Meet us at Cisco Live Las Vegas 2024
Home
>
Blog
>
Troubleshooting basic discovery

Troubleshooting basic discovery

2 minute read
Home
>
Blog
>
Troubleshooting basic discovery
Updated: October 27, 2023
July 21, 2018
Updated: October 27, 2023
2 mins

One of the features that’s included in IP Fabric's platform from the beginning of time is variability of network discovery inputs. First of all is Discovery Seed, which creates an entry point for discovery. Another functional feature is Filtering, which narrows down to what to include and what to exclude from discovery and analysis. But few things first. For successful discovery we need to have proper licensing in place and valid authentication settings which is not covered in this article.

P Fabric homepage snippet
IMG1: IP Fabric homepage snippet

Managing discovery seed

It’s an optional feature, but will help significantly with defining network discovery start-point. If not set, algorithm will begin from the current default gateway, which in many cases is not the best scenario. In my lab, I know there’s a subnet 10.241.255.0/24, that I’d like to discover. In the menu it can be found in Settings > Discovery Seed.

Network Discovery Seed definition
GIF1: Network Discovery Seed definition

With only this setup, IP Fabric was able to discover 24 devices in the lab, all within subnet 10.241.255.0/24. But we can also apply the filtering. By navigating to Settings > Advanced, we can define IP scope in greater detail by including or excluding networks or single IPs.

Applying discovery filter
GIF2: Applying discovery filter

By applying the filter, I managed to discover only 20 network devices instead of 24, all within 10.241.255.0/25 subnet only. More networks can be easily applied to either Discovery seed or subsequent filter. And there’s even more interesting options that elevate IP Fabric versatility. Few to mention could be authentication per subnet, defining the trace route scope or site separation types (defined by Routing and Switching domain or by RegEx based on hostname). SSH and Telnet basic values can be played with like authentication failure retries or login timeout value and more.

Finished discovery for 10.241.255.0/25
IMG2: Finished discovery for 10.241.255.0/25

If you’re interested in learning more about how IP Fabric’s platform can help you with analytics or intended network behavior reporting, contact us through our website, request a demo, follow this blog or sign up for our webinars.

Troubleshooting basic discovery

One of the features that’s included in IP Fabric's platform from the beginning of time is variability of network discovery inputs. First of all is Discovery Seed, which creates an entry point for discovery. Another functional feature is Filtering, which narrows down to what to include and what to exclude from discovery and analysis. But few things first. For successful discovery we need to have proper licensing in place and valid authentication settings which is not covered in this article.

P Fabric homepage snippet
IMG1: IP Fabric homepage snippet

Managing discovery seed

It’s an optional feature, but will help significantly with defining network discovery start-point. If not set, algorithm will begin from the current default gateway, which in many cases is not the best scenario. In my lab, I know there’s a subnet 10.241.255.0/24, that I’d like to discover. In the menu it can be found in Settings > Discovery Seed.

Network Discovery Seed definition
GIF1: Network Discovery Seed definition

With only this setup, IP Fabric was able to discover 24 devices in the lab, all within subnet 10.241.255.0/24. But we can also apply the filtering. By navigating to Settings > Advanced, we can define IP scope in greater detail by including or excluding networks or single IPs.

Applying discovery filter
GIF2: Applying discovery filter

By applying the filter, I managed to discover only 20 network devices instead of 24, all within 10.241.255.0/25 subnet only. More networks can be easily applied to either Discovery seed or subsequent filter. And there’s even more interesting options that elevate IP Fabric versatility. Few to mention could be authentication per subnet, defining the trace route scope or site separation types (defined by Routing and Switching domain or by RegEx based on hostname). SSH and Telnet basic values can be played with like authentication failure retries or login timeout value and more.

Finished discovery for 10.241.255.0/25
IMG2: Finished discovery for 10.241.255.0/25

If you’re interested in learning more about how IP Fabric’s platform can help you with analytics or intended network behavior reporting, contact us through our website, request a demo, follow this blog or sign up for our webinars.

SHARE
Demo

Try out the platform

Test out IP Fabric’s automated network assurance platform yourself and be inspired by the endless possibilities.

What would this change for your network teams?
Start live demo
 
 
 
 
 
We're Hiring!
Join the Team and be part of the Future of Network Automation
Available Positions
IP Fabric, Inc.
115 BROADWAY, 5th Floor
NEW YORK NY, 10006
United States
This is a block of text. Double-click this text to edit it.
Phone : +1 617-821-3639
IP Fabric s.r.o.
Kateřinská 466/40
Praha 2 - Nové Město, 120 00
Czech Republic
This is a block of text. Double-click this text to edit it.
Phone : +420 720 022 997
IP Fabric UK Limited
Gateley Legal, 1 Paternoster Square, London,
England EC4M 7DX
This is a block of text. Double-click this text to edit it.
Phone : +420 720 022 997
IP Fabric, Inc. © 2024 All Rights Reserved