■ Components of Inventory for Network Devices

■ Where to get more information

About Inventory for Network DevicesInventory for Network Devices gathers inventory data from discovered devices inyour network. This inventory is gathered from the devices that are not managedthrough the Symantec Management Agent. Because a management agent is notrequired, this inventory is considered an agentless inventory.

Agentless inventory gathers inventory on the devices that are already discoveredand exist as resources in the Symantec Management Platform's ConfigurationManagement Database (CMDB).

Agentless inventory tasks run on discovered devices and report the data toNotification Server. The discovery data is stored in the CMDB. You can configurethe automated tasks that are scheduled to run at regular intervals to keep yourinventory data current.

You can gather inventory on the following types of devices:

■ Cluster

■ Computer

1Chapter

■ Computer: virtual machine

■ Infrastructure device

■ IP phone

■ KVM device

■ Network-attached storage

■ Network backup device

■ Network printer

■ Out-of-band management device

■ Out-of-band management device: chassis management controller

■ Physical rack

■ Physical enclosure

■ Physical bay

See “Gathering agentless inventory” on page 14.

Inventory for Network Devices gathers inventory only on SNMP-enabled networkdevices. You can determine the type of inventory that is gathered through SNMPdata mapping tables. The tables identify the data fields that you want to collect andapply the settings to selected device types.

Before you gather inventory on network devices, you must collect the data aboutthe SNMP-enabled devices on your network. Use the Network Discovery task todiscover your network devices. Make sure that the connection profile of theNetworkDiscovery task has the SNMP turned on.

For more information, see topics about Network Discovery in the IT ManagementSuite 7.5 Administration Guide at the following URL:

http://www.symantec.com/docs/DOC5330

About licensing Inventory for Network DevicesEach Symantec product includes a trial license that is installed by default. You canregister and obtain an extended trial license through the Symantec website at thefollowing URL:

http://www.symantec.com/business/products/activating/

You can also purchase a full product license.

Use the Symantec Installation Manager to install licenses.

9Introducing Inventory for Network DevicesAbout licensing Inventory for Network Devices

For more information about applying licenses to a solution, see the IT ManagementSuite 7.5 Administration Guide at the following URL:

http://www.symantec.com/docs/DOC5330

See “About Inventory for Network Devices” on page 8.

Components of Inventory for Network DevicesInventory for Network Devices runs on the Symantec Management Platform anduses the components of the platform.

See “About Inventory for Network Devices” on page 8.

Inventory for Network Devices includes the following components:

Table 1-1 Components of Inventory for Network Devices

DescriptionComponent

You create and schedule tasks to collectinventory on discovered devices.

See “Gathering agentless inventory”on page 14.

Inventory for Network Devices tasks (alsoknown as agentless inventory tasks)

You can use the wizard to easily createagentless inventory tasks.

See “Creating agentless inventory tasks usingthe wizard” on page 15.

Agentless inventory wizard

This portal page provides links to thecommonly used tasks and a summary ofinventory data.

Agentless Inventory Home page

These tables define the type of inventory datathat is gathered.

SNMP data mapping tables

Where to get more informationUse the following documentation resources to learn about and use this product.

10Introducing Inventory for Network DevicesComponents of Inventory for Network Devices

Table 1-2 Documentation resources

LocationDescriptionDocument

The Supported Products A-Z page, which is available at the followingURL:

http://www.symantec.com/business/support/index?page=products

Open your product's support page, and then under Common Topics,click Release Notes.

Information about newfeatures and importantissues.

Release Notes

■ The Documentation Library, which is available in the SymantecManagement Console on the Help menu.

■ The Supported Products A-Z page, which is available at thefollowing URL:http://www.symantec.com/business/support/index?page=productsOpen your product's support page, and then underCommon Topics,click Documentation.

Information about how touse this product,including detailedtechnical information andinstructions forperforming commontasks.

User Guide

The Documentation Library, which is available in the SymantecManagement Console on the Help menu.

Context-sensitive help is available for most screens in the SymantecManagement Console.

You can open context-sensitive help in the following ways:

■ Click the page and then press the F1 key.■ Use the Context command, which is available in the Symantec

Management Console on the Help menu.

Information about how touse this product,including detailedtechnical information andinstructions forperforming commontasks.

Help is available at thesolution level and at thesuite level.

This information isavailable in HTML helpformat.

Help

In addition to the product documentation, you can use the following resources tolearn about Symantec products.

Table 1-3 Symantec product information resources

LocationDescriptionResource

http://www.symantec.com/business/theme.jsp?themeid=support-knowledgebaseArticles, incidents, andissues about Symantecproducts.

SymWISESupportKnowledgebase

11Introducing Inventory for Network DevicesWhere to get more information

Table 1-3 Symantec product information resources (continued)

LocationDescriptionResource

http://www.symantec.com/connect/endpoint-management/forums/endpoint-management-documentation

Here is the list of links to various groups on Connect:

■ Deployment and Imaginghttp://www.symantec.com/connect/groups/deployment-and-imaging

■ Discovery and Inventoryhttp://www.symantec.com/connect/groups/discovery-and-inventory

■ ITMS Administratorhttp://www.symantec.com/connect/groups/itms-administrator

■ Mac Managementhttp://www.symantec.com/connect/groups/mac-management

■ Monitor Solution and Server Healthhttp://www.symantec.com/connect/groups/monitor-solution-and-server-health

■ Patch Managementhttp://www.symantec.com/connect/groups/patch-management

■ Reportinghttp://www.symantec.com/connect/groups/reporting

■ ServiceDesk and Workflowhttp://www.symantec.com/connect/workflow-servicedesk

■ Software Managementhttp://www.symantec.com/connect/groups/software-management

■ Server Managementhttp://www.symantec.com/connect/groups/server-management

■ Workspace Virtualization and Streaminghttp://www.symantec.com/connect/groups/workspace-virtualization-and-streaming

An online resource thatcontains forums, articles,blogs, downloads,events, videos, groups,and ideas for users ofSymantec products.

SymantecConnect

12Introducing Inventory for Network DevicesWhere to get more information

Gathering agentlessinventory

This chapter includes the following topics:

■ About gathering agentless inventory

■ Gathering agentless inventory

■ Creating agentless inventory tasks using the wizard

■ Manually creating, scheduling, modifying, and stopping agentless inventorytasks

■ Viewing agentless inventory results

About gathering agentless inventoryInventory for Network Devices lets you gather agentless inventory data from thediscovered SNMP network devices such as computers, network printers,network-attached storage devices, and network backup devices. To gather inventory,agentless tasks run on discovered devices and report the data to Notification Server.The data is stored in the Configuration Management Database (CMDB). You canconfigure the automated tasks that are scheduled to run at regular intervals to keepyour inventory data current.

See “About Inventory for Network Devices” on page 8.

See “Gathering agentless inventory” on page 14.

When you configure agentless inventory tasks, you specify the following:

■ Which devices to inventory

■ When to run the task

2Chapter

You can configure multiple tasks to meet your needs.

You can create and configure agentless inventory tasks in the following ways:

The wizard guides you through the creation and configurationof agentless inventory tasks. You can later edit the advancedsettings and schedules of a task on the task page.

See “Creating agentless inventory tasks using the wizard”on page 15.

Creating a task withAgentless Inventory wizard.

You can manually create tasks from theAgentless InventoryTasks Web Part. This option lets you configure moreadvanced settings and schedules.

See “Manually creating, scheduling, modifying, and stoppingagentless inventory tasks” on page 17.

Creating a task manually

You can only gather inventory from the SNMP-enabled devices on your networkthat are already discovered. Run the Network Discovery task to discover yournetwork devices and create resources for them in the CMDB. Make sure that theconnection profile of the Network Discovery task has the SNMP turned on.

For more information, see topics about Network Discovery in the IT ManagementSuite 7.5 Administration Guide at the following URL:

http://www.symantec.com/docs/DOC5330

Agentless inventory tasks use connection profiles to manage the protocols that areused to communicate with network devices. Connection profiles are componentsof the Symantec Management Platform. When a device is discovered, a resourcefor that device is created in the CMDB. The resource keeps a record of the protocolsthat were used to communicate with the device. When you use agentless inventorytasks, you do not specify a connection profile or protocols. Agentless inventorytasks automatically use the same protocols that were enabled when the device wasdiscovered.

For more information, see the topics about resource discovery and using connectionprofiles in the IT Management Suite 7.5 Administration Guide at the following URL:

http://www.symantec.com/docs/DOC5330

Gathering agentless inventoryYou can gather agentless inventory data from discovered SNMP-enabled networkdevices and enter that data in the Configuration Management Database (CMDB).

See “About gathering agentless inventory” on page 13.

14Gathering agentless inventoryGathering agentless inventory

The process for gathering agentless inventory from network devices is as follows:

Table 2-1 Process for gathering inventory of network devices

DescriptionActionStep

You can only gather inventory of thedevices that are already discovered.

For more information, see topics aboutNetwork Discovery in the ITManagement Suite 7.5 AdministrationGuide at the following URL:

http://www.symantec.com/docs/DOC5330

Discover network devices.Step 1

SNMP data mapping tables identify thedata fields that you want to gather andapply the settings to the selected devicetypes.

See “Using SNMP data mapping tables”on page 21.

