Updated: April 10, 2017
Consider the following benefits of SolarWinds Network Topology Mapper (NTM):
Define and store credentials in NTM for re-use and use them during discovery.
For detailed information, see Specify discovery credentials.
NTM uses multiple discovery methods (SNMP, ICMP, WMI, CDP, VMWare) to map all types of devices and their interconnections—switches, routers, servers, VMs, unmanaged nodes, desktop computers, peripheral devices. In scanning a network, you can exclude devices and network segments from discovery scans and also track changes in network topology through scheduled updates.
Since NTM discovers multiple links for devices and maps Layer 2 (port level) and Layer 3 (logical) connectivity, as well as Etherchannel relationships, you can see and more easily understand physical and logical relationships between devices. NTM lets you view each layer separately or combined them in one map.
With a single discovery scan, you can create multiple maps and show detailed system information for discovered devices, including load statistics, with rollover graphics down to the interface level.
For detailed information, see Discover devices and topologies.
By providing both switch and VLAN details (in connection rollovers for HP/3Com and Juniper Switches, and mapping virtual servers to host machines), NTM provides a clear picture of the connectivity of virtual devices to your physical network.
In working with the maps based on a discovery scan, you can choose to display or hide various details about the mapped nodes and the connections between them. You can arrange nodes according to predefined layouts or by manually dragging them. As needed, you can select an area of the larger map and copy it into a separate map.
For detailed information, see Work with maps.
NTM facilitates IT monitoring, planning, trouble-shooting workflows by being able to export maps to multiple formats (Visio, PNG, Orion Network Atlas, PDF & NTM Map format)
With NTM, you can protect stored and exported maps with a password. This secures detailed network information contained in maps from being used by unauthorized persons. NTM uses FIPS-compliant encryption to secure map data in native NTM map files.
NTM can generate reports on switch ports, VLANs, subnets, and device inventory.