{"type":"api","title":"Get DCA Attached Config To Device","meta":{"id":"/apps/pubhub/media/cisco-catalyst-sd-wan-api-guide-20-18/1c4807bcb76af36988ebb37dc2e455b1787a155e/36693899-8b64-31bd-aa1c-b67fb5b6463c","info":{"title":"SD-WAN Services","description":"Includes API operations for managing SD-WAN services such as Cloud OnRamp for SaaS and MultiCloud\n","contact":{"email":"vmanage@cisco.com"},"version":"20.18 - 2025-08-15"},"openapi":"3.1.0","servers":[{"url":"/dataservice"}]},"spec":{"tags":["Data Collection Agent"],"description":"Get attached config to device","operationId":"getDCAAttachedConfigToDevice","requestBody":{"description":"Query string","content":{"application/json":{"schema":{"type":"object"},"examples":{"Query string":{"description":"Query string","value":{"tenantId":["57501bad-32a7-4f52-8f54-8547dcd7403e","07917db1-bb13-40a0-a075-f81e91cd3bd4"]}}}}},"required":true},"responses":{"200":{"description":"Success","content":{"application/json":{"schema":{"type":"object"},"examples":{"Attached config to device":{"description":"Attached config to device","value":[{"deviceConfiguration":"viptela-system:system\nhost-name vm200\nsystem-ip 172.16.255.200\nsite-id 200\nadmin-tech-on-failure\nno vrrp-advt-with-phymac\nsp-organization-name \"MY ORG\"\norganization-name \"MY ORG\"\nvbond vbond\naaa\n auth-order local radius tacacs\n usergroup all\n !\n usergroup basic\n task system read\n task interface read\n !\n usergroup global\n !\n usergroup netadmin\n !\n usergroup network_operations\n task policy read write\n !\n usergroup operator\n task system read\n task interface read\n task policy read\n task routing read\n task security read\n !\n usergroup security_operations\n task security read write\n !\n usergroup tenantadmin\n !\n user admin\n password $6$681c9c8f17cc6e08$xFwi15faKVz/0.v5C1eeztUMus0iTwyLF.artuRBYD1cc7vTMsNomIVkqdmOcR4fmAGCZFAb6ACtir4oRkE6O0\n !\n ciscotacro-user true\n ciscotacrw-user true\n!\nlogging\n disk\n enable\n !\n!\nssh-server\n cipher aes-128-192\n kex-algo sha1\n!\nntp\n parent\n no enable\n stratum 5\n exit\n!\n!\nsnmp\nno shutdown\nview v2\n oid 1.3.6.1\n!\ncommunity $8$5EAF66F834F9B7194399D513C741AB2A\n view v2\n authorization read-only\n!\ntrap target vpn 0 10.0.1.1 16662\n group-name test\n community-name $8$5EAF66F834F9B7194399D513C741AB2A\n!\ntrap group test\n all\n level critical major minor\n exit\nexit\n!\nvpn 0\ndns 10.0.99.1 secondary\ndns 171.70.168.183 primary\nhost api.cisco.com ip 72.163.8.72\nhost certmanager-webservices.websecurity.digicert.com ip 216.168.246.82\nhost certmanager-webservices.websecurity.symantec.com ip 216.168.246.82\nhost proxy.esl.cisco.com ip 173.36.224.108\nhost vbond ip 10.103.128.128 10.103.135.135\nhost viptela.testbed ip 10.0.1.1\ninterface eth0\n ip address 10.0.1.200/24\n ipv6 dhcp-client\n no shutdown\n!\ninterface eth1\n ip address 10.103.200.200/16\n tunnel-interface\n allow-service all\n allow-service dhcp\n allow-service dns\n allow-service icmp\n no allow-service sshd\n no allow-service netconf\n no allow-service ntp\n no allow-service stun\n allow-service https\n !\n no shutdown\n!\ninterface eth2\n ip address 10.0.100.200/24\n no shutdown\n!\ninterface eth3\n ip address 10.104.1.200/24\n no shutdown\n!\ninterface eth4\n ip address 10.105.0.200/24\n no shutdown\n!\nip route 0.0.0.0/0 10.0.12.13\nip route 0.0.0.0/0 10.103.254.254\nip route 46.4.105.116/32 10.0.1.1\nip route 171.70.168.0/24 10.0.1.1\nip route 173.36.224.108/32 10.0.1.1\n!\nvpn 512\n!","deviceIP":"169.254.10.1","tenantId":"57501bad-32a7-4f52-8f54-8547dcd7403e"},{"deviceConfiguration":"viptela-system:system\nsystem-ip 172.16.254.5\ndomain-id 1\nsite-id 6\nadmin-tech-on-failure\nsp-organization-name \"MY ORG\"\norganization-name \"MY ORG-Apple Inc\"\nvbond vbond\n!\nmemory free low-watermark processor 166245\nservice timestamps debug datetime msec\nservice timestamps log datetime msec\nno service tcp-small-servers\nno service udp-small-servers\nplatform console serial\nplatform qfp utilization monitor load 80\nplatform sslvpn use-pd\nhostname vm6\nusername admin privilege 15 secret 9 $9$pPlT8B.3SExgjE$aA9M6arkumX.SK6odu9soQK05qqbXNIeRfBJ7X5vV8Q\nvrf definition 1\nrd 1:1\naddress-family ipv4\n exit-address-family\n!\naddress-family ipv6\n exit-address-family\n!\n!\nvrf definition 11\nrd 11:11\naddress-family ipv4\n exit-address-family\n!\naddress-family ipv6\n exit-address-family\n!\n!