Use SNMP data mapping tables todefine how to map SNMP devicesto the data that you want to gather.

Step 2

You create and schedule tasks to collectinventory. You can create the taskseither with inventory wizard or manually.

See “Creating agentless inventory tasksusing the wizard” on page 15.

See “Manually creating, scheduling,modifying, and stopping agentlessinventory tasks” on page 17.

Create agentless inventory tasks.Step 3

You can view the gathered inventorydata in the Resource Manager or on theAgentless Inventory page.

See “Viewing agentless inventoryresults” on page 18.

View agentless inventory data.Step 4

Creating agentless inventory tasks using the wizardThe wizard guides you through the process of creating agentless inventory tasksand configuring basic settings. You can later configure the advanced settings andschedule the tasks on the task page.

This task is a step in the process of gathering agentless inventory from networkdevices.

15Gathering agentless inventoryCreating agentless inventory tasks using the wizard

See “Gathering agentless inventory” on page 14.

Before you perform theis step, ensure that you have mapped the SNMP devicesto the data that you want to gather.

See “Using SNMP data mapping tables” on page 21.

To create agentless inventory tasks for network devices using the inventorywizard

1 In the Symantec Management Console, on the Home menu, click Discoveryand Inventory > Agentless Inventory.

2 In theAgentless InventoryQuick StartWeb Part, clickRun inventorywizard.

3 In the Agentless inventory task creation wizard, on the Choose devicesto inventory page, do the following:

■ Select Choose devices, and then, in the drop-down list, click the group oftarget devices that you want to gather inventory from.For more information, see topics about using filters and organizational viewsin the IT Management Suite 7.5 Administration Guide at the following URL:http://www.symantec.com/docs/DOC5330

■ Under Include Device Types, check the types of devices that you want togather inventory from.

■ (Optional) To gather inventory from an individual device, in the wizard,select Individual device, and then, in the drop-down list, click the devicethat you want to gather inventory fromThis list includes all SNMP-enabled devices that have been previouslydiscovered and have resources in the Configuration Management Database(CMDB).

4 On the Inventory network task name page, type a name for the task, andthen click Next.

5 On the Schedule task page, configure the task schedule, and then click Finish.

6 (Optional) To view the created task, do one of the following:

■ In the Symantec Management Console, on theHomemenu, clickDiscoveryand Inventory > Agentless Inventory, and then view the task in theAgentless Inventory Tasks Web Part.Note that to view the newly created task, you may need to click theRefreshsymbol.

■ In the Symantec Management Console, on the Manage menu, click Jobsand Tasks, and then, in the left pane, under Jobs / Tasks, expand SystemJobs and Tasks > Discovery and Inventory.

The next step is to view the agentless inventory data.

16Gathering agentless inventoryCreating agentless inventory tasks using the wizard

See “Viewing agentless inventory results” on page 18.

Manually creating, scheduling, modifying, andstopping agentless inventory tasks

You can manually create, modify, and stop agentless inventory tasks on theAgentless Inventory Home page.

See “About gathering agentless inventory” on page 13.

This task is a step in the process for gathering agentless inventory.

See “Gathering agentless inventory” on page 14.

Before you perform these steps, ensure that you have mapped the SNMP devicesto the data that you want to gather.

See “Using SNMP data mapping tables” on page 21.

To manually create agentless inventory tasks

1 In the Symantec Management Console, on the Home menu, click Discoveryand Inventory > Agentless Inventory.

2 In the Agentless Inventory Tasks Web Part, on the Available Tasks tab, onthe toolbar, click New.

3 In the New Agentless Inventory Task dialog box, give the task a descriptivename, and then do the following:

■ Select Group of Devices, and then, in the drop-down list, click the groupof devices that you want to gather inventory from.For more information, see the topics about using filters and organizationalviews in the IT Management Suite 7.5 Administration Guide at the followingURL:http://www.symantec.com/docs/DOC5330

■ Under Group of Devices, check the types of devices that you want togather inventory from.

■ (Optional) To gather inventory from an individual device, select Individualdevice, and then, in the drop-down list, click the device that you want togather inventory fromThis list includes all SNMP-enabled devices that have been previouslydiscovered and have resources in the Configuration Management Database(CMDB).

■ (Optional) Click Advanced, specify the maximum number of threads perinventory task, and then click OK.

17Gathering agentless inventoryManually creating, scheduling, modifying, and stopping agentless inventory tasks

During the inventory process, a separate thread is used for each device.The maximum number of threads is based on the amount of traffic that youwant this task to generate and on the capacity of your Notification Servercomputer.

