Scanning of Cisco Switches - SSH isn't enabled but minimal information obtained from SNMP

Scanning of Cisco Switches - SSH isn't enabled but minimal information obtained from SNMP

I have been scanning a few test CISCO switches.
 
SNMP is returning minimal information and SSH isn't used in the company (and won't be in the near future).
 
This corresponds with your existing documentation and forum answers
 
On talking to the engineers about the issue, they explained that the majority, if not all, of the information that is required is obtainable via SNMP (and proved this with a HP Asset scan), and were wondering why you would use an intrusive method of obtaining the information?
 
Extract from email :-

I would ask the vendor to review how this tool uses SNMP to gather information from Cisco devices and other network vendors as the SNMP MIB’s are usually very good. As you can see from the attached HP Asset only used SNMP to gather information although it also has login available if necessary but this wasn’t  required.

 

Most network asset tools from Cisco, HP etc provide a login feature which allows scripted commands to be run on a device. I would only recommend this as a last resort as it is intrusive to the device and may also compromise the devices configuration  resulting in a network outage.

 

Logging into a device whether it is by SSH or Telnet is a intrusive way to gather information whereas SNMP in not intrusive.   
 
End of extract.
 
 
Can you comment?
              New to ADManager Plus?

                New to ADSelfService Plus?