What is this?

This knowledgebase contains questions and answers about PRTG Network Monitor and network monitoring in general.

Learn more

PRTG Network Monitor

Intuitive to Use. Easy to manage.
More than 500,000 users rely on Paessler PRTG every day. Find out how you can reduce cost, increase QoS and ease planning, as well.

Free Download

Top Tags


View all Tags

Blacklist IP Discovery or More flexability

Votes:

0


Want this feature implemented, too? Please upvote by clicking Thumbs up!

(Posts as a reply won't be published in this feature request thread. Read Me!)


User Story

Discovery is a very powerful tool, however it needs to work on the administrators terms. I've seen this brought up before and the recommended fix is not real effective. what i'm looking for is a way to say scan this IP range, BUT exclude this ip range.

Details of User Story

When setting up discovery I've run into a problem for the past few years. our ip address range in use for most of our monitored equipment shares a range with our remote access VPN DHCP pool. i'd like to blacklist out this 50 host section of addresses. As it stands now i've got the range of addresses created and put into a group that is paused so they don't monitor, this works somewhat unless a machine goes offline before discovery finishes. it appears Discovery works by scanning IP ranges, then assigning the DNS response as the device name and then ignoring that it found an IP address. for this reason i go back through all my discovered devices and set the device name, and then change the DNS/IP to be the actual IP address. (i'm not going to go into how odd it is that the Hostname and IP address are not set on every device by default since the only place you would not want this is on DHCP devices which normally in my experience are not monitored). to this point though once the initial discovery is completed it moves on and leave the device with just a DNS name. now what appears to happen is if someone logs out of the VPN after being discovered but before discovery completes the device is listed by DNS name, does not match the existing entry for that ip address, and then starts alerting. this can get annoying since it requires constant cleanup to keep the garbage out of the alerts.

Acceptance criteria

  • discovery options for IP address Range should include a DO NOT scan Range when a larger Address Range selected such as a masked Ip address (10.1.1.0/24), or a specific range, (10.1.1.1-254)
  • This could also be achieved by allowing the range setting to have multiple comma separated entries such as (10.1.1.1-10, 10.1.1.50-254 (although this method would be a bit more confusing and cumbersome)

Status

Open

add-feature improve-prtg improvement-request

Created on Nov 1, 2019 12:12:31 PM



Replies

Nobody has replied yet


Disclaimer: The information in the Paessler Knowledge Base comes without warranty of any kind. Use at your own risk. Before applying any instructions please exercise proper system administrator housekeeping. You must make sure that a proper backup of all your data is available.