4 Click OK.

To schedule agentless inventory tasks

1 In the Symantec Management Console, on the Home menu, click Discoveryand Inventory > Agentless Inventory.

2 In the Agentless Inventory Tasks Web Part, on the Available Tasks tab,click the task that you want to schedule, and then click Schedule.

3 In the New Schedule dialog box, configure the task schedule according toyour needs, and then click Schedule.

To configure or stop agentless inventory tasks

1 In the Symantec Management Console, on the Home menu, click Discoveryand Inventory > Agentless Inventory.

2 In the Agentless Inventory Tasks Web Part, on the Available Tasks tab,click the task that you want to schedule, and then do one of the following:

■ To configure the task run schedule, on the toolbar, click Schedule.In the New Schedule dialog box, configure the task according to yourneeds, and then click Schedule.

■ To configure the task settings, on the toolbar, click the Edit symbol.In the New Agentless Inventory Task dialog box, configure the taskaccording to your needs, and then click OK.

■ To stop the task, click the Tasks Run tab, click the task that you want tostop, and then, on the toolbar, click Stop.

The next step is to view the agentless inventory data.

See “Viewing agentless inventory results” on page 18.

Viewing agentless inventory resultsThe data collected by the inventory tasks is stored in the CMDB.

You can view the collected data and the additional details about the devices in theResource Manager or on the Agentless Inventory Home page

For more information, see the topics about Resource Manager in the ITManagement Suite 7.5 Administration Guide at the following URL:

18Gathering agentless inventoryViewing agentless inventory results

http://www.symantec.com/docs/DOC5330

The Agentless Inventory Home page presents a data summary of inventoriednetwork devices. On this page you can also see the status of agentless inventorytasks.

This task is a step in the process for gathering agentless inventory.

See “Gathering agentless inventory” on page 14.

To view agentless inventory data in the Resource Manager

1 In the Symantec Management Console, on theManagemenu, clickResource.

2 In the Select Resource dialog box, click the resource that you want to view,and then click OK.

3

To view agentless inventory data on the Agentless Inventory Home page

1 In the Symantec Management Console, on the Home menu, click Dicoveryand Inventory > Agentless Inventory.

2 On the Agentless Inventory Home page, view the Devices Inventoried ByType (Last 30 Days) and Agentless Inventory Tasks Web Parts.

3 On the Resource Manager page, on the toolbar, click View > Inventory, andthen, in the navigation pane, underData Classes, navigate toNetwork DeviceData to view the inventory data.

19Gathering agentless inventoryViewing agentless inventory results

Mapping network devicedata

This chapter includes the following topics:

■ About SNMP data mapping

■ Using SNMP data mapping tables

About SNMP data mappingSNMP data mapping tables let you define how to map SNMP devices to the datathat you want to gather. Inventory for Network Devices provides predefined SNMPdata mapping tables for common SNMP devices. The predefined tables are read-onlyand cannot be edited.

You can also create your own custom SNMP data mapping tables.

See “Using SNMP data mapping tables” on page 21.

When you create a new SNMP data mapping table, you specify ManagementInformation Base (MIB) data objects, also known as MIB files or MIBs. MIBs arethe data objects that are defined in the database. An SNMP manager uses themto control hardware and software resources. MIBs let you expand the data fieldsthat can be collected when inventory runs. Inventory for Network Devices providesmany MIBs of the leading hardware manufacturers. You can also import additionalMIBs using the MIB Import task. The MIB files that you import with the MIB Importtask can have the .MIB, .MY, or any other file extension for MIB files.

For more information, see the topic about importing MIB files using the MIB importtask in the IT Management Suite 7.5 Administration Guide at the following URL:

http://www.symantec.com/docs/DOC5330

3Chapter

When you map SNMP data mapping tables to a device, you choose a device froma list of classified SNMP devices. This list includes the SNMP devices that areconfigured on the SNMP Device Classifications page of Network Discovery.

Using SNMP data mapping tablesSNMP data mapping tables let you define how to map SNMP devices to the datathat you want to gather. Inventory for Network Devices provides predefined SNMPdata mapping tables for common SNMP devices. The predefined tables are read-onlyand cannot be edited.

See “About SNMP data mapping” on page 20.

If you manage network devices in a large infrastructure, you can export configuredSNMP data mapping tables and send them to other locations within yourorganization. This method is an easy way to ensure that all Notification Serversthat use Inventory for Network Devices gather the same inventory.

See “To export an SNMP data mapping table” on page 22.

You can also test table definitions to ensure that you have defined the field valuesfor a table definition correctly. When you test the table, you test it on a single devicethat you specify.

See “To test an SNMP data mapping table on a single device” on page 22.

