Page tree
Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

Unimus performs backups as per the schedule configured for the device.

The device needs to first be discovered (see the Discovery article) before it can be backed-up.
If a device is not discovered and its scheduled backup comes, a discovery will first be performed.

Unimus will use the discovered connector (protocol/port combination) and the discovered credentials to connect to the device.

Unimus can handle logging in to the device in user-exec or privileged-exec mode.
If the device needs to be switched into privileged-exec, Unimus will do so.
(the "enable" password used will be the same as the login uses password)

Unimus will then retrieve the configuration from the device.

Unimus always works with the "running-config" of the device - if the device has concepts of "startup-config"/"running-config".

 

  • No labels