{"type":"api","title":"Get DCA Attached Config To Device","meta":{"id":"/apps/pubhub/media/sd-wan-api-20-16/58fb893fa751949ea20a40274e9ab219a20e19fa/e77267b5-7b4b-3f93-807c-c6d1c6b41343","info":{"title":"Cisco Catalyst SD-WAN Manager API","description":"The vManage API exposes the functionality of operations maintaining devices and the overlay network","contact":{"email":"vmanage@cisco.com"},"license":{"name":"Commercial License","url":"https://www.cisco.com/c/en/us/solutions/enterprise-networks/sd-wan/index.html"},"version":"2.0.0"},"openapi":"3.0.1","servers":[{"url":"/dataservice"}]},"spec":{"tags":["Data Collection Agent"],"description":"Get attached config to device","operationId":"getDCAAttachedConfigToDevice","requestBody":{"description":"Query string","content":{"application/json":{"schema":{"type":"object"},"examples":{"Query string":{"description":"Query string","value":{"tenantId":["57501bad-32a7-4f52-8f54-8547dcd7403e","07917db1-bb13-40a0-a075-f81e91cd3bd4"]}}}}}},"responses":{"200":{"description":"Success","content":{"application/json":{"schema":{"type":"object"},"examples":{"Attached config to device":{"description":"Attached config to device","value":[{"deviceConfiguration":" viptela-system:system\n host-name vm200\n system-ip 172.16.255.200\n site-id 200\n admin-tech-on-failure\n no vrrp-advt-with-phymac\n sp-organization-name \"MY ORG\"\n organization-name \"MY ORG\"\n vbond vbond\n aaa\n auth-order local radius tacacs\n usergroup all\n !\n usergroup basic\n task system read\n task interface read\n !\n usergroup global\n !\n usergroup netadmin\n !\n usergroup network_operations\n task policy read write\n !\n usergroup operator\n task system read\n task interface read\n task policy read\n task routing read\n task security read\n !\n usergroup security_operations\n task security read write\n !\n usergroup tenantadmin\n !\n user admin\n password $6$681c9c8f17cc6e08$xFwi15faKVz/0.v5C1eeztUMus0iTwyLF.artuRBYD1cc7vTMsNomIVkqdmOcR4fmAGCZFAb6ACtir4oRkE6O0\n !\n ciscotacro-user true\n ciscotacrw-user true\n !\n logging\n disk\n enable\n !\n !\n ssh-server\n cipher aes-128-192\n kex-algo sha1\n !\n ntp\n parent\n no enable\n stratum 5\n exit\n !\n!\nsnmp\n no shutdown\n view v2\n oid 1.3.6.1\n !\n community $8$5EAF66F834F9B7194399D513C741AB2A\n view v2\n authorization read-only\n !\n trap target vpn 0 10.0.1.1 16662\n group-name test\n community-name $8$5EAF66F834F9B7194399D513C741AB2A\n !\n trap group test\n all\n level critical major minor\n exit\n exit\n!\nvpn 0\n dns 10.0.99.1 secondary\n dns 171.70.168.183 primary\n host api.cisco.com ip 72.163.8.72\n host certmanager-webservices.websecurity.digicert.com ip 216.168.246.82\n host certmanager-webservices.websecurity.symantec.com ip 216.168.246.82\n host proxy.esl.cisco.com ip 173.36.224.108\n host vbond ip 10.103.128.128 10.103.135.135\n host viptela.testbed ip 10.0.1.1\n interface eth0\n ip address 10.0.1.200/24\n ipv6 dhcp-client\n no shutdown\n !\n interface eth1\n ip address 10.103.200.200/16\n tunnel-interface\n allow-service all\n allow-service dhcp\n allow-service dns\n allow-service icmp\n no allow-service sshd\n no allow-service netconf\n no allow-service ntp\n no allow-service stun\n allow-service https\n !\n no shutdown\n !\n interface eth2\n ip address 10.0.100.200/24\n no shutdown\n !\n interface eth3\n ip address 10.104.1.200/24\n no shutdown\n !\n interface eth4\n ip address 10.105.0.200/24\n no shutdown\n !\n ip route 0.0.0.0/0 10.0.12.13\n ip route 0.0.0.0/0 10.103.254.254\n ip route 46.4.105.116/32 10.0.1.1\n ip route 171.70.168.0/24 10.0.1.1\n ip route 173.36.224.108/32 10.0.1.1\n!\nvpn 512\n!\n","deviceIP":"169.254.10.1","tenantId":"57501bad-32a7-4f52-8f54-8547dcd7403e"},{"deviceConfiguration":" viptela-system:system\n system-ip 172.16.254.5\n domain-id 1\n site-id 6\n admin-tech-on-failure\n sp-organization-name \"MY ORG\"\n organization-name \"MY ORG-Apple Inc\"\n vbond vbond\n!\nmemory free low-watermark processor 166245\nservice timestamps debug datetime msec\nservice timestamps log datetime msec\nno service tcp-small-servers\nno service udp-small-servers\nplatform console serial\nplatform qfp utilization monitor load 80\nplatform sslvpn use-pd\nhostname vm6\nusername admin privilege 15 secret 9 $9$pPlT8B.3SExgjE$aA9M6arkumX.SK6odu9soQK05qqbXNIeRfBJ7X5vV8Q\nvrf definition 1\n rd 1:1\n address-family ipv4\n exit-address-family\n !\n address-family ipv6\n exit-address-family\n !\n!\nvrf definition 11\n rd 11:11\n address-family ipv4\n exit-address-family\n !\n address-family ipv6\n exit-address-family\n !\n!\nvrf definition 20\n rd 20:20\n address-family ipv4\n exit-address-family\n !\n address-family ipv6\n exit-address-family\n !\n!\nvrf definition Mgmt-intf\n rd 1:512\n address-family ipv4\n exit-address-family\n !\n address-family ipv6\n exit-address-family\n !\n!\nno ip finger\nno ip rcmd rcp-enable\nno ip rcmd rsh-enable\nip host vbond 10.103.128.128 10.103.135.135\nip route 0.0.0.0 0.0.0.0 10.101.254.254\nip route 0.0.0.0 0.0.0.0 10.102.254.254\nip scp server enable\nip ssh pubkey-chain\n username admin\n key-hash ssh-rsa 5cc0b10027d65dd46667acf4464f49f5 vtest@enrtp-vtest-280\n !\n !\n!\nno ip ssh bulk-mode\nip tcp RST-count 10 RST-window 5000\nip http server\nip http secure-server\nip nat settings central-policy\nip nat settings gatekeeper-size 1024\nipv6 unicast-routing\nipv6 rip vrf-mode enable\ninterface GigabitEthernet1\n no shutdown\n vrf forwarding Mgmt-intf\n ip address 10.0.1.6 255.255.255.0\n negotiation auto\nexit\ninterface GigabitEthernet2\n no shutdown\n vrf forwarding 1\n ip address 10.0.6.6 255.255.255.0\n negotiation auto\nexit\ninterface GigabitEthernet3\n no shutdown\n ip address 10.101.6.6 255.255.0.0\n negotiation auto\nexit\ninterface GigabitEthernet4\n no shutdown\n ip address 10.0.100.6 255.255.255.0\n negotiation auto\nexit\ninterface GigabitEthernet5\n no shutdown\n ip address 10.102.6.6 255.255.0.0\n negotiation auto\nexit\ninterface GigabitEthernet6\n no shutdown\n vrf forwarding 20\n ip address 10.0.32.6 255.255.255.0\n negotiation auto\nexit\ninterface GigabitEthernet7\n no shutdown\n vrf forwarding 11\n ip address 10.0.33.6 255.255.255.0\n negotiation auto\nexit\ninterface Tunnel1\n no shutdown\n ip unnumbered GigabitEthernet3\n tunnel source GigabitEthernet3\n tunnel mode sdwan\nexit\ninterface Tunnel2\n no shutdown\n ip unnumbered GigabitEthernet5\n tunnel source GigabitEthernet5\n tunnel mode sdwan\nexit\ncontrol-plane\n!\nno logging console\nno logging trap\nno logging queue-limit\naaa authentication login default local\naaa authorization console\naaa authorization exec default local\nlogin on-success log\nredundancy\n!\nvtp mode server\nradius-server cache expiry 24\nno crypto ikev2 diagnose error\nsnmp-server community private view v2 ro\nsnmp-server host 10.0.100.1 version 2c private udp-port 16662\nsnmp-server view v2 1.3.6.1 included\nfhrp version vrrp v3\nline aux 0\n!\nline con 0\n stopbits 1\n!\nline vty 0 4\n transport input ssh\n!\nline vty 5 80\n transport input none\n!\nno process cpu extended history\nsdwan\n interface GigabitEthernet2\n exit\n interface GigabitEthernet3\n tunnel-interface\n encapsulation ipsec\n color 3g\n no allow-service bgp\n allow-service dhcp\n allow-service dns\n allow-service icmp\n no allow-service sshd\n no allow-service netconf\n no allow-service ntp\n no allow-service ospf\n no allow-service stun\n allow-service https\n no allow-service snmp\n no allow-service bfd\n exit\n exit\n interface GigabitEthernet4\n exit\n interface GigabitEthernet5\n tunnel-interface\n encapsulation ipsec\n color lte\n no allow-service bgp\n allow-service dhcp\n allow-service dns\n allow-service icmp\n no allow-service sshd\n no allow-service netconf\n no allow-service ntp\n no allow-service ospf\n no allow-service stun\n allow-service https\n no allow-service snmp\n no allow-service bfd\n exit\n exit\n interface GigabitEthernet6\n exit\n interface GigabitEthernet7\n exit\n appqoe\n no tcpopt enable\n no dreopt enable\n no httpopt enable\n !\n omp\n no shutdown\n graceful-restart\n no as-dot-notation\n timers\n graceful-restart-timer 120\n exit\n address-family ipv4\n advertise connected\n advertise static\n !\n address-family ipv6\n advertise connected\n advertise static\n !\n !\n!\nsslproxy\n no enable\n rsa-key-modulus 2048\n certificate-lifetime 730\n eckey-type P256\n ca-tp-label PROXY-SIGNING-CA\n settings expired-certificate drop\n settings untrusted-certificate drop\n settings unknown-status drop\n settings certificate-revocation-check none\n settings unsupported-protocol-versions drop\n settings unsupported-cipher-suites drop\n settings failure-mode close\n settings minimum-tls-ver TLSv1\n dual-side optimization enable\n!\n","deviceIP":"169.254.10.13","tenantId":"07917db1-bb13-40a0-a075-f81e91cd3bd4"}],"$$ref":"#/components/examples/attached_config"}}}}},"400":{"description":"Bad Request"},"403":{"description":"Forbidden"},"500":{"description":"Internal Server Error"}},"__originalOperationId":"getDCAAttachedConfigToDevice","method":"post","path":"/dca/template/device/config/attachedconfig"}}