Which three protocols can you use to collect detailed configuration information on network devices for inventory purposes?