Network Scan Policies specify which discovery engine is used and how the engine searches the network during discovery operations. You can create user-defined policies or use the predefined policies automatically installed by CA Configuration Automation. Network Scan Policies are assigned to Network Profiles, which are then assigned to networks.
Note: The predefined policies that were installed with CA Configuration Automation can be identified by the name system_user in the Created By column. If the default profiles have been modified, the Modified By column also displays a user name.
These policies and their descriptions can also be viewed in the UI, but because the policies can be edited, they are described in this document as they are originally installed.
CA Configuration Automation includes the following predefined Network Scan Policies:
Specifies that the ARP Cache engine begins discovery with the supplied Gateway Router and recursively discovers routers in the network. It leverages SNMP to interrogate the ARP cache of each router in order to discover both the underlying entities as well as other routers in the network. This Scan Policy implements the option to ask the engine to interrogate the ARP cache of the underlying entities in order to provide a more exhaustive discovery of the network (at the cost of time). This scan policy also directs the use of the Softagent technology in order to provide a more detailed discovery of each entity for which it has credentials.
Specifies that the ARP Cache engine begins discovery with the supplied Gateway Router and recursively discovers routers in the network. It leverages SNMP to interrogate the ARP cache of each router in order to discover both the underlying entities as well as other routers in the network. This scan policy also directs the use of the Softagent technology in order to provide a more detailed discovery of each entity for which it has credentials.
Specifies that the ARP Cache engine begins discovery with the supplied Gateway Router and recursively discovers routers in the network. It leverages SNMP to interrogate the ARP cache of each router in order to discover both the underlying entities as well as other routers in the network. This Scan Policy implements the option to ask the engine to interrogate the ARP cache of the underlying entities in order to provide a more exhaustive discovery of the network (at the cost of time). This scan policy also directs the use of the Softagent technology in order to provide a more detailed discovery of each entity for which it has credentials. Note however, in this case, the Softagent processing is configured to ignore network connections and the detection of open ports.
Specifies that the ARP Cache engine begins discovery with the supplied Gateway Router and recursively discovers routers in the network. It leverages SNMP to interrogate the ARP cache of each router in order to discover both the underlying entities as well as other routers in the network. This Scan Policy implements the option to ask the engine to interrogate the ARP cache of the underlying entities in order to provide a more exhaustive discovery of the network (at the cost of time).
The ARP Cache engine begins discovery with the supplied Gateway Router and recursively discovers routers in the network It leverages SNMP to interrogate the ARP cache of each router in order to discover both the underlying entities as well as other routers in the network. However, this Scan Policy restricts the ARP cache interrogation to the routers, and not their underlying entities in order to provide a more efficient network discovery (at the cost of exhaustive detail).
The Cloud Service engine performs discovery by connecting to the Cloud service provider against each of the possible IP address or host name targets. This scan policy also directs the use of the Softagent technology in order to provide a more detailed discovery of each entity for which it has credentials. Note however, in this case, the Softagent processing is configured to gather network connections which include the detection of open ports and the detection of remote machines that have established connections with the server currently being discovered. Also note that these remote machines are added to the CCA DB so that relationships can be conveyed between the two servers.
Note: Open the firewall for the WMI and SSH to perform the soft agent discovery when you select the Cloud Service Scan with Soft agent policy to discover the servers Ec2 cloud.
The Cloud Service engine performs discovery by connecting to the Cloud service provider against each of the possible IP address or host name targets.
Specifies that the DNS engine interrogates a given DNS server in order to discover all of the defined entities within a given DNS domain. This scan policy also directs the use of the Softagent technology in order to provide a more detailed discovery of each entity for which it has credentials.
Specifies that the DNS engine interrogates a given DNS server in order to discover all of the defined entities within a given DNS domain. This scan policy also directs the use of the Softagent technology in order to provide a more detailed discovery of each entity for which it has credentials. Note however, in this case, the Softagent processing is configured to ignore network connections and the detection of open ports.
