The system uses the credentials you provide in a number of ways to help with discovery, topology, and a variety of other product features.
All the credentials you share with Auvik are sent to the cloud and stored there using AES-128 encryption. They’re decrypted and made available to the system only as needed for delivering product features.
SNMP community strings / passwords
SNMP is a valuable source of information for discovery and stats monitoring. Auvik requires read-only access to SNMP and supports v1, v2c, and v3 SNMP credentials. The system polls for information at a rate of up to every 30 seconds. If data doesn't change, the system slows down its polling rate.
Login credentials (Telnet, SSH, CLI)
When Auvik finds a device it hasn't fully identified, it tries to establish a Telnet or SSH connection to learn more. Auvik looks for certain words on login or begins to issue some commands once logged in. Telnet, SSH and CLI credentials are also used to access features like the terminal, and configuration backup and restore.
How the CLI is used
For network elements, the system attempts a series of "show" commands to help with identification. For example "show version" or equivalent is used to capture the model and firmware versions.
All commands issued are read-only. The system can, but isn't limited to, issuing the following commands:
- Show running-config
- Show startup-config
- Show arp
- Show route
- Show mac-address-table
- Show cdp / lldp
Syntax may vary from vendor to vendor.
The only exception to commands being read-only occurs when you decide to restore a configuration. In this case, Auvik overwrites the running config with your previous configuration.
When Auvik finds a Windows device with WMI enabled, it tries to establish a basic authentication connection to learn more. The credentials are used only to gather information about the Windows device so that Auvik can give you accurate data.
(You can configure WMI to restrict access to Auvik only. See How to enable WMI monitoring on a single Windows device for details on setting this up.)
When Auvik finds a VMware hypervisor, it tries to establish a basic authentication connection to learn more. The credentials are used only to gather information about the hypervisor and the associated virtual machines, so that Auvik can give you accurate data.