5. Uses CLI templates to apply a consistent configuration to multiple devices at an individual location
6. Uses NetFlow to analyse potential security threats throughout the network and take appropriate action on that traffic
Traditional device management
2. Manages device configuration on a per-device basis
4. Security is managed near the perimeter of the network with firewalls, VPNs, and IPS
Implements changes via an SSH terminal
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit