As networks and the number of connecting devices grow in an enterprise, performing network discovery operations and managing them becomes crucial. From the security perspective, it also becomes essential to identify network-related bottlenecks, misconfigurations and invalid or rogue devices in the network and take proper actions to mitigate the associated business risks. Although network administrators can perform manual scans with traditional tools like Nmap and custom scripts, this approach has many challenges. The issue with antique Perl-based custom scripts is that they cannot identify all the different vendor network equipment out there, and hence there is a chance of not identifying devices that the script did not consider. Even if the manual scans do identify everything, it becomes difficult for the network admins to make sense of the discovered data due to the lack of smart data classification and visual mapping of the topology. These scripts must be maintained and kept up to date as time progresses.
With this type of discovery, the network operators can perform a more extensive network discovery that spans a few networks or the entire organization. It can be done by configuring the TCPWave discovery agents with the seed router's information and credentials of switches, firewalls, etc. TCPWave discovery engine supports detecting hardware of various vendors like Cisco, Juniper, Huawei, Extreme, Arista, FortiGate, etc., through telnet, ssh, SNMPv2, and SNMPv3. The solution is VRF aware and can detect VLANs and switch port configurations. Network administrators can specify exclusion rules to exclude specific IP ranges or routers from the discovery process. An alert is generated when a conflicting network or subnet is detected during the scheduled automatic or on-demand discovery process.
TCPWave leverages various discovery protocols like ping, SNMP, CDP, LLDP, etc., to discover multiple devices and their IP addresses. It uses a combination of SNMP and SSH to crawl network devices like routers, switches, and firewalls to gather and plot as much information as possible. TCPWave leverages the vendor-provided public API to discover various network assets like virtual machines information in VMware, instances information on public clouds like AWS, Azure, and Google. TCPWave can efficiently scan for open ports on the network devices and identify various attributes like running software, open ports, attached switch or router, location, etc. TCPWave intelligently organizes the discovered data both in structured navigable tables and network diagrams so that the network admin can easily consume and visualize the discovery results.
TCPWave discovery results are not just laid out in navigable and structured tables with tabs but also visually represented through a network topology. The topology displays routers, switches, etc., and their interconnections. Configuring multiple agents and running them simultaneously makes TCPWave network discovery truly scalable to any enterprise network size requirements. The REST API that TCPWave provides is secure and easy to use with external applications and automation teams.
The ability to configure multiple agents and run them simultaneously makes TCPWave network discovery truly scalable to any enterprise network size requirements. The REST API that TCPWave provides is secure and easy to use with external applications and automation teams.
TCPWave lets enterprise network management teams proactively manage their networks by automating the network discovery tasks. The solution is built with security and industry's best practices in mind regarding network security and health.