Solved

network mapping tool

Posted on 2014-10-06
2
172 Views
Last Modified: 2014-10-14
Hello Everyone,
I am about to evaluate a new facility. IT already has an existing network in place. I am looking for a tool that I can use to scan the network and discover devices, layout, subnets, etc.

I have used IP scanners in the past, however, I was hoping for something that will also use snmp to discover devices.

This is going to be for one project, so I can't spend a lot of money on it. I am hoping to stay under $300.

I am most looking for:
- IP Address & host name (maybe mac address?)
- make, model, version, firmware version
- would be nice to get to see which ports are open on a device.
- would be nice to get some topological view of the network, but that isn't 100% necessary.

I am not looking for an in depth security analysis tool. I am not looking to "hack" the network or make changes. I am not looking to leave it in place and monitor changes. I am not looking for active directory, data, or disk utilization. I am not looking for any kind of performance monitoring.

Any suggestions?
0
Comment
Question by:Jack5Back
2 Comments
 
LVL 11

Accepted Solution

by:
David Kroll earned 500 total points
ID: 40363917
0
 

Author Closing Comment

by:Jack5Back
ID: 40380148
This wasn't exactly what I was looking for. But, I appreciate the input.
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question