Documentation forNetwork Topology Mapper

Benefits of Network Topology Mapper

Consider the following benefits of SolarWinds Network Topology Mapper (NTM):

Define and reuse credentials

Define and store credentials in NTM for re-use and use them during discovery.

For detailed information, see Specify discovery credentials.

Schedule device and topology discovery

NTM uses multiple discovery methods (SNMP, ICMP, WMI, CDP, VMWare) to map all types of devices and their interconnections—switches, routers, servers, VMs, unmanaged nodes, desktop computers, peripheral devices. In scanning a network, you can exclude devices and network segments from discovery scans and also track changes in network topology through scheduled updates.

Since NTM discovers multiple links for devices and maps Layer 2 (port level) and Layer 3 (logical) connectivity, as well as Etherchannel relationships, you can see and more easily understand physical and logical relationships between devices. NTM lets you view each layer separately or combined them in one map.

With a single discovery scan, you can create multiple maps and show detailed system information for discovered devices, including load statistics, with rollover graphics down to the interface level.

For detailed information, see Discover devices and topologies.

Map virtual device connectivity

By providing both switch and VLAN details (in connection rollovers for HP/3Com and Juniper Switches, and mapping virtual servers to host machines), NTM provides a clear picture of the connectivity of virtual devices to your physical network.

Strategically manage maps

In working with the maps based on a discovery scan, you can choose to display or hide various details about the mapped nodes and the connections between them. You can arrange nodes according to predefined layouts or by manually dragging them. As needed, you can select an area of the larger map and copy it into a separate map.

For detailed information, see Work with maps.

Share and print maps

NTM facilitates IT monitoring, planning, trouble-shooting workflows by being able to export maps to multiple formats (Visio, PNG, Orion Network Atlas, PDF & NTM Map format)

Encrypt maps

With NTM, you can protect stored and exported maps with a password. This secures detailed network information contained in maps from being used by unauthorized persons. NTM uses FIPS-compliant encryption to secure map data in native NTM map files.

  • You can use maps from earlier versions of NTM but you will be prompted to change all SNMP v3 credentials which are not using FIPS compliant algorithms.
  • "Proxy maps" created in previous versions of NTM and Network Atlas are not compatible with new version of NTM running in FIPS mode. If you need to use such older maps, you must disable the FIPS requirement on the operating system.
  • If you change the FIPS requirement in your operating system, either by disabling or enabling FIPS, you must restart NTM if it is running at the time.


NTM can generate reports on switch ports, VLANs, subnets, and device inventory.