Submit a ticketCall us

WebinarUpcoming Webinar: How Help Desk and Remote Support Pays for Itself

Learn how help desk software can simplify ticketing management, allow you to track hardware and software assets, and accelerate the speed of IT support and service delivery. Gain insights on how remote support tools allow your IT team to maximize their efficiency and ticket resolution by expediting desktop troubleshooting, ultimately helping keep end-users happy and productive.

Register here.

Home > Success Center > Kiwi CatTools > Kiwi CatTools Documentation > Kiwi CatTools 3.11 Administrator Guide > Activities > Activities list > Device.CLI.Modify Config > When to use the Device.CLI.Modify Config activity

When to use the Device.CLI.Modify Config activity

Table of contents
No headers
Created by Caroline Juszczak, last modified by Caroline Juszczak on Jun 28, 2016

Views: 97 Votes: 0 Revisions: 1


This activity is a useful network management tool for several reasons:

  • It allows you to have very fine-grained timing control over your network.
  • It enables you to automate these controls, yet still use exactly the same commands as you would enter if you did the task manually.


The benefit is that you learn and use the same command line instructions in both cases, and the CatTools program itself is very simple to learn to use in quite sophisticated ways because it simply applies those commands on your behalf, just as you would via telnet.


The time controls are perhaps the most useful aspect of this activity. With different combinations of scheduled activities you can tune your network to the changing needs of your organization over the course of a typical business day or week.


CatTools is designed to manage the repetitive scheduled configuration tasks on your behalf. It removes the possibility of human error from such tasks. It provides you with a much greater confidence in the currency of your backup processes, and in your ability to roll back to a previous state using your historical backups. It provides for active management of your network and its condition, by enabling the remote execution of command line instructions across your network, at times determined by you.


For example:


If you have some switch ports that are wired to a shared conference room that is only in use during the day, you could schedule a config change to shutdown the specific interfaces at 6 p.m. and then another activity to enable the interfaces at 7 a.m. This will ensure that unauthorized staff can not hack into the network from the shared conference room after hours.


Scheduled config changes could also be used to add or remove access-list entries at specified times. Allowing access to the payroll system during business hours only.


The uses are only limited by your imagination.

Last modified