Multi-VLAN Deployment
Scanopy uses daemons to discover hosts and services. For isolated VLANs, you’ll need additional daemons deployed on each network segment.
┌─────────────────────────────────────────────────────────────┐│ Scanopy Server ││ (Cloud or Self-Hosted) │└─────────────────────────┬───────────────────────────────────┘ │ ┌─────────────────┼─────────────────┐ │ │ │ ▼ ▼ ▼┌───────────────┐ ┌───────────────┐ ┌───────────────┐│ VLAN 1 │ │ VLAN 2 │ │ VLAN 3 ││ Production │ │ IoT │ │ Guest ││ 192.168.1.0/24│ │ 192.168.2.0/24│ │ 192.168.3.0/24││ [Daemon 1] │ │ [Daemon 2] │ │ [Daemon 3] │└───────────────┘ └───────────────┘ └───────────────┘When You Need Multiple Daemons
Section titled “When You Need Multiple Daemons”One Daemon is Enough When:
Section titled “One Daemon is Enough When:”- All hosts are on the same subnet as the daemon
- You have a management host with routes to all VLANs
- Your firewall allows the daemon to reach all subnets
- You don’t need MAC addresses from isolated networks
You Need Multiple Daemons When:
Section titled “You Need Multiple Daemons When:”- VLANs are isolated by firewall rules
- You need accurate MAC address collection (requires Layer 2 access)
- Different networks have different security requirements
Deployment Strategies
Section titled “Deployment Strategies”Strategy 1: Daemon Per VLAN (Recommended)
Section titled “Strategy 1: Daemon Per VLAN (Recommended)”Deploy a lightweight daemon on each VLAN.
Pros: Full Layer 2 access (MAC addresses, ARP), no inter-VLAN firewall rules needed, best discovery accuracy
Cons: More daemons to manage, requires a host on each VLAN
Best for: Production environments, security-conscious deployments
Strategy 2: Central Daemon with Routing
Section titled “Strategy 2: Central Daemon with Routing”Use a single daemon on a host that can route to all VLANs.
Pros: Single daemon to manage
Cons: No MAC addresses for remote subnets, requires firewall rules, can’t discover hosts without open ports
Best for: Small networks, lab environments, quick setup
Strategy 3: Hybrid Approach
Section titled “Strategy 3: Hybrid Approach”Central daemon for routable networks, dedicated daemons for isolated segments.
Step-by-Step Setup
Section titled “Step-by-Step Setup”Step 1: Plan Your Deployment
Section titled “Step 1: Plan Your Deployment”| VLAN | Subnet | Purpose | Daemon Location |
|---|---|---|---|
| 1 | 192.168.1.0/24 | Production | Server host |
| 10 | 192.168.10.0/24 | IoT | IoT management VM |
| 20 | 192.168.20.0/24 | Guest | Guest network AP |
Step 2: Create Daemon in Scanopy UI
Section titled “Step 2: Create Daemon in Scanopy UI”- Navigate to Manage > Daemons
- Click “Create Daemon”
- Select the target network
- Choose daemon mode:
- Pull: Daemon polls for work (daemon only needs outbound access to server)
- Push: Server initiates scans (daemon must be reachable from server)
- Click “Generate Key”
- Copy the installation command
Step 3: Deploy Daemon
Section titled “Step 3: Deploy Daemon”Follow the installation instructions in Installing a Daemon.
For Docker container discovery on the daemon host, see Docker Socket Proxy.
Step 4: Configure Discovery
Section titled “Step 4: Configure Discovery”- Navigate to Discover > Scheduled
- Click “Create Discovery”
- Select the daemon you deployed
- Choose Network Scan
- Select subnets to scan
- Set schedule or run manually
Step 5: Verify
Section titled “Step 5: Verify”- Run a manual discovery from Discover > Sessions
- Check Manage > Hosts for discovered devices
- Verify Topology shows hosts from all VLANs
For consolidating hosts that appear on multiple VLANs, see Consolidating Duplicate Hosts.
Network Requirements
Section titled “Network Requirements”Firewall Rules for Pull Mode (Recommended)
Section titled “Firewall Rules for Pull Mode (Recommended)”Daemon initiates all connections. Minimal firewall changes needed.
| Source | Destination | Port | Protocol | Purpose |
|---|---|---|---|---|
| Daemon | Server | 60072 | TCP | API communication |
| Daemon | Local subnet | * | TCP | Network scanning |
Firewall Rules for Push Mode
Section titled “Firewall Rules for Push Mode”Server initiates scan requests. Daemon must be reachable.
| Source | Destination | Port | Protocol | Purpose |
|---|---|---|---|---|
| Server | Daemon | 60073 | TCP | Push scan requests |
| Daemon | Server | 60072 | TCP | Report results |
| Daemon | Local subnet | * | TCP | Network scanning |