![]() This is done through Inter mapper’s authentication server, which is provided with the product’s base installation of Inter mapper Data Center. Role-based security ensures that users only have access to product functions they need to perform their tasks. ![]() This security setup eases maintenance as changes can be made to the role level that will apply across all users assigned to that role. The product is shipped with admin as the default user and administrator as the default role. Simple drag-and-drop functionality from the Users Panel allows administrators to place users in specific roles. ![]() From the Users panel, add and edit users and groups, assign users to groups, and assign privileges and access to maps.įor larger organizations with multiple maps, access and editing capabilities can be given to users on a map-by-map basis, including view, change, online access, and remote access. Probes define how to retrieve and display data from particular devices. Inter mapper uses probes to gather and retrieve data that network administrators want to monitor for specific network devices. Using SNMP, TCP, and HTTP network protocols, data is retrieved and fed back into display within the Inter mapper software, where it can be viewed and analyzed. Inter mapper contains 100s of probes built-in to the software including SNMP, SNMP trap, TCP, command-line, and big brother probes. Users can also easily modify the existing probe files to produce new probes that will test additional aspects of device operation. Probe files are simple text files that can be modified with any standard text editing utility. User-contributed probes are available on the Inter mapper website and free for the Inter mapper community to download and use.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |