Optimize 10.7 | webMethods Optimize Documentation | Administering webMethods Optimize | For System Administrators | Discovering Assets and Monitoring Components | Discovering Assets | The Discovery Page | Adding a Network
 
Adding a Network
The Add Network button on the Discovery page enables you to add assets to your environment when you do not know the exact connection information for the desired assets on your network. You can locate and add Integration Server and Broker Server assets using a range of IP addresses. Use the following procedure and tables to add assets using the Add Network button.
Note:
Only Integration Server and Broker Server components can be discovered using the Add Network button. For more information about adding other assets, see Adding an Asset.
*To add a discovery using the Add Network button
1. In My webMethods: Navigate > Applications > Administration > Analytics > Infrastructure Components > Discovery
The Discovery page is displayed.
2. Click Add Network.
The Add Network Discovery dialog is displayed.
3. Populate the fields (required fields are identified with *).
The fields on the Add Network Discovery dialog change to match those required by the selected discovery type.
4. Complete the fields on the Add Network Discovery dialog.
Refer to the tables that follow this procedure for information about the optional and required fields for each valid discovery type.
5. Click OK to add the specified asset, or click Cancel if you want to cancel the procedure without adding the discovery.
6. Click Refresh to update the information on the Discovery page.
Note:
Network discovery sends UDP echo and NETBIOS Name Server query requests to each address within the specified address range. When a host responds to these requests, it is added to the list of servers. The UDP echo service (port 7) and NETBIOS Name Server (port 137) must be available on the remote hosts for them to be discovered through Network Search.
To discover an Integration Server, enter the information from the table below on the Add Network Discovery dialog (required fields are identified with *) :
The following table describes the fields in the Add Network Discovery dialog.
Field
Description
*Asset Type
Select the type of asset (Integration Server) to discover.
*Discovery Name
Enter a name for this discovery.
*Data Collector
Select the Infrastructure Data Collector to use for the discovery.
Tip:
Only one Infrastructure Data Collector can be used to monitor the same Integration Server instance on different JMS queues; so if you use multiple Infrastructure Data Collectors, be careful not to point more than one to the same Integration Server.
*Start IP
Enter the IP address at the beginning of the range to scan.
*End IP
Enter the IP address at the end of the range to scan.
*Port
Enter the port number for the discovery.
SSL
(Optional) Select if an SSL connection is required.
KeyStore File
This field appears only if SSL is selected. Specify the location of the KeyStore file.
*Username
User ID needed to log in to the asset. Required if displayed but not displayed if a KeyStore file is listed.
*Password
Password needed to log in to the asset. Required if displayed but not displayed if a KeyStore file is listed.
KeyStore Password
This field appears only when KeyStore file information is supplied. Specify the password for the KeyStore file.
KeyStore Alias
This field appears only when KeyStore file information is supplied. Specify the alternate name for the KeyStore file.
Include System Packages/Services
(Optional) Select if you want to include webMethods-supplied packages and services in the data returned from the Integration Server. Disabled by default.
Note:
To discover an Integration Server which is hosted on a separate virtual machine, using its IPv6 address, open the Software AG_directory/profiles/IS_default/configuration/custom_wrapper.conf file located on that virtual machine and add the following line:
wrapper.java.additional.400=-Djava.rmi.server.hostname=[IPv6 address of the machine which hosts the Integration Server]
The IPv6 address should be enclosed within square brackets.
To discover a Broker Server, enter the information from the table below on the Add Network Discovery dialog (required fields are identified with *).
The following table describes the fields in the Add Network Discovery dialog.
Field
Description
*Asset Type
Select the type of asset (Broker Server) to discover.
*Discovery Name
Enter a name for this discovery.
*Data Collector
Select the Infrastructure Data Collector to use for the discovery.
*Start IP
Enter the IP address at the beginning of the range to scan.
*End IP
Enter the IP address at the end of the range to scan.
*Monitor Port
Enter the Broker monitor port number.
*Server Port
Enter the Broker Server port number.
Client Authentication
Select the client authentication type appropriate for the Broker Server being discovered. Available options are “None”, “Basic” and “Certificate”. Note that additional fields may be displayed on the Discovery dialog based on your selection as explained below.
Encryption
Select this check box if the Broker Server being discovered requires encryption. Note that TrustStore File and TrustStore Type fields are displayed and are required if encryption is selected.
KeyStore File
Type the name and path of the Broker Server KeyStore file. This field is displayed, and required, only when client authorization is “Certificate”.
KeyStore Type
Type. the KeyStore file type. This field is displayed, and required, only when client authorization is “Certificate”.
KeyStore Password
Type the password for the Broker Server certificate file. This field is displayed, and required, only when client authorization is “Certificate”.
TrustStore File
Type the TrustStore filename if required to identify the owner or issuer of the certificate file. This field is displayed only when either the client authorization is “Certificate” or the Encryption box is checked. If the Encryption box is checked, the field is required.
TrustStore Type
Type the TrustStore file type. This field is displayed only when either the client authorization is “Certificate” or the Encryption box is checked. If the Encryption box is checked, the field is required.