![]() I knew the switch was configured to use one of two of my test networks, but I still needed the specific IP address to access the web-based browser to setup the switch the way I needed for testing. I needed to access the management console of an old switch that had been gathering dust around, a switch I needed for testing. Testing NetworkView Like many who stumble across really useful apps, I found this app on the Internet because I had a specific need. Admins can also tweak WMI and port-scan settings. ![]() ![]() You can also set the timeout in seconds and number of retries that the protocols ICMP and SNMP use in discovering devices. Users can enable or disable several discovery methods including requiring PING, using DNS, using NetBIOS and more. Clicking “Settings” pulls up a host of choices. There are several options to configure for performing a network discovery. Networks are discovered in one of three ways: by defining a single IP address, a range, or a subnet. Once installed, clicking the File->New from the toolbar menu allows for creating a new network map. It’s a very simple setup.exe file installation. Install NetworkView only supports installation on Windows machines. That’s why an app like Network View is a must-have part of the network administrator’s app toolkit. But who has time to sort through some other sloppy record-keeping networking admin’s mess? Not many IT workers. But what if the router or DHCP server is set up in such a way that that information isn’t saved? You can play network detective and go through the process of elimination, trying to determine what a device’s IP address is. For instance, if the device is set to use DHCP or has a static, reserved IP address- a router in a network will typically keep a table with information about connected devices on the network, such as IP and MAC address. Sure, there are ways to try and identify the IP or MAC address of a network device on your own. It's a tough situation to be in, but Windows app NetworkView ($79) can help. It’s a situation all to familiar to IT pros: inheriting a network someone else administered in the past and trying to access a network device about which you have no information-no idea what its IP address is, what it's username is, or what the password to get into the device is. Best Hosted Endpoint Protection and Security Software.
0 Comments
Leave a Reply. |