WO2012066652A1 - 通信ネットワークに接続されている通信装置を発見する方法及び管理装置 - Google Patents
通信ネットワークに接続されている通信装置を発見する方法及び管理装置 Download PDFInfo
- Publication number
- WO2012066652A1 WO2012066652A1 PCT/JP2010/070466 JP2010070466W WO2012066652A1 WO 2012066652 A1 WO2012066652 A1 WO 2012066652A1 JP 2010070466 W JP2010070466 W JP 2010070466W WO 2012066652 A1 WO2012066652 A1 WO 2012066652A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- management
- address
- protocol
- information
- communication device
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/02—Standardisation; Integration
- H04L41/022—Multivendor or multi-standard integration
Definitions
- the present invention relates to discovery of devices connected to a communication network.
- Patent Document 1 As this type of technology, for example, the technologies of Patent Document 1 and Non-Patent Document 1 are known.
- the management server instructs transmission of device configuration information to an IP address, and sets the IP address of the device that has responded to the instruction as a monitoring target device.
- a SIM HP Systems Insight Manager selects a management protocol from a plurality of network management protocols (hereinafter, management protocols), and searches for a device using the selected management protocol. When a device is detected, the selected management protocol is used as the management protocol for that device.
- communication devices there are generally multiple types of communication devices in a communication network. Specifically, for example, communication devices with different categories (for example, server devices, storage devices, and switch devices), communication devices with different subcategories even with the same category (for example, server devices of Windows (registered trademark)) Linux (registered trademark) server device), there are communication devices of different models even in the same category, or communication devices of different vendors even in the same category. If the types of communication devices are different, the management protocols supported by the communication devices are often different. One communication apparatus may support two or more management protocols.
- a management device In order to monitor a plurality of communication devices in such a communication network, a management device usually supports a plurality of management protocols.
- Management protocols include, for example, WMI (Windows Management Instrumentation), SSH (Secure SHell), SNMP (Simple Network Management Protocol), WBEM (Web-Based Enterprise Management), SNM2 (Simple Navigator Modular 2), NIS (Network Information Service) Etc.
- the management protocol (hereinafter referred to as the optimal protocol) to be used by the management device for monitoring may differ depending on the type of communication device. For this reason, the management apparatus generally has optimum protocol management information.
- the optimum protocol management information is information representing the optimum protocol for each type of communication device.
- the optimum protocol is, for example, a management protocol that can acquire the largest amount of information desired by the management apparatus among a plurality of management protocols.
- the management device In order to monitor the communication device, the management device needs to discover the communication device in advance. Discovery of a communication device is generally performed according to the following flow.
- a user for example, an administrator registers authentication information necessary for discovery in the management apparatus for each management protocol supported by the management apparatus.
- S2 The user designates the address range to the management device.
- S3 The management apparatus performs the following processing for each address belonging to the designated address range (typically, the IP address range).
- S3a) The management apparatus transmits a command addressed to each address using the authentication information registered for the management protocol. If the management protocol used for sending the command is a management protocol supported by the communication device at the destination address of the command, the communication device responds to the command according to the management protocol. return.
- S3b The management apparatus receives a response to the command transmitted in (S3a).
- S3c The management apparatus analyzes the response received in the above (S3b), and determines the success or failure of the discovery.
- the management device can output information indicating the discovery result (for example, information indicating the success or failure of discovery for each address belonging to the specified address range and the description thereof), but the user can also view the information. It is not known what authentication information is registered for the address corresponding to the discovery failure to discover the communication device at the address. Specifically, for example, a communication device at a certain address (hereinafter, this address is referred to as a “target address”, and a communication device at the address is referred to as a “target communication device”). And the second management protocol is supported, and the first management protocol is the optimum protocol of the target communication device.
- the port used by the second management protocol is open, but the port used by the first management protocol is closed ("Port is open" Means that connection is possible from the outside using the management protocol that uses the port).
- the management device cannot even detect the communication device using the first management protocol (optimum protocol).
- the management device detects the communication device using the second management protocol, the management device fails to find the target communication device. Specifically, although the management device knows that the communication device that can communicate with the second management protocol exists at the target address, it cannot know what type of communication device the communication device is. For this reason as well, it is difficult for the user to input correct authentication information for discovering the communication device.
- an object of the present invention is to increase the probability that the management device will succeed in discovering the communication device via the communication network.
- the management device stores attribute / protocol management information representing each attribute / protocol relationship (correspondence relationship between a communication device attribute and a management protocol presumed to be optimal for a communication device having the communication device attribute).
- attribute / protocol management information representing each attribute / protocol relationship (correspondence relationship between a communication device attribute and a management protocol presumed to be optimal for a communication device having the communication device attribute).
- the management device issues a query specifying (A) an address for each of a plurality of addresses, and (B) specifies a response to the query in the query.
- the query result information indicating the correspondence between the address specified by the query and the communication device attribute acquired based on the response is written to the storage resource, and (C) the query result A management protocol corresponding to the communication device attribute represented by the information is specified from the attribute / protocol management information, and (D) an optimum management protocol for the address is determined based on the specified management protocol.
- the management apparatus may perform (A) to (D) for another address after performing (A) to (D) for one address, or perform (A) and (B) for a plurality of addresses. After that, (C) and (D) may be performed for a plurality of addresses. That is, the next process may be performed after the process is completed for one address, or the next process may be performed after the process is completed for a plurality of addresses.
- FIG. 1 shows an overall configuration of a system according to Embodiment 1 of the present invention.
- the structural example of the management program 200 which the memory 102 memorize
- An example of information stored in the storage device 103 is shown.
- 2 shows a configuration example of an IP address management table 301.
- the structural example of the DNS table 303 is shown.
- the structural example of the optimal protocol table 305 is shown.
- the structural example of the SNMP table 307 is shown.
- the structural example of the open port table 309 is shown.
- the structural example of the host name table 311 is shown.
- the structural example of the login screen table 313 is shown.
- the structural example of the scan result aggregation table 315 is shown.
- the structural example of the indirect monitoring apparatus table 317 is shown.
- the structural example of the port knowledge table 319 is shown.
- the structural example of the estimation table 321 is shown.
- the structural example of the optimal protocol determination table 323 is shown.
- 5 is a flowchart illustrating an example of processing performed by a management program 200. It is a flowchart which shows an example of the flow of S1602 (optimum protocol estimation process) of FIG. 18 is a flowchart illustrating an example of a flow of S1704 (SNMP scan) in FIG. 17. 18 is a flowchart illustrating an example of a flow of S1705 (port scan) in FIG. 17. 18 is a flowchart illustrating an example of a flow of S1706 (user clue scanning) in FIG. 17. It is a flowchart which shows an example of the flow of S1707 (guessing process) of FIG.
- the structural example of the extended port knowledge table 2300 is shown.
- An example of a user correction screen is shown.
- An example of a login screen is shown.
- An example of an authentication information input screen is shown.
- 17 is a flowchart illustrating an example of a flow of S1605 (discovery process) in FIG. 16.
- An example of the apparatus addition screen which concerns on Example 2 is shown.
- summary of the process performed in Example 3 is shown.
- summary of the process performed in Example 4 is shown.
- An example of the user approval screen according to Example 4 is shown.
- An example of a system configuration referred to for explaining a specific example of a problem is shown.
- An example of the discovery result information according to the conventional process flow is shown.
- An example of the discovery result information according to Example 1 is shown.
- xxx table various types of information may be described using the expression “xxx table”, but the various types of information may be expressed using a data structure other than a table. In order to show that it does not depend on the data structure, the “xxx table” can be called “xxx information”.
- the process may be described with “program” as the subject, but the program is executed by a processor (for example, a CPU (Central Processing Unit)) so that a predetermined process can be appropriately performed.
- a processor for example, a CPU (Central Processing Unit)
- the subject of processing may be a processor.
- the processing described with the program as the subject may be processing performed by a processor or a management device having the processor.
- the processor may be the CPU itself or may include a hardware circuit that performs part or all of the processing performed by the processor.
- the program may be installed in each controller from a program source.
- the program source may be, for example, a program distribution server or a storage medium.
- the management device may be composed of one or more computers. Specifically, for example, when the management computer displays information, or when the management computer transmits display information to a remote computer, the management computer is the management device. For example, when a function equivalent to that of the management computer is realized by a plurality of computers, the plurality of computers (in the case where the display computer performs display, the display computer may be included) is the management device. .
- the management server is a management device.
- identifiers or names are adopted as types of identification information of various objects (for example, vendors and models). However, they may be interchangeable with each other, or other types of identifications may be used. Information may be employed.
- SNM2 Simple Network Management Protocol
- SNM2 Simple Network Management Protocol
- SNM2 Simple Navigator Modular 2
- NIS Network Information Service
- the communication device may include an uninterruptible power supply (UPS), a printer, and the like in addition to the devices described above.
- UPS uninterruptible power supply
- yyy port a port used in the management protocol yyy is referred to as “yyy port”.
- the port is open means that a connection can be made from the outside (for example, the management server) using a management protocol that uses the port. If it is not in that state, it is said that the port is closed.
- the communication network is an IP (Internet Protocol) network, but other types of communication networks may be employed.
- IP network may be a LAN (Local Area Network) or the Internet.
- IP address is employed as an address, but other types of addresses may be employed.
- the device 1 (Windows server (“Windows” is a registered trademark)) has an SMI-S (Storage Management Initiative-Specification) provider function, which monitors the device 4 (FC (Fibre Channel) switch). Then. Further, the device 5 (storage) has an SNMP port and an SNM2 port, but the SNMP port is open, but the SNM2 port is closed.
- SMI-S Storage Management Initiative-Specification
- a user for example, an administrator registers authentication information necessary for discovery in a management apparatus for each management protocol supported by the management server 3101. Then, the management server 3101 issues a command specifying the IP address [192.168.1.5] for each management protocol supported by the management server 3101 using the registered authentication information. The success or failure of the discovery is determined based on the response to.
- 32 shows an example of information indicating a discovery result output by the management server 3101). Specifically, for example, although it can be understood that an IP address [192.168.1.5] is a device capable of communicating by SNMP, details of the device are unknown. For this reason, it is difficult to register authentication information necessary for discovering a device at the IP address [192.168.1.5]. (Problem 2) For the management server 3101, it is assumed that the optimum protocol of the device 4 is WBEM. According to the conventional processing flow, as indicated by reference numeral 3202 in FIG. 32, the device 1 returns the response to the WBEM command from the device 1 to the management server 3101 for the IP address [192.168.1.1]. 4 (FC switch) is discovered.
- FC switch FC switch
- the device discovery is found to be unsuccessful from the response that the device 4 returns to the management server 3101 in response to the SSH command. . That is, for the same device 4, there is an IP address that succeeds in discovery and an IP address that fails in discovery. However, from the discovery result information, it is not known whether the discovered device 4 is a device that is directly monitored or a device that is indirectly monitored via the device 1.
- the device 4 is monitored by the SMI-S provider function of the device at the IP address [192.168.1.1] (ie, indirect It can be seen that the device is monitored automatically.
- FIG. 1 shows an example of the overall configuration of a system according to Embodiment 1 of the present invention.
- a plurality of devices 10 are connected to the IP network 3102.
- An input / output terminal 60, a DNS (Domain Name System) server 70, and a management server 100 are connected to the IP network 3102.
- the plurality of devices 10 for example, the following devices 1 to 5, (*) Device 1 (with Windows server, IP address [162.168.1.1], WMI port and WBEM port), (*) Device 2 (Unix server, IP address [162.168.1.2], SSH port and NIS port), (*) Device 3 (with IP switch, IP address [162.168.1.3], SSH port and SNMP port), (*) Device 4 (with FC switch, IP address [162.168.1.1], SSH port), (*) Device 5 (storage, IP address [162.168.1.5], SNMP port and SNM2 port (however, the SNM2 port is closed)), There is.
- the plurality of devices 10 is not limited to these five devices 1-5. As described above, a plurality of different types of devices may be connected to the IP network
- Each device 10 has an optimum protocol for each device type (for example, a type determined by at least one of a category, a subcategory, a model, and a vendor).
- the optimum protocol is a management protocol that can acquire the most necessary information among a plurality of management protocols.
- the relationship between the device type and the optimum protocol is, for example, as follows.
- the plurality of devices 10 may include not only directly monitored devices but also indirectly monitored devices.
- the “directly monitored device” is a device that is monitored by the management server 100 without going through any of the plurality of devices 10.
- the “indirectly monitored device” is a device monitored by the management server 100 via any one of the plurality of devices 10.
- the first device of the plurality of devices 10 monitors the second device of the plurality of devices
- the second device is monitored by the management server 100 via the first device. Therefore, it is a device that is indirectly monitored.
- the device 4 monitored by the SMI-S provider function of the device 1 via the WBEM port of the device 1 is a device that is indirectly monitored.
- the DNS server 70 manages the correspondence between the IP addresses uniquely assigned to the devices 1 to 5 and the host names (or domain names) of the devices 1 to 5.
- the DNS server 70 is also assigned an IP address ([198.162.2.1] in the illustrated example).
- the input / output terminal 60 has a display device 61 and an input device 62.
- the input / output terminal 60 may be a general-purpose personal computer.
- Information transmitted from the management server 100 to the input / output terminal 60 is displayed on the display device 61, and information input to the input device 62 is transmitted from the input / output terminal 60 to the management server 100.
- the user can input necessary information from the input device 62 based on various information displayed on the display device 61.
- the management server 100 discovers a device connected to the IP network 3102 and monitors the discovered device via the IP network 3102.
- the management server 100 includes a NIC (Network Interface Card) 104 connected to the IP network 3102, a memory 102, a storage device 103 (for example, a hard disk drive), and a CPU 101 connected thereto.
- NIC Network Interface Card
- Other types of communication interface devices may be used instead of the NIC 104, other types of storage resources may be used instead of at least one of the memory 102 and the storage device 103, and other types of storage resources may be used instead of the CPU 101.
- a processor may be employed.
- a later-described management program executed by the CPU 101 is stored in the memory 102, and various types of information are stored in the storage device 103.
- FIG. 2 shows a configuration example of the management program 200 stored in the memory 102.
- the memory 102 stores the management program 200.
- the management program 200 executes the process shown in FIG.
- the management program 200 includes an optimal protocol determination program 201, an optimal protocol estimation program 202, a user correction program 203, and a device discovery program 204. Details of the programs 201 to 204 will be described later.
- FIG. 3 shows an example of information stored in the storage device 103.
- the storage device 103 includes a target IP address management table 301, a DNS table 303, an optimum protocol table 305, an SNMP table 307, an open port table 309, a host name table 311, a login screen table 313, a scan result aggregation table 315, and an indirect monitoring device table. 317, a port knowledge table 319, a guess table 321 and an optimum protocol determination table 323 are stored. Of these tables shown in FIG. 3, for example, the optimum protocol table 305 and the port knowledge table 319 are stored before the processing shown in FIG. 16 is started. Further, among the tables shown in FIG. 3, tables other than the tables 305 and 319 are created and stored in the process shown in FIG.
- FIG. 4 shows a configuration example of the IP address management table 301.
- the IP address management table 301 is a table that represents a range of target IP addresses. Specifically, for example, the table 301 includes the following information for each IP address range: (*) Range name 401 which is the name of the IP address range, (*) Start IP address 402 which is the first IP address in the IP address range, (*) End IP address 403, which is the IP address at the end of the IP address range, Have According to the table 301, it can be seen that the range name “RANGE_1” is configured with a range from the IP address “192.168.1.1” to the IP address “192.168.1.10”.
- the range name 401, start IP address 402, and end IP address 403 reflect values input by the user with the input device 62 in accordance with the display screen of the display device 61 (the display screen is not shown).
- FIG. 5 shows a configuration example of the DNS table 303.
- the DNS table 303 is a table that represents the IP address of the DNS server 70. According to FIG. 5, the table 303 stores only the IP address of one DNS server 70. However, a plurality of IP addresses may be registered in the table 303 according to the number of DNS servers 70 connected to the system. Further, when the DNS server 70 is hierarchized, information related to the hierarchy may be registered in the table 303.
- FIG. 6 shows a configuration example of the optimum protocol table 305.
- the optimum protocol table 305 is a table showing the correspondence between the device type and the optimum protocol.
- the table 305 includes the following information for each device type: (*) Category name 601 which is the name of a device category (for example, server, switch, storage), (*) Subcategory name 602 which is the name of the device subcategory (for example, server type, switch type, storage type), (*) Vendor name 603, which is the name of the vendor (*) Model name 604 which is the name of the model, (*) Optimal protocol name 605 which is the name of the optimal protocol corresponding to the device type, Have According to the table 305, it is understood that the optimum protocol of the Windows server is “WMI”. Further, according to the table 305, it is understood that the optimum protocol of the IP switch having the vendor name “Company A” and the model name “M_A — 001” is “SNMP”.
- FIG. 7 shows a configuration example of the SNMP table 307.
- the SNMP table 307 is a table in which device information acquired from a response to an inquiry according to SNMP is registered. Specifically, for example, the table 307 includes the following information for each response to an inquiry according to SNMP: (*) IP address 701 which is the IP address specified in the query, (*) Vendor name 702 which is the vendor name acquired from the response; (*) A model name 703 that is a model name acquired from the response. According to the table 307, it can be seen that the vendor of the device to which the IP address “192.168.1.3” is assigned is “Company A” and the model is “M_A_001”. In this embodiment, connection is attempted to the devices 1 to 5 using SNMP.
- connection for example, “Public” which is a default value of the community name is used as SNMP authentication information. If the connection is successful, the management server 100 receives a response including the vendor name and model name.
- the table 307 may include only information related to an IP address that has been successfully connected, or may include information related to an IP address that has failed to be connected.
- FIG. 8 shows a configuration example of the open port table 309.
- the open port table 309 is a table representing the number of the open port specified for the IP address. Specifically, for example, the table 309 includes the following information for each IP address designated by the port scan described later, (*) IP address 801, (*) Open port number 802 which is the open port number specified for the IP address; Have According to the table 309, it can be seen that a device having an IP address of “192.168.1.1” has two numbered open ports of “135” and “5988”. The creation of the table 309 may be performed by, for example, a well-known port scan tool.
- FIG. 9 shows a configuration example of the host name table 311.
- the host name table 311 is a table representing the host name specified for each IP address. Specifically, for example, the table 311 includes the following information for each IP address designated by the host name scan described below: (*) IP address 901, (*) Host name 902 which is the host name specified for the IP address; Have According to the table 311, it can be seen that the host name of the device having the IP address “192.168.1.1” is “take”.
- This table 311 is created as follows. That is, the management program 200 specifies the IP address of the DNS server 70 from the DNS table 303 described above, and inquires of the DNS server 70 at the specified IP address about the host name corresponding to the IP address. The management program 200 registers the host name responding to the inquiry and the IP address corresponding to the host name in the table 311.
- FIG. 10 shows a configuration example of the login screen table 313.
- the login screen table 313 is a table representing the URL of the login screen for the IP address.
- the table 313 includes the following information for each IP address designated by a login screen URL scan described below.
- the management program 200 may attempt to connect to each device using HTTP (Hyper Text Transfer Protocol) and register the login screen URL in the table 313 for the device that has responded.
- HTTP Hyper Text Transfer Protocol
- FIG. 11 shows a configuration example of the scan result aggregation table 315.
- the scan result aggregation table 315 is a table in which information registered in the tables illustrated in FIGS. 7 to 10 is aggregated. Specifically, for example, the table 315 includes the following information for each IP address in the tables shown in FIGS. (*) IP address 1101, (*) A vendor name 1102 that is a vendor name 702 corresponding to the same IP address 701 as the IP address 1101; (*) A model name 1103 that is a model name 703 corresponding to the same IP address 701 as the IP address 1101; (*) An open port number 1104 that is an open port number 802 corresponding to the same IP address 801 as the IP address 1101; (*) A host name 1105 that is a host name 902 corresponding to the same IP address 901 as the IP address 1101; (*) A login screen URL 1106 which is a login screen URL 1002 corresponding to the same IP address 1001 as the IP address 1101; Have According to the table 315, a device having an IP address of “192.168.1.3” is
- FIG. 12 shows a configuration example of the indirect monitoring device table 317.
- the indirect monitoring device table 317 is a table having information on devices that are indirectly monitored (for example, devices monitored by the SMI-S provider function). Specifically, for example, the table 317 is provided for each device in which the SMI-S provider function is installed. (*) For each IP address 1201, which is the IP address of the device in which the SMI-S provider function is installed, (*) Monitoring target IP address 1202 which is the IP address of the device to be monitored of the device in which the SMI-S provider function is installed, Have According to the table, a device having an IP address of “192.168.1.4” is monitored by an SMI-S provider installed in a device having an IP address of “192.168.1.1”. I understand that.
- FIG. 13 shows a configuration example of the port knowledge table 319.
- the port knowledge table 319 is a table representing a correspondence relationship between an open port and an estimated optimal protocol.
- the table 319 includes the following information for each port that can be a basis for estimating the optimum protocol: (*) Port number 1301, which is the port number, (*) Accuracy 1302 representing the probability of being the optimal protocol, (*) Optimal protocol name 1303, which is the name of the optimal protocol, Have According to the table 319, it can be seen that the device having the port “22” opened has the accuracy (probability) of “50%” and the optimum protocol is “SSH”.
- FIG. 14 shows a configuration example of the estimation table 321.
- the estimation table 321 is a table that represents the probability of the optimum protocol for the IP address.
- the table 321 includes the following information for each IP address in the scan result aggregation table 315: (*) IP address 1401, (*) Accuracy 1402 representing the probability that the management protocol that is estimated to be optimal is the optimal protocol, (*) A guess result 1403 that is the name of the management protocol that is guessed to be optimal.
- IP address 1401 IP address 1401
- Accuracy 1402 representing the probability that the management protocol that is estimated to be optimal is the optimal protocol
- a guess result 1403 that is the name of the management protocol that is guessed to be optimal.
- a device having an IP address of “192.168.1.1” has an accuracy of “90%” and “WMI” is the optimal protocol.
- FIG. 15 shows a configuration example of the optimum protocol determination table 323.
- the optimum protocol determination table 323 is a table representing the optimum protocol determined for the IP address. Specifically, for example, the table 323 includes the following information for each IP address in the guess table 321: (*) IP address 1501, (*) Optimal protocol name 1502, which is the name of the optimal protocol determined for the IP address, Have According to the table, it is understood that the optimum protocol is determined to be “WMI” for the device having the IP address “192.168.1.1”.
- the process may be performed at any timing.
- the processing may be performed when the management server 100 is connected to the IP network 3102, or may be performed when a device connected to the IP network 3102 is added. It may be done when rebooting.
- FIG. 16 is a flowchart illustrating an example of processing performed by the management program 200. With reference to this figure, an outline of the overall flow of processing performed in the present embodiment will be described.
- the management program 200 (for example, the optimum protocol estimation program 202) generates the IP address management table 301.
- the program 200 has the following processing: (*) Information on the user input screen to be displayed on the display device 61 is transmitted to the input / output terminal 60. (*) Information input by the user on the user input screen (information on IP address range) is received from the input / output terminal 60, and the information (range name, start IP address and end IP address for each IP address range) is managed in the management table Register to 301, I do.
- the management program 200 (for example, the optimal protocol estimation program 202) executes an optimal protocol estimation process.
- the optimum protocol estimation process the optimum protocol is estimated for each IP address belonging to the IP address range input by the user in S1601.
- the management program 200 (for example, the user correction program 203) executes a user correction process.
- the user correction process it is determined by the user whether or not the optimum protocol estimated in S1602 is correct. If necessary, the management protocol determined by the user is replaced with the optimum protocol for the IP address instead of the estimated optimum protocol. It is said.
- authentication information acquisition processing is performed. Specifically, authentication information about the determined optimum protocol is input from the user.
- the management program 200 (for example, the device discovery program 204) performs discovery processing for each IP address using the input authentication information for the optimum protocol corresponding to the IP address.
- the management program 200 determines whether or not the device has been discovered in the discovery process for each IP address. If there is an IP address that has failed to be discovered (S1606: No), the management program 200 (for example, the device discovery program 204) causes the user to input another authentication information (returns to S1604).
- S1602 to S1606 may be performed only for the IP addresses of the devices.
- FIG. 17 is a flowchart showing an example of the flow of S1602 in FIG.
- the optimal protocol estimation program 202 performs the processing from S1702 onward for each IP address belonging to the IP address range specified from the IP address management table 301.
- S1702 and subsequent steps will be described by taking one IP address (hereinafter referred to as a target IP address in the description of FIG. 17) as an example.
- the program 202 tries to connect using the SNMP protocol specifying the target IP address. Specifically, for example, the program 202 transmits a command conforming to the SMNP protocol specifying the target IP address. In this command, a default value “Public” of the community name is set as authentication information.
- the program 202 determines whether or not the connection in S1702 has been established. Specifically, the program 202 determines whether or not connection is possible using the SNMP protocol according to the response to the command transmitted in S1702.
- step S1704 the program 202 performs an SNMP scan.
- the “SNMP scan” is a process for issuing an inquiry conforming to the SNMP for the target IP address and acquiring information related to the device that has returned the response from the response corresponding to the inquiry. In the SNMP scan, for example, the following processing shown in FIG. 18 is performed.
- the program 202 acquires the vendor name (the vendor name of the device that returned the response) based on the response to the inquiry conforming to SNMP, and uses the vendor name as the vendor name 702 corresponding to the target IP address. It registers in 307 (S1801).
- the program 202 inquires about sysObjectID (identification information indicating the type of the device at the target IP address on the SNMP protocol). Then, the program 202 uses the information included in the response to the inquiry to acquire the vendor name from a publicly available vendor ID table (a table in which the sysObjectID and the vendor name are associated) (not shown). (*) The program 202 acquires the model name of the device that returned the response, and registers the model name in the SMNP table 307 as the model name 703 corresponding to the target IP address (S1802). Specifically, for example, the program acquires a model name from a vendor-specific MIB (Management Information Base) based on the vendor name acquired in S1801. The MIB is information that is disclosed by a network device managed by SNMP in order to inform the outside of its state.
- MIB Management Information Base
- step S1705 the program 202 performs port scanning.
- “Port scan” is to investigate whether or not a specific port is open for the device at the target IP address.
- the specific port is a port corresponding to a protocol that the management apparatus wants to check, such as a 135th port corresponding to the WMI protocol.
- the program 202 confirms whether or not a specific port is open for the device at the target IP address. For example, the confirmation is performed based on a response when the program 202 transmits a TCP (SYN) packet to a device at a symmetric IP address.
- a TCP (SYN + ACK) packet is returned as a response
- the program 202 determines that the port is open.
- a TCP (RST + ACK) packet is returned as a response
- the program 202 determines that the port is closed. If the port is open, the program 202 registers the port number 802 corresponding to the symmetric IP address in the open port table 309 (S1901).
- step S1706 the program 202 performs user clue scanning.
- “User clue scan” is a process to acquire information that can be used to estimate the optimal protocol in order to increase the probability that the management protocol that is estimated to be the optimal protocol is the optimal protocol. Is executed according to In the user clue scan, for example, the following processing shown in FIG. 20 is performed.
- the program 202 performs a host name scan (S2001). Specifically, the program 202 acquires a host name corresponding to the target IP address from the DNS server 70, and registers the acquired host name in the host name table 311 as a host name 902 corresponding to the target IP address.
- the program 202 performs login result URL scanning (S2002).
- the program 202 attempts to log in to the device at the target IP address using HTTP.
- the login attempt is performed, for example, by inputting a URL (eg, http://192.168.1.3) on the browser screen.
- the URL may be a URL determined based on the target IP address. If the login is possible, the program 202 registers the login screen URL in the login screen table 313 as the login screen URL 1002 corresponding to the target IP address.
- a query using the Telnet protocol for example, a query using the Telnet protocol, and a character string included in a response to the query may be specified.
- the program 202 may aggregate the information registered in the tables shown in FIGS. 7 to 10 in the scan result aggregation table 315 after the above processing (the processing up to S1706) is completed. .
- step S1707 the program 202 performs estimation processing.
- the program 202 updates the estimation table 321 based on the optimum protocol table 305 and the SNMP table 307 (S2101). Specifically, the program 202 first specifies the vendor name and model name corresponding to the target IP address from the SNMP table 307. Next, the program 202 specifies the optimum protocol corresponding to the specified vendor name and model name from the optimum protocol table 305. Then, the program 202 registers the identified optimum protocol in the estimation table 321 as the estimation result 1403 corresponding to the target IP address. Since this optimal protocol is specified using the vendor name and model name, the accuracy 1402 is 100%.
- the program 202 reads the open port table 309 and the port Based on the knowledge table 319, the estimation table 321 is updated (S2102). Specifically, the program 202 first specifies an open port number corresponding to the target IP address from the open port table 309. Next, the program 202 identifies the optimum protocol corresponding to the identified open port number and its accuracy from the port knowledge table 319. Then, the program 202 registers the name and accuracy of the identified optimum protocol in the estimation table 321 as the estimation result 1403 and the accuracy 1402 corresponding to the target IP address.
- the program 202 reads the optimum protocol corresponding to each of the plurality of open port numbers from the port knowledge table 319.
- the name and accuracy may be registered in the estimation table 321, or only the name and accuracy of the optimum protocol having the highest open port number accuracy among the plurality of optimum protocol names and accuracy are registered in the estimation table 321. May be. In this way, even when there are a plurality of optimum protocol name and accuracy pairs corresponding to the target IP address, the estimation result and accuracy are registered in the estimation table 321.
- an extended port knowledge table 2300 illustrated in FIG. 22 may be used instead of the port knowledge table 319.
- the extended port knowledge table 2300 is a table in which the accuracy and the optimum protocol name are associated with each combination of one or more open port numbers. According to this table 2300, the optimum protocol and its accuracy are specified regardless of whether the number of open port numbers corresponding to the target IP address is one or more.
- S1602 of FIG. 16 that is, the optimum protocol estimation process is completed.
- S1603 user correction process
- the user correction program 203 performs, for example, the following processing: (*) Information on a user correction screen (screen for user correction) to be displayed on the display device 61 is transmitted to the input / output terminal 60. (*) The information input by the user on the user correction screen is received from the input / output terminal 60, and the optimum protocol determination table 323 is updated based on the information. I do.
- the user correction screen may include information represented by the scan result aggregation table 315 and the estimation table 321.
- FIG. 23 shows an example of the user correction screen.
- the user correction screen 2300 is linked to the category, device details (eg, subcategory, vendor name, model name), accuracy, host name, and login screen URL for each IP address represented by the scan result aggregation table 315 and the estimation table 321.
- At least one of the character strings “login screen” is displayed.
- the input / output terminal 60 displays a login screen of the URL linked to the character string on the display device 61. That is, the user can see the login screen (FIG. 24 shows a login screen 2400 which is an example of the login screen).
- the user determines whether or not the category and device details are correct based on the accuracy for each IP address (if necessary, further based on at least one of the host name and the login screen).
- the user corrects the category and / or device details.
- the estimation may be performed based on the host name. Further, the estimation may be performed based on whether or not the login can be performed from the login screen (see FIG. 24) displayed by clicking the character string “login screen”.
- the category and / or device details after correction may be selected from a pull-down menu of the category and / or device details as illustrated in FIG.
- information for example, vendor name and model name
- the optimum protocol table 305 (see FIG. 6) may be set in the pull-down menu.
- the corrected category and / or device details are registered in the scan result aggregation table 315.
- the optimal protocol determination program 201 of the management server 100 determines an optimal protocol for each IP address represented by the scan result aggregation table 315 and the estimation table 321. That is, the program 201 creates the optimum protocol determination table 323. Specifically, for example, the program 201 performs the following processing for each IP address: (*) If the optimum protocol can be uniquely identified from the optimum protocol table 305 using the model name and vendor name in the scan result aggregation table 315, the name of the optimum protocol is registered in the optimum protocol determination table 323.
- an authentication information acquisition process is performed.
- the device discovery program 204 performs the following processing for each optimum protocol represented by the optimum protocol determination table 323: (*) Authentication information input screen display processing, (*)
- the entered authentication information is stored.
- the display process is a process of transmitting information representing the authentication information input screen 2500 illustrated in FIG. 25 to the input / output terminal 60.
- the screen 2500 is displayed on the display device 61.
- the user inputs authentication information such as a user ID and a password.
- the input authentication information is stored in the memory 102 or the storage device 103 of the management server 100. Note that one or more types of authentication information may be set for one optimum protocol.
- the device discovery program 204 executes discovery processing.
- FIG. 26 is a flowchart showing an example of the flow of S1605 (discovery process) in FIG.
- the program 204 executes the processing after S2602 for all IP addresses stored in the optimum protocol determination table 323.
- a target IP address in the description of FIG. 26
- S2602 and subsequent steps will be described.
- the program 204 determines whether or not the optimum protocol corresponding to the target IP address is WBEM. Specifically, the program 204 determines whether or not the optimum protocol name 1502 corresponding to the target IP address is “WBEM” based on the optimum protocol determination table 323. If the result of the determination is negative (S2602: No), the process proceeds to S2606. On the other hand, if the result of the determination is affirmative (S2602: Yes), the process proceeds to S2603.
- the program 204 discovers a device at the target IP address by using the authentication information corresponding to the optimal protocol in S2606 using the optimal protocol corresponding to the target IP address.
- the program 204 determines whether or not the WBEM port of the device at the target IP address is available in S2603. Specifically, the program 204 determines whether or not the open port number corresponding to the target IP address is a port number corresponding to WBEM based on the port table 309 (note that the management protocol corresponding to the open port number) For example, the information indicating is disclosed on the Internet, and this determination can be made based on the information). If the result of this determination is affirmative (S2603: Yes), the process proceeds to S2605. If the result of this determination is negative (S2603: No), the process proceeds to S2604.
- the program 204 discovers a device at the target IP address in the WBEM using the authentication information of the WBEM.
- S2603 In the case of No, in S2604, the program 204 identifies a device that can use the WBEM port, and discovers an indirect monitoring device (a device that is indirectly monitored) through the device. Specifically, the program 204 first specifies the IP address of the device in which the WBEM port is open based on the open port table 309. Hereinafter, a device to which this IP address is assigned is referred to as a temporary device (the temporary device is a device 1 having an SMI-S provider function in this embodiment). The program 204 then attempts to connect to the temporary device with WBEM.
- the program 204 acquires information about the one or more monitoring target devices of the temporary device from the temporary device, and based on the information, the program 204 acquires one or more monitoring targets of the temporary device. It is determined whether there is a device to which the same IP address as the target IP address is assigned. If the result of this determination is affirmative, the program 204 discovers the indirect monitoring device using the authentication information of the WBEM via the temporary device. Note that if the temporary device cannot be specified in the open port table 309, or if the temporary device cannot be connected to the temporary device by WBEM, the program 204 sets the target IP address. Even if an instruction message for creating a device for managing the assigned device (an instruction message for setting an SMI-S provider in a device having a WBEM port) is transmitted to the input / output terminal 60 used by the user. Good.
- the program 204 determines whether or not the device has been correctly discovered for all the IP addresses represented by the optimum protocol determination table 323.
- the program 204 causes the user to input another authentication information for the IP address (return to S1604).
- the program 204 For the address, the input / output terminal 60 displays information indicating that the optimum protocol is specified, the port used in the optimum protocol is opened, and authentication information about the optimum protocol is input. Good.
- the optimal protocol estimation process (S1602 in FIG. 16) is performed before the authentication information is input. Then, based on the result of the estimation process, the correction is performed by the user as necessary, and the optimum protocol is determined for each IP address.
- the optimal protocol determined for each IP address is determined based on the management protocol that is estimated to be optimal based on known information (optimum protocol table 305 and port knowledge table 319) and the results of various scans. Since it is a management protocol, there is a high possibility that it is an optimal protocol. Therefore, the user can know the optimum protocol to some extent accurately for each IP address before inputting the authentication information, and can input the authentication information based on the optimum protocol. Therefore, it is not difficult to input correct authentication information.
- the discovery of the device is caused by the fact that the port corresponding to the optimum protocol is closed. Even if it fails, it is understood that the management program 200 should open the port corresponding to the optimum protocol in order to successfully discover the device.
- the management program 200 can cause the display device 61 to display discovery result information exemplified by reference numeral 3301 in FIG. If the user sees the information, in order to successfully discover the device (device 5) at the IP address [192.168.1.5], the user must open the SNM2 port of the device and perform authentication according to SNM2. It can be seen that it is only necessary to input information and cause the management program 200 to perform discovery processing for the IP address again.
- the discovered device is an indirect monitoring device by the processing of S2604 in FIG.
- the management program 200 can cause the input / output terminal 60 to display discovery result information exemplified by reference numeral 3302 in FIG. That is, in addition to the successful discovery of the device at the IP address [192.168.1.4], the device is monitored from the device at the IP address [192.168.1.4]. Information indicating the device can be displayed on the input / output terminal 60.
- Examples 2 to 4 of the present invention will be described. At that time, differences from the first embodiment will be mainly described, and description of common points with the first embodiment will be omitted or simplified. Examples 2 to 4 shown below are used when different types of devices are added. As described above, the optimum protocol table 305 (see FIG. 6) is held in advance by the management server 100, for example. For this reason, the embodiments 2 to 4 are effective when it is desired to add information on the newly added device type to the optimum protocol table 305 (for example, when a new type of device is produced). . Examples 2 to 4 will be described below.
- the user manually adds information on an arbitrary device to the optimum protocol table 305.
- a management program for example, a user correction program
- the management program causes the input / output terminal 60 to display a device addition screen 2702 illustrated in FIG.
- the device addition screen 2702 is a screen for receiving a category name, a vendor name, a model name, and an optimum protocol name, for example.
- the user can add information regarding an arbitrary device to the device addition screen 2702.
- Information input on this screen 2702 is added to the optimum protocol table 305.
- the information added to the table 305 is displayed on, for example, a pull-down menu on the user correction screen.
- the user updates the optimum protocol table 305 based on information issued from the vendor.
- device information 2810 of the device 2800 provided by the vendor is installed in the management server 100 for the device 2800 to be added to the management server 100.
- the device information 2810 is installed in the management server 100 via the input / output device 60 by the user.
- the installed device information 2810 is registered in the optimum protocol table 305.
- the management program 200 downloads device information from a predetermined site, and registers the device information in the optimum protocol table 305.
- a repository server 2800 storing device information 2840 is connected to the IP network 3102 as shown in FIG.
- the repository server 2800 includes, for example, a NIC 2811, a memory 2820, a storage device 2830, and a CPU 2810 connected thereto, like the management server.
- the CPU 2810 downloads the device information 2840 to the storage device 2830 via the IP network 3102 by executing the program stored in the memory 2820.
- the storage device 2840 stores downloaded device information.
- the management server 100 (management program 200) periodically (or irregularly) determines whether there is new device information 2840 in the storage device 2830.
- the management server 100 downloads new device information 2840 from the repository server 2800.
- the management server 100 registers the downloaded device information 2840 in the optimum protocol table 305.
- the management server 100 downloads the device information 2840 and registers the information 2840 in the optimum protocol table 305 on the display device 61 as shown in FIG. This may be performed when 3000 is displayed and approval is obtained from the user through the screen 3000.
- Management server 10 ... Communication device
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
(S1)ユーザ(例えば管理者)が、管理装置でサポートされている管理プロトコル毎に、発見に必要な認証情報を管理装置に登録しておく。
(S2)ユーザが、アドレス範囲を管理装置に指定する。
(S3)管理装置が、指定されたアドレス範囲(典型的にはIPアドレス範囲)に属するアドレス毎に、下記の処理を行う。
(S3a)管理装置が、各管理プロトコルで、その管理プロトコルについて登録された認証情報を用いて、アドレス宛にコマンドを送信する。コマンドの送信で使用された管理プロトコルが、そのコマンドの送信先のアドレスにある通信装置でサポートされている管理プロトコルであれば、その通信装置は、その管理プロトコルに従い、そのコマンドに対して応答を返す。
(S3b)管理装置が、上記(S3a)で送信したコマンドに対する応答を受信する。
(S3c)管理装置が、上記(S3b)で受信した応答を解析し、発見の成否を判断する。
(*)SNMP(Simple Network Management Protocol)、
(*)WMI(Windows Management Instrumentation)、
(*)WBEM(Web‐Based Enterprise Management)、
(*)SSH(Secure SHell)、
(*)SNM2(Simple Navigator Modular 2)、
(*)NIS(Network Information Service)、
があるとする。SNM2は、ベンダ固有の管理プロトコルの1つである。SNM2に代えて又は加えて、他種のベンダ固有管理プロトコルが採用されても良い。また、少なくとも1つの上述の管理プロトコルに代えて又は加えて、他種の管理プロトコルが採用されても良い。
(課題1)管理サーバ3101にとって、装置5の最適な管理プロトコル(最適プロトコル)は、SNM2であるとする。しかし、装置5のSNM2ポートは閉じている。このため、IPアドレス[192.168.1.5]について、SNM2でのコマンドに対する応答が得られない。一方、装置5のSNMPポートは開いているため、SNMPでのコマンドに対する応答は得られる。しかし、SNMPは装置5の最適プロトコルではない。このため、図32の参照符号3201に示す通り、IPアドレス[192.168.1.5]について、装置の発見は失敗とわかり、且つ、そのIPアドレスにある装置の詳細は不明である(図32は、管理サーバ3101によって出力された、発見結果を示す情報の一例を示す)。具体的には、例えば、IPアドレス[192.168.1.5]について、SNMPで通信可能な装置であることはわかるが、その装置の詳細は不明である。このため、IPアドレス[192.168.1.5]にある装置の発見に必要な認証情報を登録することは困難である。
(課題2)管理サーバ3101にとって、装置4の最適プロトコルはWBEMであるとする。従来の処理流れによれば、図32の参照符号3202に示す通り、IPアドレス[192.168.1.1]について、WBEMのコマンドに対して装置1が管理サーバ3101に返した応答から、装置4(FCスイッチ)が発見される。また、図32の参照符号3203に示す通り、IPアドレス[192.168.1.4]について、SSHのコマンドに対して装置4が管理サーバ3101に返した応答から、装置の発見は失敗とわかる。つまり、同一の装置4について、発見に成功となるIPアドレスもあれば、発見に失敗となるIPアドレスもある。しかし、発見結果情報からは、発見された装置4が、直接的に監視される装置であるのか、装置1を介して間接的に監視される装置であるのかはわからない。
(*)装置1(Windowsサーバ、IPアドレス[162.168.1.1]、WMIポート及びWBEMポートを有する)、
(*)装置2(Unixサーバ、IPアドレス[162.168.1.2]、SSHポート及びNISポートを有する)、
(*)装置3(IPスイッチ、IPアドレス[162.168.1.3]、SSHポート及びSNMPポートを有する)、
(*)装置4(FCスイッチ、IPアドレス[162.168.1.1]、SSHポートを有する)、
(*)装置5(ストレージ、IPアドレス[162.168.1.5]、SNMPポート及びSNM2ポートを有する(但し、SNM2ポートは閉じている状態である))、
がある。複数の装置10は、これら5つの装置1~5に限られない。このように、IPネットワーク3102には、異種の複数の装置が接続されていて良い。
(*)Windowsサーバ(装置1):WMI、
(*)Unixサーバ(装置2):SSH、
(*)IPスイッチ(装置3):SNMP、
(*)FCスイッチ(装置4):WBEM、
(*)ストレージ(装置5):SNM2。
(*)IPアドレス範囲の名称である範囲名401、
(*)IPアドレス範囲の先頭のIPアドレスである開始IPアドレス402、
(*)IPアドレス範囲の終端のIPアドレスである終了IPアドレス403、
を有する。テーブル301によれば、範囲名「RANGE_1」は、IPアドレス「192.168.1.1」~IPアドレス「192.168.1.10」までの範囲で構成されていることがわかる。範囲名401、開始IPアドレス402及び終了IPアドレス403は、表示デバイス61の表示画面に従い入力デバイス62でユーザが入力した値が反映される(表示画面の図示は省略する)。
(*)装置のカテゴリ(例えば、サーバ、スイッチ、ストレージ)の名称であるカテゴリ名601、
(*)装置のサブカテゴリ(例えば、サーバの種別、スイッチの種別、ストレージの種別)の名称であるサブカテゴリ名602、
(*)ベンダの名称であるベンダ名603、
(*)モデルの名称であるモデル名604、
(*)装置種類に対応する最適プロトコルの名称である最適プロトコル名605、
を有する。テーブル305によれば、Windowsサーバの最適プロトコルが「WMI」であることがわかる。また、テーブル305によれば、ベンダ名「A社」でモデル名「M_A_001」のIPスイッチの最適プロトコルは、「SNMP」であることがわかる。
(*)問合せで指定されたIPアドレスであるIPアドレス701、
(*)応答から取得されたベンダ名であるベンダ名702と、
(*)応答から取得されたモデル名であるモデル名703と
を有する。テーブル307によれば、「192.168.1.3」のIPアドレスが付与された装置のベンダが「A社」でありモデルが「M_A_001」であることがわかる。本実施例において、SNMPを利用して、装置1~5に接続が試みられる。その接続では、例えば、SNMPの認証情報として、コミュニティ名のデフォルト値である「Public」が使用される。接続に成功すれば、管理サーバ100は、ベンダ名及びモデル名等を含んだ応答を受信する。テーブル307は、接続に成功したIPアドレスに関する情報のみを有してもよいし、接続に失敗したIPアドレスに関する情報を有してもよい。
(*)IPアドレス801、
(*)IPアドレスについて特定された開きポートの番号である開きポート番号802、
を有する。テーブル309によれば、「192.168.1.1」のIPアドレスを持つ装置は、「135」及び「5988」の2つの番号の開きポートを有することがわかる。テーブル309の作成は、例えば、周知のポートスキャンツールにより行われてもよい。
(*)IPアドレス901、
(*)IPアドレスについて特定されたホスト名であるホスト名902、
を有する。テーブル311によれば、「192.168.1.1」のIPアドレスを持つ装置のホスト名は、「take」であることがわかる。このテーブル311は、以下のようにして作成される。すなわち、管理プログラム200が、前述したDNSテーブル303からDNSサーバ70のIPアドレスを特定し、特定したIPアドレスにあるDNSサーバ70に、IPアドレスに対応したホスト名を問い合わせる。管理プログラム200が、その問合せに対して応答されたホスト名と、そのホスト名に対応するIPアドレスとを、テーブル311に登録する。
(*)IPアドレス1001、
(*)IPアドレスに対応するログイン画面のURLを表すURL1002、
を有する。テーブル313によれば、「192.168.1.3」のIPアドレスを持つ装置には、「http://192.168.1.3」でのログインが可能となることがわかる。管理プログラム200が、各装置に対しHTTP(Hyper Text Transfer Protocol)で接続を試みて、応答があった装置についてログイン画面URLをテーブル313に登録してよい。
(*)IPアドレス1101、
(*)IPアドレス1101と同じIPアドレス701に対応するベンダ名702であるベンダ名1102、
(*)IPアドレス1101と同じIPアドレス701に対応するモデル名703であるモデル名1103、
(*)IPアドレス1101と同じIPアドレス801に対応する開きポート番号802である開きポート番号1104、
(*)IPアドレス1101と同じIPアドレス901に対応するホスト名902であるホスト名1105、
(*)IPアドレス1101と同じIPアドレス1001に対応するログイン画面URL1002であるログイン画面URL1106、
を有する。テーブル315によれば、「192.168.1.3」のIPアドレスを持つ装置は、「A社」の「M_A_001」モデルの装置であって、「22」番ポートが開いており、ホスト名「jpsw001」であり、ログイン画面のURLは「http://192.168.1.3」であることがわかる。
(*)SMI-Sプロバイダ機能がインストールされた装置のIPアドレスであるIPアドレス1201毎、
(*)SMI-Sプロバイダ機能がインストールされた装置の監視対象となる装置のIPアドレスである監視対象IPアドレス1202、
を有する。テーブルによれば、「192.168.1.1」のIPアドレスを持つ装置にインストールされたSMI-Sプロバイダにより、「192.168.1.4」のIPアドレスを持つ装置が監視されていることが分かる。
(*)ポートの番号であるポート番号1301、
(*)最適プロトコルであることの確率を表す確度1302、
(*)最適プロトコルの名称である最適プロトコル名1303、
を有する。テーブル319によれば、「22」番ポートが開いている装置は、「50%」の確度(確率)で最適プロトコルが「SSH」であることがわかる。
(*)IPアドレス1401、
(*)最適であると推測された管理プロトコルが最適プロトコルであることの確率を表す確度1402、
(*)最適であると推測された管理プロトコルの名称である推測結果1403、
を有する。テーブル321によれば、「192.168.1.1」のIPアドレスを持つ装置は、「90%」の確度で、「WMI」が最適プロトコルであることがわかる。
(*)IPアドレス1501、
(*)IPアドレスについて決定された最適プロトコルの名称である最適プロトコル名1502、
を有する。テーブルによれば、「192.168.1.1」のIPアドレスを持つ装置について、最適プロトコルが「WMI」であると決定されたことがわかる。
(*)表示デバイス61に表示させるユーザ入力画面の情報を入出力端末60に送信する、
(*)ユーザ入力画面にユーザが入力した情報(IPアドレス範囲に関する情報)を入出力端末60から受信し、その情報(IPアドレス範囲毎の範囲名、開始IPアドレス及び終了IPアドレス)を管理テーブル301に登録する、
を行う。
(*)プログラム202は、SNMPに従う問合せに対する応答を基にベンダ名(その応答を返した装置のベンダ名)を取得し、そのベンダ名を、対象IPアドレスに対応するベンダ名702として、SMNPテーブル307に登録する(S1801)。具体的には、例えば、プログラム202は、sysObjectID(SNMPプロトコル上での、対象IPアドレスにある装置の種類を表す識別情報)を問い合わせる。そして、プログラム202は、その問合せに対する応答に含まれている情報を用いて、一般に公開されているベンダIDテーブル(sysObjectIDとベンダ名とを関連づけたテーブル)(図示なし)からベンダ名を取得する。
(*)プログラム202は、上記応答を返した装置のモデル名を取得し、そのモデル名を、対象IPアドレスに対応するモデル名703として、SMNPテーブル307に登録する(S1802)。具体的には、例えば、プログラムは、S1801で取得したベンダ名に基づき、ベンダ固有のMIB(Management Information Base)からモデル名を取得する。なお、MIBとは、SNMPで管理されるネットワーク機器が、自分の状態を外部に知らせるために公開する情報のことである。
(*)プログラム202は、対象IPアドレスにある装置に対して、特定のポートが開いているか否かを確認する。確認は、例えば、プログラム202が対称IPアドレスにある装置に対してTCP(SYN)パケットを送信したときの、応答に基づいて行われる。応答として、TCP(SYN+ACK)パケットが返さたときは、プログラム202はポートが開いていると判断する。また、応答として、TCP(RST+ACK)パケットが返されたときは、プログラム202はポートが閉じられていると判断する。ポートが開いていれば、プログラム202は、対称IPアドレスに対応するポート番号802として、開きポートテーブル309に登録する(S1901)。
(*)プログラム202は、ホスト名スキャンを行う(S2001)。具体的には、プログラム202は、対象IPアドレスに対応するホスト名をDNSサーバ70から取得し、取得したホスト名を、対象IPアドレスに対応するホスト名902として、ホスト名テーブル311に登録する。
(*)プログラム202は、ログイン結果URLスキャンを行う(S2002)。具体的には、プログラム202は、対象IPアドレスにある装置にHTTPでログインすることを試みる。ログインの試みは、例えば、ブラウザ画面でURL(例:http://192.168.1.3)を入力することで行われる。そのURLは、対象IPアドレスを基に決定されたURLで良い。ログインが可能であった場合には、プログラム202は、そのログイン画面のURLを、対象IPアドレスに対応するログイン画面URL1002として、ログイン画面テーブル313に登録する。
(*)プログラム202は、最適プロトコルテーブル305及びSNMPテーブル307に基づき、推測テーブル321を更新する(S2101)。具体的には、プログラム202は、まず、SNMPテーブル307から、対象IPアドレスに対応するベンダ名及びモデル名を特定する。次に、プログラム202は、その特定したベンダ名及びモデル名に対応する最適プロトコルを、最適プロトコルテーブル305から特定する。そして、プログラム202は、特定した最適プロトコルを、対象IPアドレスに対応する推測結果1403として、推測テーブル321に登録する。この最適プロトコルは、ベンダ名及びモデル名を用いて特定されたため、確度1402は、100%となる。
(*)例えば、対象IPアドレスに対応するベンダ名及びモデル名が無い場合(或いは、対象IPアドレスに対応するベンダ名及びモデル名の有無に関わらず)、プログラム202は、開きポートテーブル309及びポートナレッジテーブル319に基づき、推測テーブル321を更新する(S2102)。具体的には、プログラム202は、まず、開きポートテーブル309から、対象IPアドレスに対応する開きポート番号を特定する。次に、プログラム202は、その特定した開きポート番号に対応する最適プロトコル及びその確度を、ポートナレッジテーブル319から特定する。そして、プログラム202は、特定した最適プロトコルの名称及び確度を、対象IPアドレスに対応する推測結果1403及び確度1402として、推測テーブル321に登録する。
(*)表示デバイス61に表示させるユーザ補正画面(ユーザ補正のための画面)の情報を入出力端末60に送信する、
(*)ユーザ補正画面にユーザが入力した情報を入出力端末60から受信し、その情報を基に、最適プロトコル決定テーブル323を更新する、
を行う。
(*)スキャン結果集約テーブル315におけるモデル名及びベンダ名を用いて最適プロトコルテーブル305から一義的に最適プロトコルを特定できれば、その最適プロトコルの名称を、最適プロトコル決定テーブル323に登録する、
(*)スキャン結果集約テーブル315におけるモデル名及びベンダ名を用いて最適プロトコルテーブル305から一義的に最適プロトコルを特定できなければ、推測テーブル321における、IPアドレスに対応する1以上の推測結果のうち、確度が最も高い推測結果が表す最適プロトコルの名称を、最適プロトコル決定テーブル323に登録する、
を行う。
(*)認証情報入力画面の表示処理、
(*)入力された認証情報の記憶
を行う。表示処理は、例えば、図25に例示する認証情報入力画面2500を表す情報を入出力端末60に送信する処理である。これにより、画面2500が表示デバイス61に表示される。ユーザは、この画面2500に従い、ユーザID及びパスワード等の認証情報を入力する。
Claims (15)
- 認証情報を用いて発見された通信装置を通信ネットワークを介して監視する管理装置であって、
前記通信ネットワークに接続される通信インタフェースデバイスと、
複数の属性/プロトコル関係を表す属性/プロトコル管理情報を記憶する記憶資源と、
前記通信インタフェースデバイス及び前記記憶資源に接続されたプロセッサと
を有し、
前記属性/プロトコル関係は、通信装置属性とその通信装置属性を有する通信装置に最適であると推測される管理プロトコルとの対応関係であり、
前記プロセッサが、通信装置の発見に使用する認証情報の入力の前に、複数のアドレスの各々について、下記の処理、
(A)アドレスを指定した問合せを発行する、
(B)前記問合せに対する応答を、その問合せで指定されたアドレスにある通信装置から受信した場合、前記問合せで指定されたアドレスと前記応答を基に取得された通信装置属性との対応関係を表す問合せ結果情報を前記記憶資源に書き込む、
(C)前記問合せ結果情報が表す通信装置属性に対応した管理プロトコルを前記属性/プロトコル管理情報から特定する、
(D)前記特定された管理プロトコルを基に、前記アドレスについての最適な管理プロトコルを決定する、
を行う、
管理装置。 - 請求項1記載の管理装置であって、
前記属性/プロトコル管理情報は、最適プロトコル管理情報を含み、
前記最適プロトコル管理情報が有する各属性/プロトコル関係は、第1の管理プロトコルでの問合せに対する応答で取得される2以上の通信装置属性と、それら2以上の通信装置属性から一義的に定まる最適な管理プロトコルとの対応関係であり、
前記(A)において、前記問合せは、前記第1の管理プロトコルで発行される問合せであり、
前記(B)において、前記応答を基に2以上の通信装置属性が取得され、且つ、前記問合せ結果情報は、その2以上の通信装置属性と、前記アドレスとの対応関係を表す情報であり、
前記(D)において、決定された最適な管理プロトコルは、前記(C)で特定された管理プロトコルである、
管理装置。 - 請求項2記載の管理装置であって、
前記属性/プロトコル管理情報は、ポート定義情報を含み、
前記ポート定義情報が有する各属性/プロトコル関係は、ポートの識別情報と、そのポートが開いている通信装置に最適であると推測される管理プロトコルと、そのポートが開いている通信装置にその管理プロトコルが最適である確率との対応関係であり、
前記アドレスについて、前記第1の管理プロトコルでの接続ができない場合、
前記(A)において、前記プロセッサが、前記アドレスについて開きのポートの識別情報の問合せを発行し、
前記(B)において、前記応答を基に、その応答の送信元である通信装置が使用する1以上のポートのうちの1以上の開きのポートの識別情報が取得され、且つ、前記問合せ結果情報は、その1以上の開きポートの識別情報と、前記アドレスとの対応関係を表す情報であり、
前記(C)において、前記プロセッサが、前記問合せ結果情報が表す1以上の開きポートの識別情報に対応する1以上の管理プロトコル及び確率を前記ポート定義情報から特定し、
前記(D)において、決定された最適な管理プロトコルは、前記1以上の管理プロトコル及び確率を基に決定された管理プロトコルである、
管理装置。 - 請求項3記載の管理装置であって、
前記プロセッサは、前記(D)の後に、
(E)前記決定した管理プロトコルについての認証情報の入力を受け、
(F)前記入力された認証情報を用いて、前記アドレスにある通信装置を発見する発見処理を行い、
前記(F)において、前記プロセッサは、
(f1)前記アドレスについて決定された最適な管理プロトコルが第2の管理プロトコルではない場合、前記アドレスについての決定された最適な管理プロトコルの認証情報を用いて、前記アドレスにある通信装置を発見し、
(f2)前記アドレスについて決定された最適な管理プロトコルが前記第2の管理プロトコルであり、且つ、前記第2の管理プロトコルについてのポートが利用可能な場合、前記第2の管理プロトコルの認証情報を用いて、前記アドレスにある通信装置を発見し、
(f3)前記アドレスについて決定された最適な管理プロトコルが前記第2の管理プロトコルであり、且つ、前記第2の管理プロトコルについてのポートが利用不可能な場合、前記第2の管理プロトコルで利用可能なポートに対応する別のアドレスを、前記問合せ結果情報と前記ポート定義情報とを基に特定し、特定した別のアドレスにある通信装置に、前記アドレスにある通信装置を問合せ、その問合せに対する応答から、前記アドレスにある通信装置を発見し、
前記(f3)により発見された通信装置は、前記別のアドレスにある通信装置を介して、監視されることになる通信装置である、
管理装置。 - 請求項4記載の管理装置であって、
前記第1の管理プロトコルは、SNMP(Simple Network Management Protocol)であり、
前記第2の管理プロトコルは、WBEM(Web-Based Enterprise Management)であり、
前記別のアドレスにある通信装置は、前記アドレスにある通信装置をSMI-S(Storage Management Initiative - Specification)で監視する装置である、
管理装置。 - 請求項5記載の管理装置であって、
前記プロセッサは、前記最適プロトコル管理情報及び前記ポート管理情報の少なくとも一方を、入力した情報を基に更新する、
管理装置。 - 請求項1記載の管理装置であって、
前記プロセッサは、前記(D)の後に、
(E)前記決定した管理プロトコルについての認証情報の入力を受け、
(F)前記入力された認証情報を用いて、前記アドレスにある通信装置を発見する発見処理を行い、
前記(F)において、前記アドレスについて、最適プロトコルで使用されるポートが閉じていることが原因で装置の発見に失敗した場合、前記プロセッサは、前記アドレスについて、最適プロトコルを特定し、その最適プロトコルで使用されるポートを開いた状態とすることと、その最適プロトコルについての認証情報を入力することとを表す情報を表示させる、
管理装置。 - 請求項1記載の管理装置であって、
前記属性/プロトコル管理情報は、ポート定義情報を含み、
前記ポート定義情報が有する各属性/プロトコル関係は、ポートの識別情報と、そのポートが開いている通信装置に最適であると推測される管理プロトコルと、そのポートが開いている通信装置にその管理プロトコルが最適である確率との対応関係であり、
前記(A)において、前記プロセッサが、前記アドレスについて開きのポートの識別情報の問合せを発行し、
前記(B)において、前記応答を基に、その応答の送信元である通信装置が使用する1以上のポートのうちの1以上の開きのポートの識別情報が取得され、且つ、前記問合せ結果情報は、その1以上の開きポートの識別情報と、前記アドレスとの対応関係を表す情報であり、
前記(C)において、前記プロセッサが、前記問合せ結果情報が表す1以上の開きポートの識別情報に対応する1以上の管理プロトコル及び確率を前記ポート定義情報から特定し、
前記(D)において、決定された最適な管理プロトコルは、前記1以上の管理プロトコル及び確率を基に決定された管理プロトコルである、
管理装置。 - 請求項8記載の管理装置であって、
前記通信ネットワークに、DNS(Domain Name System)サーバが接続されており、
前記(D)において、前記プロセッサは、前記DNSサーバから、前記アドレスに対応する装置名を問い合わせ、そのアドレスとその装置名との対応関係を表す装置名/アドレス関係情報を前記記憶資源に書込み、
前記(D)において、決定された最適な管理プロトコルは、前記1以上の管理プロトコル及び確率と、前記アドレスを用いて前記装置名/アドレス関係情報から特定される装置名とを基に決定された管理プロトコルである、
管理装置。 - 請求項8記載の管理装置であって、
前記(D)において、前記プロセッサは、前記アドレスと、そのアドレスに基づく、ログイン用のURLとの対応関係を表すURL/アドレス関係情報を前記記憶資源に書込み、
前記(D)において、決定された最適な管理プロトコルは、前記1以上の管理プロトコル及び確率と、前記アドレスを用いて前記URL/アドレス関係情報から特定されるログイン用URLとを基に決定された管理プロトコルである、
管理装置。 - 請求項8記載の管理装置であって、
前記(C)において、特定された1以上の開きポートの識別情報のうち、特定された1以上の確率のうちの最も高い確率に対応した開きポートの識別情報が特定される、
管理装置。 - 請求項1記載の管理装置であって、
前記プロセッサは、前記(D)の後に、
(E)前記決定した管理プロトコルについての認証情報の入力を受け、
(F)前記入力された認証情報を用いて、前記アドレスにある通信装置を発見する発見処理を行い、
前記(F)において、前記プロセッサは、
(f1)前記アドレスについて決定された最適な管理プロトコルが前記第2の管理プロトコルであり、且つ、前記第2の管理プロトコルについてのポートが利用不可能な場合、前記第2の管理プロトコルで利用可能なポートに対応する別のアドレスを、前記問合せ結果情報と前記ポート定義情報とを基に特定し、特定した別のアドレスにある通信装置に、前記アドレスにある通信装置を問合せ、その問合せに対する応答から、前記アドレスにある通信装置を発見する、
管理装置。 - 請求項12記載の管理装置であって、
前記(f1)において、前記プロセッサは、前記アドレスにある通信装置が前記別のアドレスにある通信装置によって監視される装置であることを表す情報を表示させる、
管理装置。 - 通信ネットワークに接続されている通信装置を発見する方法であって、
通信装置の発見に使用される認証情報の入力前に、複数のアドレスの各々について、
(A)アドレスを指定した問合せを発行し、
(B)前記問合せに対する応答を、その問合せで指定されたアドレスにある通信装置から受信した場合、前記問合せで指定されたアドレスと前記応答を基に取得された通信装置属性との対応関係を表す問合せ結果情報を記憶資源に書き込み、
(C)前記問合せ結果情報が表す通信装置属性に対応した管理プロトコルを属性/プロトコル管理情報から特定し、前記属性/プロトコル管理情報は、複数の属性/プロトコル関係を表す情報であり、前記属性/プロトコル関係は、通信装置属性とその通信装置属性を有する通信装置に最適であると推測される管理プロトコルとの対応関係であり、
(D)前記特定された管理プロトコルを基に、前記アドレスについての最適な管理プロトコルを決定する、
方法。 - 認証情報を用いて発見された通信装置を通信ネットワークを介して監視するコンピュータで実行されるコンピュータプログラムであって、
通信装置の発見に使用する認証情報の入力前に、複数のアドレスの各々について、
(A)アドレスを指定した問合せを発行し、
(B)前記問合せに対する応答を、その問合せで指定されたアドレスにある通信装置から受信した場合、前記問合せで指定されたアドレスと前記応答を基に取得された通信装置属性との対応関係を表す問合せ結果情報を記憶資源に書き込み、
(C)前記問合せ結果情報が表す通信装置属性に対応した管理プロトコルを属性/プロトコル管理情報から特定し、前記属性/プロトコル管理情報は、複数の属性/プロトコル関係を表す情報であり、前記属性/プロトコル関係は、通信装置属性とその通信装置属性を有する通信装置に最適であると推測される管理プロトコルとの対応関係であり、
(D)前記特定された管理プロトコルを基に、前記アドレスについての最適な管理プロトコルを決定する、
ことを前記コンピュータに実行させるコンピュータプログラム。
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201080068843.5A CN103080913B (zh) | 2010-11-17 | 2010-11-17 | 发现与通信网络连接的通信装置的方法及管理装置 |
PCT/JP2010/070466 WO2012066652A1 (ja) | 2010-11-17 | 2010-11-17 | 通信ネットワークに接続されている通信装置を発見する方法及び管理装置 |
EP10859871.5A EP2605145A4 (en) | 2010-11-17 | 2010-11-17 | Method for finding communication devices connected to communication network, and management device |
US13/061,475 US8656011B2 (en) | 2010-11-17 | 2010-11-17 | Method and management apparatus for detecting communication apparatus coupled to communication network |
JP2012544047A JP5383927B2 (ja) | 2010-11-17 | 2010-11-17 | 通信ネットワークに接続されている通信装置を発見する方法及び管理装置 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2010/070466 WO2012066652A1 (ja) | 2010-11-17 | 2010-11-17 | 通信ネットワークに接続されている通信装置を発見する方法及び管理装置 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2012066652A1 true WO2012066652A1 (ja) | 2012-05-24 |
Family
ID=46048821
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2010/070466 WO2012066652A1 (ja) | 2010-11-17 | 2010-11-17 | 通信ネットワークに接続されている通信装置を発見する方法及び管理装置 |
Country Status (5)
Country | Link |
---|---|
US (1) | US8656011B2 (ja) |
EP (1) | EP2605145A4 (ja) |
JP (1) | JP5383927B2 (ja) |
CN (1) | CN103080913B (ja) |
WO (1) | WO2012066652A1 (ja) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5911460B2 (ja) * | 2013-09-18 | 2016-04-27 | キヤノン株式会社 | 画像形成装置及び方法、並びにプログラム |
US9866467B1 (en) * | 2016-09-19 | 2018-01-09 | Capital One Services, Llc | Systems and methods for automated determination of network device transiting data attributes |
US10469324B2 (en) | 2016-11-22 | 2019-11-05 | Amazon Technologies, Inc. | Virtual network verification service |
US11108805B2 (en) * | 2018-06-27 | 2021-08-31 | Amazon Technologies, Inc. | Automated packetless network reachability analysis |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008077513A (ja) * | 2006-09-22 | 2008-04-03 | Konica Minolta Business Technologies Inc | デバイスドライバ用インストールプログラム、およびデバイスドライバのインストール方法 |
JP2008084314A (ja) * | 2006-09-08 | 2008-04-10 | Ricoh Co Ltd | 合併企業のリモートデバイスのベンダー識別情報を取得するためのシステム、方法、及びコンピュータプログラム |
JP2008197828A (ja) * | 2007-02-09 | 2008-08-28 | Ricoh Co Ltd | 機器管理装置、機器管理システム、機器管理方法及び機器管理プログラム |
JP2010108063A (ja) | 2008-10-28 | 2010-05-13 | Hitachi Ltd | 監視対象装置管理システム、管理サーバおよび監視対象装置管理方法 |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7069343B2 (en) * | 2001-09-06 | 2006-06-27 | Avaya Technologycorp. | Topology discovery by partitioning multiple discovery techniques |
US7633942B2 (en) * | 2001-10-15 | 2009-12-15 | Avaya Inc. | Network traffic generation and monitoring systems and methods for their use in testing frameworks for determining suitability of a network for target applications |
US20030084176A1 (en) * | 2001-10-30 | 2003-05-01 | Vtel Corporation | System and method for discovering devices in a video network |
JP3703457B2 (ja) * | 2003-01-21 | 2005-10-05 | キヤノン株式会社 | アドレス通知方法、プログラム、及び、装置 |
US20060129415A1 (en) * | 2004-12-13 | 2006-06-15 | Rohit Thukral | System for linking financial asset records with networked assets |
US8014278B1 (en) * | 2007-12-17 | 2011-09-06 | Force 10 Networks, Inc | Adaptive load balancing between ECMP or LAG port group members |
US8165091B2 (en) * | 2008-06-27 | 2012-04-24 | Nix John A | Efficient handover of media communications in heterogeneous IP networks using LAN profiles and network handover rules |
JP4764915B2 (ja) * | 2008-12-08 | 2011-09-07 | 株式会社日立製作所 | 性能管理システム、情報処理システム、及び性能管理システムにおける情報収集方法 |
GB2470360B (en) * | 2009-05-18 | 2011-08-10 | Skype Ltd | Network access nodes |
US8233482B2 (en) * | 2010-04-22 | 2012-07-31 | Robert Paul Morris | Methods, systems, and computer program products for disabling an operative coupling to a network |
-
2010
- 2010-11-17 JP JP2012544047A patent/JP5383927B2/ja not_active Expired - Fee Related
- 2010-11-17 EP EP10859871.5A patent/EP2605145A4/en not_active Withdrawn
- 2010-11-17 US US13/061,475 patent/US8656011B2/en not_active Expired - Fee Related
- 2010-11-17 CN CN201080068843.5A patent/CN103080913B/zh active Active
- 2010-11-17 WO PCT/JP2010/070466 patent/WO2012066652A1/ja active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008084314A (ja) * | 2006-09-08 | 2008-04-10 | Ricoh Co Ltd | 合併企業のリモートデバイスのベンダー識別情報を取得するためのシステム、方法、及びコンピュータプログラム |
JP2008077513A (ja) * | 2006-09-22 | 2008-04-03 | Konica Minolta Business Technologies Inc | デバイスドライバ用インストールプログラム、およびデバイスドライバのインストール方法 |
JP2008197828A (ja) * | 2007-02-09 | 2008-08-28 | Ricoh Co Ltd | 機器管理装置、機器管理システム、機器管理方法及び機器管理プログラム |
JP2010108063A (ja) | 2008-10-28 | 2010-05-13 | Hitachi Ltd | 監視対象装置管理システム、管理サーバおよび監視対象装置管理方法 |
Non-Patent Citations (1)
Title |
---|
See also references of EP2605145A4 |
Also Published As
Publication number | Publication date |
---|---|
EP2605145A4 (en) | 2017-08-16 |
CN103080913A (zh) | 2013-05-01 |
JP5383927B2 (ja) | 2014-01-08 |
US20120124198A1 (en) | 2012-05-17 |
EP2605145A1 (en) | 2013-06-19 |
US8656011B2 (en) | 2014-02-18 |
CN103080913B (zh) | 2015-07-01 |
JPWO2012066652A1 (ja) | 2014-05-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4882036B1 (ja) | 電化製品の種別を決定する情報処理装置、方法、サーバ | |
US9369357B2 (en) | Method, system, and computer readable medium for remote device management | |
US10110437B2 (en) | Method and apparatus to detect unidentified inventory | |
JP5756146B2 (ja) | ユーザ端末、リモートサポート方法、及びユーザ端末用プログラム | |
US20120246297A1 (en) | Agent based monitoring for saas it service management | |
US20070260721A1 (en) | Physical server discovery and correlation | |
US8909798B2 (en) | Method and apparatus of matching monitoring sets to network devices | |
JP5714467B2 (ja) | リモートサポートを受ける携帯型端末、リモートサポート方法、リモートサポート用プログラム、オペレータシステム、オペレータサーバ、及びオペレータ端末 | |
JP5617304B2 (ja) | スイッチング装置、情報処理装置および障害通知制御プログラム | |
JP2005515550A (ja) | 信任証の管理およびネットワーク照会 | |
JP5383927B2 (ja) | 通信ネットワークに接続されている通信装置を発見する方法及び管理装置 | |
JP2007128331A (ja) | ネットワーク接続機器の自動生成機構 | |
Cisco | Monitoring and Controlling CiscoWorks Blue Applications | |
CN113709210A (zh) | 一种设备发现方法、装置、系统、电子设备及存储介质 | |
JP3944214B2 (ja) | デバイス管理システム、装置および方法 | |
JP5815485B2 (ja) | オペレータシステム及び、リモート操作方法 | |
JP4463868B2 (ja) | ネットワーク接続機器管理システム | |
JP4675834B2 (ja) | ネットワーク接続装置、方法およびプログラム | |
KR101069401B1 (ko) | 통합 망 관리 시스템 및 그 제어 방법 | |
JP5875050B2 (ja) | ユーザ端末、オペレータサーバ、オペレータシステム、リモート操作方法、及びオペレータシステム用プログラム | |
EP4298767A1 (en) | Conversational assistant dialog design | |
WO2023137374A1 (en) | Conversational assistant dialog design | |
Taina | Data Center Monitoring Using Nagios | |
JP2014017679A (ja) | リモートサポートを受ける携帯型端末、リモートサポート方法、リモートサポート用プログラム、オペレータシステム、オペレータサーバ、及びオペレータ端末 | |
JP2008131345A (ja) | コールセンタ装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 201080068843.5 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13061475 Country of ref document: US |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10859871 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2012544047 Country of ref document: JP Kind code of ref document: A |
|
REEP | Request for entry into the european phase |
Ref document number: 2010859871 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2010859871 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |