Submit a ticketCall us

Cloud Workloads: Meet Your New Hybrid IT Reality
Have you found yourself in that evolving, hybrid IT grey area and wondering if cloud workloads are now part of your purview? And if so, will monitoring cloud workloads require a new set of dedicated cloud monitoring tools? Your answers: yes, they should be, and no, they don’t.

Find out how SolarWinds® Server & Application Monitor (SAM) can help you monitor your cloud workloads side by side with your on-premises workloads. Register Now.

Home > Success Center > Kiwi CatTools > Kiwi CatTools 3.11 Administrator Guide > Activities > Activities list > Device.CLI.Modify Config > When to use the Device.CLI.Modify Config activity

When to use the Device.CLI.Modify Config activity

Table of contents
No headers
Created by Caroline Juszczak, last modified by Caroline Juszczak on Jun 28, 2016

Views: 9 Votes: 0 Revisions: 1

 

This activity is a useful network management tool for several reasons:

  • It allows you to have very fine-grained timing control over your network.
  • It enables you to automate these controls, yet still use exactly the same commands as you would enter if you did the task manually.

 

The benefit is that you learn and use the same command line instructions in both cases, and the CatTools program itself is very simple to learn to use in quite sophisticated ways because it simply applies those commands on your behalf, just as you would via telnet.

 

The time controls are perhaps the most useful aspect of this activity. With different combinations of scheduled activities you can tune your network to the changing needs of your organization over the course of a typical business day or week.

 

CatTools is designed to manage the repetitive scheduled configuration tasks on your behalf. It removes the possibility of human error from such tasks. It provides you with a much greater confidence in the currency of your backup processes, and in your ability to roll back to a previous state using your historical backups. It provides for active management of your network and its condition, by enabling the remote execution of command line instructions across your network, at times determined by you.

 

For example:

 

If you have some switch ports that are wired to a shared conference room that is only in use during the day, you could schedule a config change to shutdown the specific interfaces at 6 p.m. and then another activity to enable the interfaces at 7 a.m. This will ensure that unauthorized staff can not hack into the network from the shared conference room after hours.

 

Scheduled config changes could also be used to add or remove access-list entries at specified times. Allowing access to the payroll system during business hours only.

 

The uses are only limited by your imagination.

Last modified

Tags

Classifications

Public