Net-API Multi-vendor | Demo Pameran Karya ITC UNSIA 2025
    Net-API Multi-vendor | Demo Pameran Karya ITC UNSIA 2025
    • Start your Apidog journey
    • Sample APIs
      • Find pet by ID
        GET
      • Add a new pet to the store
        POST
      • Update an existing pet
        PUT
      • Deletes a pet
        DELETE
      • Finds Pets by status
        GET
    • Selamat datang
      GET
    • List Perangkat
      GET
    • 01-Office (Juniper)
      GET
    • 101-Office-config
      GET
    • 102-Office-interfaces
      GET
    • 103-Office-vlans
      GET
    • 104-Office-arp-table
      GET
    • 105-Office-interfaces_ip
      GET
    • 106-Office-environment
      GET
    • 107-Office-users
      GET
    • 02-Branch (Cisco)
      GET
    • 201-Branch-config
      GET
    • 202-Branch-interfaces
      GET
    • 203-Branch-interfaces_ip
      GET
    • 204-Branch-arp_table
      GET
    • 205-Branch-mac_address_table
      GET
    • 206-Branch-snmp
      GET
    • 207-Branch-environment
      GET
    • 03-Home (Mikrotik)
      GET
    • 04-Ruko (Mikrotik)
      GET
    • 401-Ruko-interfaces
      GET
    • 402-Ruko-interfaces_ip
      GET
    • 403-Ruko-get_mac_address_table
      GET
    • 404-Ruko-snmp
      GET
    • 405-Ruko-users
      GET

      201-Branch-config

      Developing
      GET
      /devices/branch/napalm_get/config

      Request

      None

      Responses

      🟢200Success
      application/json
      Body
      branch
      array [object {10}] 
      required
      result
      object 
      optional
      host
      object 
      optional
      changed
      boolean 
      optional
      diff
      string 
      optional
      failed
      boolean 
      optional
      exception
      null 
      optional
      name
      string 
      optional
      severity_level
      integer 
      optional
      stdout
      null 
      optional
      stderr
      null 
      optional
      Example
      {"branch":[{"result":{"config":{"startup":"Using 1806 out of 262144 bytes, uncompressed size = 3100 bytes\n!\n\n!\nversion 15.2\nservice timestamps debug datetime msec\nservice timestamps log datetime msec\nno service password-encryption\nservice compress-config\n!\nhostname SWITCH-CORE\n!\nboot-start-marker\nboot-end-marker\n!\n!\n!\nusername ash privilege 15 password 0 Tariq23\nno aaa new-model\n!\n!\n!\n!\n!\n!\n!\n!\nip domain-name NETWORK.INTERNAL\nip cef\nno ipv6 cef\n!\n!\n!\nspanning-tree mode pvst\nspanning-tree extend system-id\n!\n!\n! \n!\n!\n!\n!\n!\n!\n!\n!\n!\n!\n!\n!\ninterface GigabitEthernet0/0\n negotiation auto\n!\ninterface GigabitEthernet0/1\n negotiation auto\n!\ninterface GigabitEthernet0/2\n negotiation auto\n!\ninterface GigabitEthernet0/3\n negotiation auto\n!\ninterface GigabitEthernet1/0\n negotiation auto\n!\ninterface GigabitEthernet1/1\n negotiation auto\n!\ninterface GigabitEthernet1/2\n negotiation auto\n!\ninterface GigabitEthernet1/3\n negotiation auto\n!\ninterface Vlan1\n ip address 192.168.11.46 255.255.255.240\n!\nip default-gateway 192.168.11.33\nip forward-protocol nd\n!\nip http server\nip http secure-server\n!\nip ssh version 2\nip ssh server algorithm encryption aes128-ctr aes192-ctr aes256-ctr\nip ssh client algorithm encryption aes128-ctr aes192-ctr aes256-ctr\n!\n!\n!\n!\n!\n!\ncontrol-plane\n!\nbanner exec ^C\nIOSv - Cisco Systems Confidential -\n\nSupplemental End User License Restrictions\n\nThis IOSv software is provided AS-IS without warranty of any kind. Under no circumstances may this software be used separate from the Cisco Modeling Labs Software that this software was provided with, or deployed or used as part of a production environment.\n\nBy using the software, you agree to abide by the terms and conditions of the Cisco End User License Agreement at http://www.cisco.com/go/eula. Unauthorized use or distribution of this software is expressly prohibited.\n^C\nbanner incoming ^C\nIOSv - Cisco Systems Confidential -\n\nSupplemental End User License Restrictions\n\nThis IOSv software is provided AS-IS without warranty of any kind. Under no circumstances may this software be used separate from the Cisco Modeling Labs Software that this software was provided with, or deployed or used as part of a production environment.\n\nBy using the software, you agree to abide by the terms and conditions of the Cisco End User License Agreement at http://www.cisco.com/go/eula. Unauthorized use or distribution of this software is expressly prohibited.\n^C\nbanner login ^C\nIOSv - Cisco Systems Confidential -\n\nSupplemental End User License Restrictions\n\nThis IOSv software is provided AS-IS without warranty of any kind. Under no circumstances may this software be used separate from the Cisco Modeling Labs Software that this software was provided with, or deployed or used as part of a production environment.\n\nBy using the software, you agree to abide by the terms and conditions of the Cisco End User License Agreement at http://www.cisco.com/go/eula. Unauthorized use or distribution of this software is expressly prohibited.\n^C\n!\nline con 0\nline aux 0\nline vty 0 4\n privilege level 15\n password Tariq23\n login local\n transport input ssh\n transport output all\n!\n!\nend","running":"!\n\n!\nversion 15.2\nservice timestamps debug datetime msec\nservice timestamps log datetime msec\nno service password-encryption\nservice compress-config\n!\nhostname SWITCH-CORE\n!\nboot-start-marker\nboot-end-marker\n!\n!\n!\nusername ash privilege 15 password 0 Tariq23\nno aaa new-model\n!\n!\n!\n!\n!\n!\n!\n!\nip domain-name NETWORK.INTERNAL\nip cef\nno ipv6 cef\n!\n!\n!\nspanning-tree mode pvst\nspanning-tree extend system-id\n!\n!\n! \n!\n!\n!\n!\n!\n!\n!\n!\n!\n!\n!\n!\ninterface GigabitEthernet0/0\n negotiation auto\n!\ninterface GigabitEthernet0/1\n negotiation auto\n!\ninterface GigabitEthernet0/2\n negotiation auto\n!\ninterface GigabitEthernet0/3\n negotiation auto\n!\ninterface GigabitEthernet1/0\n negotiation auto\n!\ninterface GigabitEthernet1/1\n negotiation auto\n!\ninterface GigabitEthernet1/2\n negotiation auto\n!\ninterface GigabitEthernet1/3\n negotiation auto\n!\ninterface Vlan1\n ip address 192.168.11.46 255.255.255.240\n!\nip default-gateway 192.168.11.33\nip forward-protocol nd\n!\nip http server\nip http secure-server\n!\nip ssh version 2\nip ssh server algorithm encryption aes128-ctr aes192-ctr aes256-ctr\nip ssh client algorithm encryption aes128-ctr aes192-ctr aes256-ctr\n!\n!\n!\n!\n!\n!\ncontrol-plane\n!\nbanner exec ^C\nIOSv - Cisco Systems Confidential -\n\nSupplemental End User License Restrictions\n\nThis IOSv software is provided AS-IS without warranty of any kind. Under no circumstances may this software be used separate from the Cisco Modeling Labs Software that this software was provided with, or deployed or used as part of a production environment.\n\nBy using the software, you agree to abide by the terms and conditions of the Cisco End User License Agreement at http://www.cisco.com/go/eula. Unauthorized use or distribution of this software is expressly prohibited.\n^C\nbanner incoming ^C\nIOSv - Cisco Systems Confidential -\n\nSupplemental End User License Restrictions\n\nThis IOSv software is provided AS-IS without warranty of any kind. Under no circumstances may this software be used separate from the Cisco Modeling Labs Software that this software was provided with, or deployed or used as part of a production environment.\n\nBy using the software, you agree to abide by the terms and conditions of the Cisco End User License Agreement at http://www.cisco.com/go/eula. Unauthorized use or distribution of this software is expressly prohibited.\n^C\nbanner login ^C\nIOSv - Cisco Systems Confidential -\n\nSupplemental End User License Restrictions\n\nThis IOSv software is provided AS-IS without warranty of any kind. Under no circumstances may this software be used separate from the Cisco Modeling Labs Software that this software was provided with, or deployed or used as part of a production environment.\n\nBy using the software, you agree to abide by the terms and conditions of the Cisco End User License Agreement at http://www.cisco.com/go/eula. Unauthorized use or distribution of this software is expressly prohibited.\n^C\n!\nline con 0\nline aux 0\nline vty 0 4\n privilege level 15\n password Tariq23\n login local\n transport input ssh\n transport output all\n!\n!\nend","candidate":""}},"host":{},"changed":false,"diff":"","failed":false,"exception":null,"name":"Get branch config","severity_level":20,"stdout":null,"stderr":null}]}
      Modified at 2025-02-22 00:17:21
      Previous
      02-Branch (Cisco)
      Next
      202-Branch-interfaces
      Built with