Once installed, AmpCon™-DC also simplifies the management of PicOS software switches, including configuration management, switch inventory, software updates, and more.
...
AmpCon-DC includes native configuration management capabilities, which you can use to push an update to a single switch or to an entire group of switches. By using AmpCon-DC, you don’t need to pull up edit and edit push switch configurations one by one. In this way, the likelihood of errors can be reduced, the switch configuration process can be simplified , and you don’t need to deal with the added expense or headache of a third-party tool.
In practice, the configuration management feature can greatly simplify the job of updating switches to deal with a new class of devices, such as security devices to protect Internet of Things (IoT) sensors. Your network administrators can detail how the network needs to treat the security devices (perhaps putting them on your own VLAN), and detail where traffic from the devices is allowed to go. By using adding only one commandconfiguration in the AmpCon-DC UI, you can push the update to appropriate switches.
AmpCon-DC greatly simplifies the job of detailing network access level and priority each class of devices should get and then pushing the update at once to all relevant switches.
...
Once the desired configurations are set and the network is stable, we would like to lock it down and you might want to make sure accidental changes don’t disrupt operations. And when a config change is made to add devices or say When you make a configuration change such as adding devices or a VLAN, it is important to back it up your configuration. AmpCon-DC makes this really simple by automating config backups on a specified schedule, and saving the last n backups (default=100), which can be used to recover quickly from a crash or corruption of a switch. And it allows marking a specific instance as the “Golden Config” which will never be deleted and used by default as the config to rollback the switch to a stable configuration in case the switch operation is compromised. The Golden Config can also be used as the basis to run an automated compliance check to verify that the network is operating as designed.
...