This
Use the following menu options to navigate the SL1 user interface:
- To view a pop-out list of menu options, click the menu icon (
).
- To view a page containing all of the menu options, click the Advanced menu icon (
).
What is the Device Toolbox?
The Device Toolbox page allows you to access common network tools. The list of tools available depends upon the type of device and the configuration of the device.
The Device Toolbox page allows you to run diagnostics on a device and access devices without leaving the Compute Nodes.
Accessing the Device Toolbox page
To access the Device Toolbox page:
- Go to the Device Manager page (Devices > Classic Devices, or Registry > Devices > Device Manager in the classic SL1 user interface).
- In the Device Manager page, find the device for which you want to access the Device Toolbox page and select its wrench icon (
).
- In the Device Administration panel, select the Toolbox tab.
- Depending on the device, the Device Toolbox page can display one or more of the following buttons. These tools run on the Data Collector that is currently monitoring the device unless otherwise noted:
- FTP. Opens a new browser window and attempts to make an FTP connection to the current device. This tool is initiated from the user's machine and does not run on a Data Collector. This tool appears only if the correct port (port 21) is detected as open by SL1.
- SSH. Opens an SSH session on the device. This tool is initiated from the user's machine and does not run on a Data Collector. This tool appears only if the correct port (port 22) is detected as open by SL1.
- Telnet. Opens a browser session or terminal session using the IP address of the current device and prompts you for the telnet username and password. This tool is initiated from the user's machine and does not run on a Data Collector. This tool appears only if the correct port (port 23) is detected as open by SL1.
- Terminal. Opens the Terminal Services Client Web Connection modal page, where you can enter the login information for the terminal services session. This tool is initiated from the user's machine and does not run on a Data Collector. This tool appears only if the correct port (port 3389) is detected as open by SL1.
- Web. Opens a new browser window and attempts to make an http connection to the current device. This tool is initiated from the user's machine and does not run on a Data Collector.
- Secure Web. Opens a new browser window and attempts to make an HTTPS connection to the current device. This tool is initiated from the user's machine and does not run on a Data Collector. This tool appears only if the correct port (port 443) is detected as open by SL1.
- SNMP Walker. Opens the SNMP Walker modal page, where you can perform an SNMP walk on the device. If the device has an IPv6 address, SL1 will use the appropriate IPv6 SNMP command.
- Port Scan. Leads to the Port Scan modal page, where you can view a list of all open ports on the device at the time of the scan.
- Deep Port Scan. Leads to the Deep Port Scan modal page, where you can view a list of all open ports and view as much detail about each open port as the deep port scanner can retrieve.
- Traceroute. Leads to the Traceroute modal page, where you can view the network route between SL1 and the device. If the device has an IPv6 address, SL1 will use the appropriate IPv6 traceroute command.
- Ping Tool. Leads to the Ping_Tool modal page, where you can view the statistics returned by the ping tool. The ping tool sends a packet to the device's IP address (the one used by SL1 to communicate with the device) and waits for a reply. SL1 then displays the number of seconds it took to receive a reply from the device and the number of bytes returned from the device. If the device has an IPv6 address, SL1 will use the appropriate IPv6 ping command.
- Forward DIG. Leads to the Forward DIG modal page, where you can view the output from the DIG utility. This tool automatically finds all available DNS information about the domain associated with the current device.
- Reverse DIG. Leads to the Reverse DIG modal page, where you can view the output from the reverse DIG utility. The reverse DIG tool retrieves the domain name that is associated with the device's IP.
- ARIN Whois. Leads to the ARIN Whois modal page, where you can view the output from the Whois utility. The Whois utility displays information about the device's IP, including the organization that registered the IP and contacts within that organization.
- ARP Lookup. Leads to the ARP Lookup modal page, where you can view the results from the ARP Lookup tool. The ARP Lookup tool displays a list IP addresses for the device and the resolved Ethernet or Token Ring physical addresses (MAC addresses) for each IP address.
- ARP Ping. Leads to the ARP Ping modal page, where you can view the results from the ARP Ping tool. The ARP Ping tool is similar in function to ping, but it operates using ARP instead of ICMP. The ARP Ping tool can be used only on the local network.
- SNMP Dump. Leads to the SNMP Dump modal page, where you can view the results of the SNMP Dump. The SNMP Dump tool retrieves each OID and its corresponding value from the device.
- Web Policy. Leads to the Web Policy modal page, where you can manually run a web-content policy on the device. This tool is initiated from the user's machine and does not run on the collector. This tool appears only if a Web Content Monitoring Policy has been configured for the device.
NOTE: The SSH tool is not available for SL1 systems that are configured as military unique systems.
Viewing the Session Logs
After you run a tool in the Device Toolbox, information about the session appears the Toolbox Sessions Logs pane (at the bottom of the page).
For each session, you can view the following:
- Device. Device associated with the session.
- IP Address. IP address that was polled by the session.
- Tool. Tool that was run.
- Run Date. Date the session occurred.
- Run User. User who initiated the session.
- Session ID. Unique numeric identifier automatically assigned to the session by SL1.
From the Toolbox Sessions Logs pane, you can also:
- View an SNMP Walk Session (
).
- View raw data from the session (
).
- Export raw data from the session to a file on the local computer (
).
- Delete a session from the Toolbox Sessions Logs pane (
).