To view an SNMP data mapping table

1 In the SymantecManagement Console, on theHomemenu, click Discoveryand Inventory > Agentless Inventory.

2 On the Agentless Inventory Home page, in the Agentless Inventory QuickStart Web Part, click Data mapping tables.

3 On the SNMP Data Mapping Tables page, in the left pane, click the table thatyou want to view.

4 In the right pane, on the Table details tab, view table details.

On the Device mappings tab, view the SNMP devices to which the table ismapped.

To create a new SNMP data mapping table

1 In the SymantecManagement Console, on theHomemenu, click Discoveryand Inventory > Agentless Inventory.

2 On the Agentless Inventory Home page, in the Agentless Inventory QuickStart Web Part, click Data mapping tables.

3 On the SNMP Data Mapping Tables page, on the toolbar, click New.

21Mapping network device dataUsing SNMP data mapping tables

4 In the New Table dialog box, type a new table name, and then click OK.

5 In the right pane, under Table Columns, on the toolbar, click New.

6 In the Edit Row Values dialog box, do the following:

■ Type the name and length of the row.The length of some types is predefined.

■ (Optional) Check Key to enable the row to be a primary key in the datatable.

■ Click Select OID to select an Object ID.The Object ID is mapped to the source of the protocol information. Forexample, it can map to the Object ID for an SNMP query.In the Object ID Selection Tool dialog box, in the mib drop-down list,choose an Object ID according to your needs, and then click Save changes.

7 Click OK.

8 Click Save changes.

9 Click the Device Mappings tab, and check the devices that you want to applythis table to.

10 Click Test on device.

In the Test Table Mappings on Device dialog box, in the Host address box,type the host address or host name of the device that you want to test, andthen click Test.

The data appears if a valid response is received from the device.

Click Close.

11 Click Save changes.

To test an SNMP data mapping table on a single device

1 Either in a new table or in the details of an existing table, click Test on Device.

2 Enter the host address or host name of the device you want to test.

3 Click Test.

The data appears if a valid response is received from the device.

To export an SNMP data mapping table

1 In the Symantec Management Console, on the Home menu, click Discoveryand Inventory > Agentless Inventory.

2 On the Agentless Inventory Home page, in the Agentless Inventory QuickStart Web Part, click Data mapping tables.

22Mapping network device dataUsing SNMP data mapping tables

3 On the SNMP Data Mapping Tables page, in the left pane, click the table thatyou want to export, in the upper left corner, click the Tools icon, and then clickExport.

4 In the dialog box that open, choose the directory where you want to export thefile, and then click Save.

By default, the file name is the same as the table name.

To import an SNMP data mapping table

1 In the Symantec Management Console, on the Home menu, click Discoveryand Inventory > Agentless Inventory.

2 On the Agentless Inventory Home page, in the Agentless Inventory QuickStart Web Part, click Data mapping tables.

3 On the SNMP Data Mapping Tables page, in the left pane, click Import.

4 Browse to the file that you want to import, and then click OK.

23Mapping network device dataUsing SNMP data mapping tables

Altiris™ Inventory forNetwork Devices 7.5 fromSymantec™ Third-PartyLegal Notices

This appendix includes the following topics:

■ Third-Party Legal Attributions

■ RegExp

■ Linux PCI ID Repository

■ Linux USB ID Repository

■ Microsoft Windows Server 2008 Redistributables

Third-Party Legal AttributionsThis Symantec product may contain third party software for which Symantec isrequired to provide attribution (“Third Party Programs”). Some of the Third PartyPrograms are available under open source or free software licenses. The LicenseAgreement accompanying the Software does not alter any rights or obligations youmay have under those open source or free software licenses. This appendix containsproprietary notices for the Third Party Programs and the licenses for the Third PartyPrograms, where applicable.

AAppendix

RegExpCopyright (C) 1991 Texas Instruments Incorporated

Copyright (c) 1986 by University of Toronto, Written by Henry Spencer

MIT License

This code is licensed under the license terms below, granted by the copyright holderlisted above. The term copyright holder” in the license below means the copyrightholder listed above.

Copyright (c) <year> <copyright holders>

Permission is hereby granted, free of charge, to any person obtaining a copy of thissoftware and associated documentation files (the "Software"), to deal in the Softwarewithout restriction, including without limitation the rights to use, copy, modify, merge,publish, distribute, sublicense, and/or sell copies of the Software, and to permitpersons to whom the Software is furnished to do so, subject to the followingconditions:

The above copyright notice and this permission notice shall be included in all copiesor substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIESOF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE ANDNONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHTHOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISINGFROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OROTHER DEALINGS IN THE SOFTWARE.

Linux PCI ID RepositoryCopyright (c) 2007, pciids project All rights reserved.

This code is licensed under the license terms below, granted by the copyright holderlisted above. The terms “owner” and “organization” in the license below mean thecopyright holder listed above.