Specifies that the DNS engine interrogates a given DNS server in order to discover all of the defined entities within a given DNS domain.
In an IPv6 network, the Local Link engine discovers all entities on the local segment of the network. This scan policy also directs the use of the Softagent technology in order to provide a more detailed discovery of each entity for which it has credentials.
Specifies that in an IPv6 network, the Local Link engine will discover all entities on the local segment of the network. This scan policy also directs the use of the Softagent technology in order to provide a more detailed discovery of each entity for which it has credentials. Note however, in this case, the Softagent processing is configured to ignore network connections and the detection of open ports.
Specifies that in an IPv6 network, the Local Link engine discovers all entities on the local segment of the network.
Specifies that the Netflow Analysis engine leverages Netflow feeds from routers in order to passively monitor and analyze network traffic to identify entities, their applications, and their inter-machine relationships. In order to perform a continuous scan, this policy can be scheduled to run every 15 minutes. This scan policy also directs the use of the Softagent technology in order to provide a more detailed discovery of each entity for which it has credentials.
Specifies that the Netflow Analysis engine leverages Netflow feeds from routers in order to passively monitor and analyze network traffic to identify entities, their applications, and their inter-machine relationships. In order to perform a continuous scan, this policy can be scheduled to run every 15 minutes.
Specifies that the Packet Analysis engine leverages packet sniffing methodology to passively monitor and analyze network traffic in order to identify entities, their applications, and their inter-machine relationships on the local segment of the network. In order to perform a continuous scan, this policy can be scheduled to run every 15 minutes. This scan policy also directs the use of the Softagent technology in order to provide a more detailed discovery of each entity for which it has credentials.
Specifies that the Packet Analysis engine leverages packet sniffing methodology to passively monitor and analyze network traffic in order to identify entities, their applications, and their inter-machine relationships on the local segment of the network. In order to perform a continuous scan, this policy can be scheduled to run every 15 minutes.
Specifies that the Pingsweep engine performs discovery based on brute force methodology, generating ICMP Ping requests against each of the possible IP address or host name targets. This scan policy also directs the use of the Softagent technology in order to provide a more detailed discovery of each entity for which it has credentials.
Specifies that the Pingsweep engine performs discovery based on brute force methodology, generating ICMP Ping requests against each of the possible IP address or host name targets. This scan policy also directs the use of the Softagent technology in order to provide a more detailed discovery of each entity for which it has credentials. Note however, in this case, the Softagent processing is configured to ignore network connections and the detection of open ports.
Specifies that the Pingsweep engine performs discovery based on brute force methodology, generating ICMP Ping requests against each of the possible IP address or host name targets.
Specifies that the TCP Connect engine performs discovery based on brute force methodology, generating TCP Connect requests against each of the possible IP address or host name targets. This engine is particularly useful in environments where ICMP Ping requests are blocked by firewalls. This scan policy also directs the use of the Softagent technology in order to provide a more detailed discovery of each entity for which it has credentials.
Specifies that TCP Connect engine performs discovery based on brute force methodology, generating TCP Connect requests against each of the possible IP address or host name targets. This engine is particularly useful in environments where ICMP Ping requests are blocked by firewalls. This scan policy also directs the use of the Softagent technology in order to provide a more detailed discovery of each entity for which it has credentials. Note however, in this case, the Softagent processing is configured to ignore network connections and the detection of open ports.
Specifies that the TCP Connect engine performs discovery based on brute force methodology, generating TCP Connect requests against each of the possible IP address or host name targets. This engine is particularly useful in environments where ICMP Ping requests are blocked by firewalls.
If you use any of the predefined Softagent policies, or create a custom policy that uses Softagent technology for Linux or UNIX, you must edit the ssh_config file to include the following parameter:
PasswordAuthentication yes
By default, the ssh_config file is installed in the following locations:
(Linux, Solaris, and AIX) /etc/ssh
|
Copyright © 2015 CA Technologies.
All rights reserved.
|
|