Apart from scanning Linux, Unix, Mac and Windows computers, as well as VMware servers, Lansweeper is also capable of scanning network devices. Some examples of network devices are: cameras, firewalls, mail servers, music systems, NAS devices, printers, routers, switches, UPS devices, VOIP phones and web servers. More specifically, Lansweeper can pull data from any device that has one or more of the following protocols enabled: Bonjour, DNS-SD, FTP, HTTP, HTTPS, JetDirect, mDNS, SIP, SMTP, SNMP (SNMPv1, SNMPv2 or SNMPv3), SSDP, Secure Shell (SSH) is a cryptographic network protocol that Lansweeper uses to scan Linux and..., Telnet, UPnP or WMI.
SNMP generally provides Lansweeper with the most detailed device information. Many network devices have SNMP enabled by default and use public and private as their default SNMP community strings (i.e. passwords), public being for read-only access and private for read/write access. A community string with read-only access is sufficient for Lansweeper scanning. For information on configuring SNMP or another protocol on your device itself, you'll need to consult the device documentation, as protocol support and setup differ from device to device.
If you are unsure which protocols are enabled on a device, or would like to test your SNMP or SSH credential, run the below tool on your Lansweeper server. It tests access to the various protocols supported by Lansweeper. Don't forget to submit your SNMP or SSH credential in the tester, if relevant. Also make sure to run the tool from the machine hosting the Lansweeper Server service, as this is the only way to simulate exactly which protocols your Lansweeper installation will have access to as well.