Modeling devices using port scan
You can model IP services by doing a port scan, using the Nmap Security Scanner. You must provide the full path to your system's nmap command.
To determine where nmap is installed, at the command line, enter:
If your system returns a result similar to:
/usr/bin/which: no nmap in (/opt/zenoss/bin:/usr/kerberos/bin:/usr/local/bin:/bin:/usr/bin:/opt/zenoss/bin)
then nmap is not installed. Install it, and then try again.
After locating the nmap command (including the directory beginning with /), enter the following as the zenoss user on the Zenoss Core server:
cd $ZENHOME/libexec ln -s Full_Path_to_nmap
To model a device using a port scan:
- Select the device in the device list.
- In the left panel, select Modeler Plugins.
- Select the zenoss.nmap.ipServiceMap plugin in the list of Available plugins, and then use the right arrow control to move it to the list of Selected plugins.
- Click Save.
- Remodel the device by clicking the Model Device button.