Copyright (c) <YEAR>, <OWNER>

All rights reserved.

Redistribution and use in source and binary forms, with or without modification, arepermitted provided that the following conditions are met:

25Altiris™ Inventory for Network Devices 7.5 from Symantec™ Third-Party Legal NoticesRegExp

■ Redistributions of source code must retain the above copyright notice, this listof conditions and the following disclaimer.

■ Redistributions in binary form must reproduce the above copyright notice, thislist of conditions and the following disclaimer in the documentation and/or othermaterials provided with the distribution.

■ Neither the name of the <ORGANIZATION> nor the names of its contributorsmay be used to endorse or promote products derived from this software withoutspecific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS ANDCONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OFMERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AREDISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER ORCONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUTNOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVERCAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IFADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Linux USB ID RepositoryCopyright (c) 2008, Stephen J. Gowdy All rights reserved.

Copyright (c) <YEAR>, <OWNER>

All rights reserved.

Redistribution and use in source and binary forms, with or without modification, arepermitted provided that the following conditions are met:

■ Redistributions of source code must retain the above copyright notice, this listof conditions and the following disclaimer.

■ Redistributions in binary form must reproduce the above copyright notice, thislist of conditions and the following disclaimer in the documentation and/or othermaterials provided with the distribution.

■ Neither the name of the <ORGANIZATION> nor the names of its contributorsmay be used to endorse or promote products derived from this software withoutspecific prior written permission.

26Altiris™ Inventory for Network Devices 7.5 from Symantec™ Third-Party Legal NoticesLinux USB ID Repository

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS ANDCONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES,INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OFMERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AREDISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER ORCONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUTNOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVERCAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IFADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Microsoft Windows Server 2008 RedistributablesCopyright © 2008 Microsoft Corporation. All rights reserved.

Microsoft Chart Controls for Microsoft .NET Framework

MICROSOFT SOFTWARE LICENSE TERMS

MICROSOFT WINDOWS SOFTWARE DEVELOPMENT KIT for Windows Server2008 and .NET Framework 3.5

These license terms are an agreement between Microsoft Corporation (or basedon where you live, one of its affiliates) and you. Please read them. They apply tothe software named above, which includes the media on which you received it, ifany. The terms also apply to any Microsoft

■ updates,

■ supplements,

■ Internet-based services, and

■ support services

for this software, unless other terms accompany those items. If so, those termsapply.

BY USING THE SOFTWARE, YOU ACCEPT THESE TERMS. IF YOU DO NOTACCEPT THEM, DO NOT USE THE SOFTWARE.

If you comply with these license terms, you have the rights below.

1. INSTALLATION AND USE RIGHTS.

27Altiris™ Inventory for Network Devices 7.5 from Symantec™ Third-Party Legal NoticesMicrosoft Windows Server 2008 Redistributables

a. Installation and Use. One user may install and use any number of copies of thesoftware on your devices to design, develop and test your programs that run on aMicrosoft Windows operating system.

b. Included Microsoft Programs. The software contains other Microsoft programs.These license terms apply to your use of those programs.

2. ADDITIONAL LICENSING REQUIREMENTS AND/OR USE RIGHTS.

a. Distributable Code. The software contains code that you are permitted to distributein programs you develop if you comply with the terms below.

i. Right to Use and Distribute. The code and text files listed below are “DistributableCode.”

■ REDIST.TXT Files. You may copy and distribute the object code form of codelisted in REDIST.TXT files.

■ Sample Code. You may modify, copy, and distribute the source and object codeform of code marked as “sample.”

■ Microsoft Merge Modules. You may copy and distribute the unmodified outputof Microsoft Merge Modules.

■ Third Party Distribution. You may permit distributors of your programs to copyand distribute the Distributable Code as part of those programs.

ii. Distribution Requirements. For any Distributable Code you distribute, you must

■ add significant primary functionality to it in your programs;

■ for any Distributable Code having a filename extension of .lib, distribute onlythe results of running such Distributable Code through a linker with yourapplication;

■ distribute Distributable Code included in a setup program only as part of thatsetup program without modification;

■ require distributors and external end users to agree to terms that protect it atleast as much as this agreement;

■ display your valid copyright notice on your programs;

■ for Distributable Code from the Windows Media Services SDK portions of thesoftware, include in your program’s Help-About box (or in another obvious placeif there is no box) the following copyright notice: “Portions utilize MicrosoftWindows Media Technologies. Copyright (c) 2006 Microsoft Corporation. AllRights Reserved”; and

■ indemnify, defend, and hold harmless Microsoft from any claims, includingattorneys’ fees, related to the distribution or use of your programs.

iii. Distribution Restrictions. You may not

28Altiris™ Inventory for Network Devices 7.5 from Symantec™ Third-Party Legal NoticesMicrosoft Windows Server 2008 Redistributables

■ alter any copyright, trademark or patent notice in the Distributable Code;

■ use Microsoft’s trademarks in your programs’ names or in a way that suggestsyour programs come from or are endorsed by Microsoft;

■ include Distributable Code in malicious, deceptive or unlawful programs; or

■ modify or distribute the source code of any Distributable Code so that any partof it becomes subject to an Excluded License. An Excluded License is one thatrequires, as a condition of use, modification or distribution, that

■ the code be disclosed or distributed in source code form; or

■ others have the right to modify it.

b. Additional Functionality. Microsoft may provide additional functionality for thesoftware. Other license terms and fees may apply.

3. INTERNET-BASED SERVICES. Microsoft provides Internet-based services withthe software. It may change or cancel them at any time. You may not use thisservice in any way that could harm it or impair anyone else’s use of it. You may notuse the service to try to gain unauthorized access to any service, data, account ornetwork by any means.

4. MICROSOFT .NET BENCHMARK TESTING. The software includes one or morecomponents of the .NET Framework 3.5 (“.NET Components”). You may conductinternal benchmark testing of those components. You may disclose the results ofany benchmark test of those components, provided that you comply with theconditions set forth at http://go.microsoft.com/fwlink/?LinkID=66406. Notwithstandingany other agreement you may have with Microsoft, if you disclose such benchmarktest results, Microsoft shall have the right to disclose the results of benchmark testsit conducts of your products that compete with the applicable .NET Component,provided it complies with the same conditions set forth athttp://go.microsoft.com/fwlink/?LinkID=66406.

5. Scope of License. The software is licensed, not sold. This agreement only givesyou some rights to use the software. Microsoft reserves all other rights. Unlessapplicable law gives you more rights despite this limitation, you may use the softwareonly as expressly permitted in this agreement. In doing so, you must comply withany technical limitations in the software that only allow you to use it in certain ways.For more information, see www.microsoft.com/licensing/userights. You may not

■ work around any technical limitations in the software;

■ reverse engineer, decompile or disassemble the software, except and only tothe extent that applicable law expressly permits, despite this limitation;

■ make more copies of the software than specified in this agreement or allowedby applicable law, despite this limitation;

29Altiris™ Inventory for Network Devices 7.5 from Symantec™ Third-Party Legal NoticesMicrosoft Windows Server 2008 Redistributables

■ publish the software for others to copy;

■ rent, lease or lend the software; or

■ use the software for commercial software hosting services.

6. CODE GENERATION AND OPTIMIZATION TOOLS. You may not use the codegeneration or optimization tools in the software (such as compilers, linkers,assemblers, runtime code generators, and code generating design and modelingtools) to create programs, object code, libraries, assemblies, or executables to runon a platform other than Microsoft operating systems, run-time technologies, orapplication platforms.

7. BACKUP COPY. You may make one backup copy of the software. You may useit only to reinstall the software.

8. DOCUMENTATION. Any person that has valid access to your computer or internalnetwork may copy and use the documentation for your internal, reference purposes.

9. TRANSFER TO A THIRD PARTY. The first user of the software may transfer it,and this agreement, directly to a third party. Before the transfer, that party mustagree that this agreement applies to the transfer and use of the software. The firstuser must uninstall the software before transferring it separately from the device.The first user may not retain any copies.

10. Export Restrictions. The software is subject to United States export laws andregulations. You must comply with all domestic and international export laws andregulations that apply to the software. These laws include restrictions on destinations,end users and end use. For additional information, see www.microsoft.com/exporting.

11. SUPPORT SERVICES. Because this software is “as is,” we may not providesupport services for it.

12. Entire Agreement. This agreement, and the terms for supplements, updates,Internet-based services and support services that you use, are the entire agreementfor the software and support services.

13. Applicable Law.

a. United States. If you acquired the software in the United States, Washingtonstate law governs the interpretation of this agreement and applies to claims forbreach of it, regardless of conflict of laws principles. The laws of the state whereyou live govern all other claims, including claims under state consumer protectionlaws, unfair competition laws, and in tort.

b. Outside the United States. If you acquired the software in any other country, thelaws of that country apply.

14. Legal Effect. This agreement describes certain legal rights. You may have otherrights under the laws of your country. You may also have rights with respect to the

30Altiris™ Inventory for Network Devices 7.5 from Symantec™ Third-Party Legal NoticesMicrosoft Windows Server 2008 Redistributables

party from whom you acquired the software. This agreement does not change yourrights under the laws of your country if the laws of your country do not permit it todo so.

15. Disclaimer of Warranty. The software is licensed “as-is.” You bear the risk ofusing it. Microsoft gives no express warranties, guarantees or conditions. You mayhave additional consumer rights under your local laws which this agreement cannotchange. To the extent permitted under your local laws, Microsoft excludes theimplied warranties of merchantability, fitness for a particular purpose andnon-infringement.

16. Limitation on and Exclusion of Remedies and Damages. You can recover fromMicrosoft and its suppliers only direct damages up to U.S. $5.00. You cannot recoverany other damages, including consequential, lost profits, special, indirect or incidentaldamages.

This limitation applies to

■ anything related to the software, services, content (including code) on third partyInternet sites, or third party programs; and

■ claims for breach of contract, breach of warranty, guarantee or condition, strictliability, negligence, or other tort to the extent permitted by applicable law.

It also applies even if Microsoft knew or should have known about the possibilityof the damages. The above limitation or exclusion may not apply to you becauseyour country may not allow the exclusion or limitation of incidental, consequentialor other damages.

Please note: As this software is distributed in Quebec, Canada, some of the clausesin this agreement are provided below in French.

Remarque : Ce logiciel étant distribué au Québec, Canada, certaines des clausesdans ce contrat sont fournies ci-dessous en français.

EXONÉRATION DE GARANTIE. Le logiciel visé par une licence est offert « tel quel». Toute utilisation de ce logiciel est à votre seule risque et péril. Microsoft n’accordeaucune autre garantie expresse. Vous pouvez bénéficier de droits additionnels envertu du droit local sur la protection dues consommateurs, que ce contrat ne peutmodifier. La ou elles sont permises par le droit locale, les garanties implicites dequalité marchande, d’adéquation à un usage particulier et d’absence de contrefaçonsont exclues.

LIMITATION DES DOMMAGES-INTÉRÊTS ET EXCLUSION DE RESPONSABILITÉPOUR LES DOMMAGES. Vous pouvez obtenir de Microsoft et de ses fournisseursune indemnisation en cas de dommages directs uniquement à hauteur de 5,00 $US. Vous ne pouvez prétendre à aucune indemnisation pour les autres dommages,y compris les dommages spéciaux, indirects ou accessoires et pertes de bénéfices.

31Altiris™ Inventory for Network Devices 7.5 from Symantec™ Third-Party Legal NoticesMicrosoft Windows Server 2008 Redistributables

Cette limitation concerne :

■ tout ce qui est relié au logiciel, aux services ou au contenu (y compris le code)figurant sur des sites Internet tiers ou dans des programmes tiers ; et

■ les réclamations au titre de violation de contrat ou de garantie, ou au titre deresponsabilité stricte, de négligence ou d’une autre faute dans la limite autoriséepar la loi en vigueur.

Elle s’applique également, même si Microsoft connaissait ou devrait connaîtrel’éventualité d’un tel dommage. Si votre pays n’autorise pas l’exclusion ou lalimitation de responsabilité pour les dommages indirects, accessoires ou de quelquenature que ce soit, il se peut que la limitation ou l’exclusion ci-dessus ne s’appliquerapas à votre égard.

EFFET JURIDIQUE. Le présent contrat décrit certains droits juridiques. Vouspourriez avoir d’autres droits prévus par les lois de votre pays. Le présent contratne modifie pas les droits que vous confèrent les lois de votre pays si celles ci nele permettent pas.

32Altiris™ Inventory for Network Devices 7.5 from Symantec™ Third-Party Legal NoticesMicrosoft Windows Server 2008 Redistributables

Aagentless inventory

about 8, 13customizing 20data mapping 21gathering 14home page 10portal page 19SNMP data mapping tables 10task status 19

agentless inventory task 8, 10, 14connection profile 14creating 15, 17protocol settings 14schedule 18viewing status 19

agentless inventory wizard 10, 14–15

Cconnection profiles

agentless inventory 13–14context-sensitive help 10

Ddata mapping

network devices 21documentation 10

Hhelp

context-sensitive 10

Iinventory

agentless inventory 13network devices 8, 14–15. See agentless

inventorySNMP devices 13

Inventory for Network Devicesabout 8

Inventory for Network Devices (continued)task. See agentless inventory tasks

MMIB files

importing 20valid extensions to import 20

Nnetwork devices

data mapping 21inventory 8, 14. See agentless inventory

network devices inventory. See agentless inventory

Pprotocol settings

agentless inventory task 14

RRelease Notes 10

SSNMP data mapping 10

network devices 21SNMP data mapping table

creating 21export 22import 23testing 22viewing 21

SNMP-enabled devicesinventory. See agentless inventory

Ttask. See see agentless inventory task

Index