Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Unimus performs backups as per the schedule configured for the device.

The device needs to first be discovered (see the Discovery article) before it can be backed-up.
If a device is not discovered and its scheduled backup comes, a discovery will first be performed.

Unimus will use the discovered connector (protocol/port combination) and the discovered credentials to connect to the device.

Unimus can handle logging in to the device in user-exec or privileged-exec mode.
If the device needs to be switched into privileged-exec, Unimus will do so.
(the "enable" password used will be the same as the login uses password)

Unimus will then retrieve the configuration from the device.

Unimus always works with the "running-config" of the device - if the device has concepts of "startup-config"/"running-config".