\nvrf definition 20\nrd 20:20\naddress-family ipv4\n exit-address-family\n!\naddress-family ipv6\n exit-address-family\n!\n!\nvrf definition Mgmt-intf\nrd 1:512\naddress-family ipv4\n exit-address-family\n!\naddress-family ipv6\n exit-address-family\n!\n!\nno ip finger\nno ip rcmd rcp-enable\nno ip rcmd rsh-enable\nip host vbond 10.103.128.128 10.103.135.135\nip route 0.0.0.0 0.0.0.0 10.101.254.254\nip route 0.0.0.0 0.0.0.0 10.102.254.254\nip scp server enable\nip ssh pubkey-chain\nusername admin\n key-hash ssh-rsa 5cc0b10027d65dd46667acf4464f49f5 vtest@enrtp-vtest-280\n !\n!\n!\nno ip ssh bulk-mode\nip tcp RST-count 10 RST-window 5000\nip http server\nip http secure-server\nip nat settings central-policy\nip nat settings gatekeeper-size 1024\nipv6 unicast-routing\nipv6 rip vrf-mode enable\ninterface GigabitEthernet1\nno shutdown\nvrf forwarding Mgmt-intf\nip address 10.0.1.6 255.255.255.0\nnegotiation auto\nexit\ninterface GigabitEthernet2\nno shutdown\nvrf forwarding 1\nip address 10.0.6.6 255.255.255.0\nnegotiation auto\nexit\ninterface GigabitEthernet3\nno shutdown\nip address 10.101.6.6 255.255.0.0\nnegotiation auto\nexit\ninterface GigabitEthernet4\nno shutdown\nip address 10.0.100.6 255.255.255.0\nnegotiation auto\nexit\ninterface GigabitEthernet5\nno shutdown\nip address 10.102.6.6 255.255.0.0\nnegotiation auto\nexit\ninterface GigabitEthernet6\nno shutdown\nvrf forwarding 20\nip address 10.0.32.6 255.255.255.0\nnegotiation auto\nexit\ninterface GigabitEthernet7\nno shutdown\nvrf forwarding 11\nip address 10.0.33.6 255.255.255.0\nnegotiation auto\nexit\ninterface Tunnel1\nno shutdown\nip unnumbered GigabitEthernet3\ntunnel source GigabitEthernet3\ntunnel mode sdwan\nexit\ninterface Tunnel2\nno shutdown\nip unnumbered GigabitEthernet5\ntunnel source GigabitEthernet5\ntunnel mode sdwan\nexit\ncontrol-plane\n!\nno logging console\nno logging trap\nno logging queue-limit\naaa authentication login default local\naaa authorization console\naaa authorization exec default local\nlogin on-success log\nredundancy\n!\nvtp mode server\nradius-server cache expiry 24\nno crypto ikev2 diagnose error\nsnmp-server community private view v2 ro\nsnmp-server host 10.0.100.1 version 2c private udp-port 16662\nsnmp-server view v2 1.3.6.1 included\nfhrp version vrrp v3\nline aux 0\n!\nline con 0\nstopbits 1\n!\nline vty 0 4\ntransport input ssh\n!\nline vty 5 80\ntransport input none\n!\nno process cpu extended history\nsdwan\ninterface GigabitEthernet2\nexit\ninterface GigabitEthernet3\n tunnel-interface\n encapsulation ipsec\n color 3g\n no allow-service bgp\n allow-service dhcp\n allow-service dns\n allow-service icmp\n no allow-service sshd\n no allow-service netconf\n no allow-service ntp\n no allow-service ospf\n no allow-service stun\n allow-service https\n no allow-service snmp\n no allow-service bfd\n exit\nexit\ninterface GigabitEthernet4\nexit\ninterface GigabitEthernet5\n tunnel-interface\n encapsulation ipsec\n color lte\n no allow-service bgp\n allow-service dhcp\n allow-service dns\n allow-service icmp\n no allow-service sshd\n no allow-service netconf\n no allow-service ntp\n no allow-service ospf\n no allow-service stun\n allow-service https\n no allow-service snmp\n no allow-service bfd\n exit\nexit\ninterface GigabitEthernet6\nexit\ninterface GigabitEthernet7\nexit\nappqoe\n no tcpopt enable\n no dreopt enable\n no httpopt enable\n!\nomp\n no shutdown\n graceful-restart\n no as-dot-notation\n timers\n graceful-restart-timer 120\n exit\n address-family ipv4\n advertise connected\n advertise static\n !\n address-family ipv6\n advertise connected\n advertise static\n !\n!\n!\nsslproxy\nno enable\nrsa-key-modulus 2048\ncertificate-lifetime 730\neckey-type P256\nca-tp-label PROXY-SIGNING-CA\nsettings expired-certificate drop\nsettings untrusted-certificate drop\nsettings unknown-status drop\nsettings certificate-revocation-check none\nsettings unsupported-protocol-versions drop\nsettings unsupported-cipher-suites drop\nsettings failure-mode close\nsettings minimum-tls-ver TLSv1\ndual-side optimization enable\n!","deviceIP":"169.254.10.13","tenantId":"07917db1-bb13-40a0-a075-f81e91cd3bd4"}],"$$ref":"#/components/examples/ComViptelaVmanageServerDcaResponseExampleAttachedConfig"}}}}},"400":{"description":"Bad Request"},"403":{"description":"Forbidden"},"500":{"description":"Internal Server Error"}},"method":"post","path":"/dca/template/device/config/attachedconfig"}}