Overview3

In general, the amount of network traffic needed can be throttled and controlled.
With sufficient configuration and attention, the amount of network traffic generated for any one physical site within a customer network can be controlled so that slower network locations are inventoried less aggressively, requiring less network bandwidth, while core network segments are aggressively inventoried, decreasing the time taken to audit the bulk of the network.
The network utilization and bandwidth requirements of the Scan Engine depends on configuration of the services based on the requirements on any given customer site. 
For an unmodified Scan Engine installation, bandwidth utilization of approximately 3Mb/sec can be expected. This value is subject to spikes and is not a flat utilisation of the network.

The above graph identifies the data flow from the Scan Engine with the X-Axis show timing in seconds and the Y-Axis showing with Network traffic in Bytes per 10 sec intervals (peak value of 50,000,00 bytes approximates to 50 MB). This diagram also identifies that the scanning operation is composed of spikes of network traffic and troughs of low band-width usage. This is typical of a scanning operation.
The speed at which an inventory runs is a function of network capability, speed of database server and scanning server configuration. The faster that the Scan Engine is configured to run, the more bandwidth is required.
Default Discovery Ports

Port

Description

21

FTP control (command)

22

SSH used for secure logins file transfers (scp, sftp) and port forwarding

23

Telnet protocol unencrypted text communications

25

Simple Mail Transfer Protocol (SMTP) used for e-mail routing between mail servers

80

Hypertext Transfer Protocol (HTTP)

110

Post Office Protocol 3 (POP3)

135

DCE endpoint resolution

139

NetBIOS Session Service

143        

Internet Message Access Protocol (IMAP) used for retrieving, organizing and synchronizing e-mail messages

443

Hypertext Transfer Protocol over TLS/SSL (HTTPS)

445

Microsoft-DS SMB file sharing

1520      

Oracle database common alternative for listener

1521

Oracle database default listener

1522 1529      

Oracle database common alternative for listener

3389

Microsoft Terminal Server (RDP) officially registered as Windows Based Terminal (WBT)

7001

Default for BEA WebLogic Servers HTTP server though often changed during installation

Default Inventory Ports

Port

Function

22

Secure Shell (SSH) used for secure logins file transfers (scp, sftp) and port forwarding

23

Telnet protocol unencrypted text communications

80

Hypertext Transfer Protocol (HTTP)

135

DCE endpoint resolution

139

NetBIOS Session Service

443

Hypertext Transfer Protocol over TLS/SSL (HTTPS)

445

Microsoft-DS SMB file sharing

1520- 1529

Oracle database Listener

1975

Custom Oracle Database Port

2025

Sybase ASE default 2025

2809

corbaloc:iiop URL per the CORBA 3.0.3 specification

3389

Microsoft Terminal Server (RDP) officially registered as Windows Based Terminal (WBT)

4100

Sybase ASE default 4100

5000

Sybase ASE default 5000

8880

cddbp-alt CD Database (CDDB) protocol (CDDBP) alternate

9043

WebSphere Application Server Administration Console secure

9060

WebSphere Application Server Administration Console

9080

glrpc Groove Collaboration software GLRPC

9088

Informix default port #2

9090

Openfire Administration Console

9100

PDL Data Stream

9402

WebSphere Port

9443

WebSphere Port

Key Terms, Links and Emails

Term

Definition

Clustering

When there are multiple devices acting as one

CMDB

Configuration Management Database

Discovery

The Scan Engine attempts to find all devices or applications on a network (IP range, hostname, port, etc.)

Discovery Source Feature

A feature which allows users to restrict scans using database configuration

Found Device

Items (devices) found during a discovery scan

IIS

Internet Information Services

Inventory Scan

When the Scan Engine scans the items found during the discovery scan

NETBIOS

Network Basic Input/Output System is a program that allows applications on different computers to communicate within a local area network (LAN).

SSH

Secure Shell (SSH) is a network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers.

Support Email

support@iquate.com

Turnover

Devices entering and leaving often on a network

Virtualization

A virtual version of a device running on a physical host













This page was left intentionally blank.