When a client application is requesting or changing configuration information, it can use one of three methods to access the configuration:
If an application is simply requesting configuration information and not changing it, locking the configuration or creating a private copy is not required. However, it is appropriate to lock the configuration if it is important that the information being returned not change during the session. The information from a private copy is guaranteed not to change, but can diverge from the candidate configuration if other users or applications are changing the candidate.
The restrictions on, and interactions between, operations on the locked regular candidate configuration and a private copy are the same as for the CLI configure exclusive and configure private commands. For more information, see Committing a Private Copy of the Configuration and the JUNOS CLI User Guide.
For more information about locking and unlocking the candidate configuration or creating a private copy, see the following sections: