5-31
User
Guide

for

the

Cisco

Application

Networking

Manager

5.2
OL-26572-01
Chapter
5






Importing

and

Managing

Devices
Discovering
Large

Numbers

of

Devices

Using

IP

Discovery
c.
Enter
the

Telnet

credentials

(see
Ta
b

l

e
5-10
).
d.
Do
one

of

the

following:


Click

OK

to

save

your

entries

and

to

return

to

the

Telnet

Credentials

table.


Click

Cancel

to

exit

this

procedure

without

saving

your

entries

and

to

return

to

the

Telnet
Credentials
table.


Click

Next

to

deploy

your

entries

and

to

add

another

set

of


Telnet

cr

edentials.
Step
5
To
modify
the
existing
SNMP

credentials,

do

the
following:
a.
Choose
Configuration
>

SNMP

Credentials.

The

SNMP

Credentials

table

appears.
b.
Click
Add

to

add

a

set

of

credentials

to

this

credential

pool,

or
choose
an

existing

set

of

credentials,
and
cl

ick

Edit

to

modify

it.
c.
Enter
the

SNMP

credentials
(see
Ta
b

l

e
5-11
).
d.
Do
one

of

the

following:


Click

OK

to

save

your

entries

and

to

return

to

the

SNMP

Credentials

table.


Click

Cancel

to

exit

without

saving

your

entries

and

to

return

to

the

SNMP

Credentials

table.


Click

Next

to

deploy

your

entries

and

to

configure

another

set

of

SNMP

credentials.
Related
Topics


Running
IP

Discovery

to

Identify
Devices,
page
5-31


Configuring
Device

Access
Credentials,
page
5-29


Discovering
Large

Numbers

of
Devices
Using

IP

Discovery,

page
5-27
Running
IP

Discovery

to

Identify

Devices
You
can

run

IP

Discovery

to

locate

IP

addresses

of

the

Catalyst

6500

series

chassis

(hosting

the

ACE
module),
ACE

appliance,

and

Catalyst

6500

Virtual

Switching

System

(VSS)

devices.
After
establishing

Telnet

and

SNMP

credentials

(see

the

“Configuring

Device

Access

Credentials”
section
on

page

5-29 ),

use

this

procedure

to

identify

chassis

and

ACEs

on

your

network.
Caution
IP
Discovery

sends

unencrpyted

cr

edentials

(Telnet
and
SNMP)

to

all

devices

on

the

specified
subnet
that
respond

to

the

associated

ports.

This

is

a

potential

security

risk

because

credentials

are

broadcast
out
to

one

or

more

networks.

IP

Discovery

may

also

find

devices

that

cannot

be

imported

or

be

unable
to
find

devices

that

could

be

imported.
Before
You

Begin
For
this

procedure,

you

need

the

follow

items:


IP
address

for

the

discovery

process.


Applicable
subnet

mask.


Valid
credentials

for
this
discovery

(see

the
“Configuring
Device
Access
Credentials”

section

on
page
5-29 ).