...
Secure connectors are always preferred to insecure connectors.
For example, if a device is available over both Telnet and SSH, SSH will be used.
- Detect credentials
Credential discovery works differently depending if the device is set to "Discover" credentials, or has "Bound" credentials.
If credential discovery enabled:
All credentials configured in the 'Credentials' settings are checked against the device.
Credentials are checked against the device in random order.
Whichever credentials work on the device first will be used for any future operations with this device.
When credentials bound to device:
Only bound credentials are tested against the device
If bound credentials do not work, the job fails
- Detect device vendor and model
...