Submit a ticketCall us

Training ClassSign up for Network Performance Monitor (NPM) and Scalability instructor-led classes

Attend our instructor-led classes, provided by SolarWinds® Academy, to discuss the more advanced monitoring mechanisms available in NPM as well as how to tune your equipment to optimize its polling capabilities. NPM classes offered:
NPM Custom Monitoring and Polling
Orion Platform Scalability

Reserve your seat.

Home > Success Center > Kiwi CatTools > Kiwi CatTools Documentation > Kiwi CatTools 3.11 Administrator Guide > Activities > Activities list > Device.CLI.Modify Config > When to use the Device.CLI.Modify Config activity

When to use the Device.CLI.Modify Config activity

Table of contents
No headers
Created by Caroline Juszczak, last modified by Caroline Juszczak on Jun 28, 2016

Views: 107 Votes: 0 Revisions: 1


This activity is a useful network management tool for several reasons:

  • It allows you to have very fine-grained timing control over your network.
  • It enables you to automate these controls, yet still use exactly the same commands as you would enter if you did the task manually.


The benefit is that you learn and use the same command line instructions in both cases, and the CatTools program itself is very simple to learn to use in quite sophisticated ways because it simply applies those commands on your behalf, just as you would via telnet.


The time controls are perhaps the most useful aspect of this activity. With different combinations of scheduled activities you can tune your network to the changing needs of your organization over the course of a typical business day or week.


CatTools is designed to manage the repetitive scheduled configuration tasks on your behalf. It removes the possibility of human error from such tasks. It provides you with a much greater confidence in the currency of your backup processes, and in your ability to roll back to a previous state using your historical backups. It provides for active management of your network and its condition, by enabling the remote execution of command line instructions across your network, at times determined by you.


For example:


If you have some switch ports that are wired to a shared conference room that is only in use during the day, you could schedule a config change to shutdown the specific interfaces at 6 p.m. and then another activity to enable the interfaces at 7 a.m. This will ensure that unauthorized staff can not hack into the network from the shared conference room after hours.


Scheduled config changes could also be used to add or remove access-list entries at specified times. Allowing access to the payroll system during business hours only.


The uses are only limited by your imagination.

Last modified