rConfig Blog — Engineering-First Network Automation

Deep dives on network automation, compliance, security, and the future of configuration management — written by engineers, not marketers.

Showing 121 posts in All Categories
Automation Engineers Don’t Fail — Business Cases Do
network automation
Dec 22, 2025 8 min read

Automation Engineers Don’t Fail — Business Cases Do

You have probably felt the frustration. You designed a brilliant automation solution, a script or workflow that could prevent critical outages, standardize hundreds of devices, and save thousands of hours of manual toil. Yet, the project is stuck. It sits in an approval queue, waiting for a signature that never seems to arrive. The common assumption is that leadership just doesn't "get it."

Stephen Stack
Stephen Stack
From Firefighting to Flight Control: What Networks Can Learn from Aviation
network automation
Dec 19, 2025 8 min read

From Firefighting to Flight Control: What Networks Can Learn from Aviation

Aviation has achieved a remarkable level of safety through decades of discipline, procedure, and learning from every single flight. Meanwhile, many network operations teams live in a state of perpetual crisis, lurching from one outage to the next. This culture of "firefighting" is not a badge of honor. It is an expensive, exhausting, and unsustainable operational model. Uncontrolled configuration changes are a primary cause of network incidents in large enterprises, turning skilled engineers into reactive problem solvers instead of strategic architects. The constant emergencies erode morale and prevent forward progress. To escape this cycle, we must shift our perspective from reactive firefighting to proactive flight control. The principles that make air travel incredibly safe provide a powerful blueprint for building predictable and resilient operational safety networks.

rConfig
rConfig
The Hidden Cost of Hero Engineers
network automation
Dec 12, 2025 9 min read

The Hidden Cost of Hero Engineers

In every IT department, there seems to be one: the go-to expert. This is the person who can parachute into a major outage at 2 AM and, through a combination of deep institutional knowledge and sheer force of will, bring critical systems back online. They are celebrated, rewarded, and seen as indispensable. This is the "hero engineer," a figure born not of malice but from a flawed operational model that concentrates critical knowledge in one individual.

rConfig
rConfig
Why Network Automation Is an Insurance Policy Not a Cost Center
network automation
Dec 11, 2025 8 min read

Why Network Automation Is an Insurance Policy Not a Cost Center

When business leaders evaluate network automation, the conversation often defaults to a familiar place: operational efficiency. We calculate hours saved, headcount reallocated, and the incremental gains of faster deployments. While these metrics are valid, they miss the fundamental value proposition. Viewing network automation as a simple cost-saving tool is like valuing an insurance policy based on the quality of the paper it’s printed on.

rConfig
rConfig
The CFO Doesn’t Care About Configs — But They Care About This
network automation
Dec 9, 2025 8 min read

The CFO Doesn’t Care About Configs — But They Care About This

Your network team tracks uptime, latency, and packet loss. Your CFO tracks EBITDA, operating margins, and risk exposure. This is the fundamental communication gap that often leaves critical infrastructure investments on the back burner. While you see a router configuration as a set of technical instructions, your finance chief sees a potential single point of failure for revenue generation.

rConfig
rConfig
Your Network Is Already Automated — Just Badly
network automation
Dec 4, 2025 8 min read

Your Network Is Already Automated — Just Badly

Many IT leaders believe their networks are manually managed, holding off on automation because they fear the risk. Here’s the uncomfortable truth: your network is already automated. It’s just happening in the shadows, through a chaotic mix of ad-hoc scripts, forgotten cron jobs, and processes that exist only in the minds of a few senior engineers. This is shadow automation, and it’s far more dangerous than any formal platform.

rConfig
rConfig
Stop Selling Automation. Start Selling Operational Risk Reduction
network automation
Dec 2, 2025 8 min read

Stop Selling Automation. Start Selling Operational Risk Reduction

Many IT leaders have experienced this precise moment of frustration. You walk into a budget meeting armed with a meticulously prepared proposal for network automation. You have charts showing projected efficiency gains, calculations on reduced man-hours, and a clear path to a more productive network team. Yet, the proposal is met with a polite "not this quarter." It is deferred, down-prioritized, or rejected outright. This isn't a failure of your idea. It is a failure of communication.

rConfig
rConfig
What NetMRI Users Loved Most — And How rConfig Delivers the Same Value With a Simpler, Faster Architecture
netmri
Nov 30, 2025 6 min read

What NetMRI Users Loved Most — And How rConfig Delivers the Same Value With a Simpler, Faster Architecture

For years, NetMRI had a reputation for being one of the most dependable NCM tools on the market. It wasn’t flashy, but it did the important things consistently well — and that’s why engineers trusted it. With the product now retired, it’s worth taking a closer look at what made NetMRI so popular and how modern platforms like rConfig carry those strengths forward without the overhead.

rConfig
rConfig
The Future After NetMRI: Active State Verification, Real-Time Change Monitoring, and the Next Wave of NCM
netmri
Nov 19, 2025 6 min read

The Future After NetMRI: Active State Verification, Real-Time Change Monitoring, and the Next Wave of NCM

With NetMRI now retired, the network world is moving into a new phase of configuration management. Teams aren’t just looking for backups and diff reports anymore — they want real-time visibility, active verification, and deeper intelligence about the actual state of their network. This article explores how NCM is evolving and what comes next in a post-NetMRI world.

rConfig
rConfig
Migrating Away from NetMRI: How to Move Configs, Compliance Rules, and Automation Workflows Without Chaos
netmri
Nov 18, 2025 6 min read

Migrating Away from NetMRI: How to Move Configs, Compliance Rules, and Automation Workflows Without Chaos

With NetMRI officially retiring, many teams are now facing the practical reality of moving away from a tool they’ve relied on for years. Migration can feel daunting, especially when daily operations depend on accurate backups, clean compliance reporting, and stable automation. The good news is that with the right approach, the transition doesn’t need to be chaotic.

rConfig
rConfig
Open-Source Roots, Enterprise Power: Why NetMRI Users Are Moving to Leaner NCM Platforms in 2025
netmri
Nov 15, 2025 6 min read

Open-Source Roots, Enterprise Power: Why NetMRI Users Are Moving to Leaner NCM Platforms in 2025

As NetMRI reaches end-of-life, many organisations are rethinking what they actually need from a network configuration management tool. Instead of turning to heavy automation suites, teams are increasingly choosing lean, open-source–rooted platforms that are fast, modern, and easier to operate. This article explores why that shift is happening and what makes these tools so appealing in 2025.

rConfig
rConfig
The End of Script-Driven Networks: Compliance & What’s Next
compiance & regulation
Nov 14, 2025 4 min read

The End of Script-Driven Networks: Compliance & What’s Next

Script-driven network automation once helped teams move fast — but in 2025, it no longer meets compliance, security, or audit requirements. With NIS2 and DORA enforcing strict configuration governance, unauthenticated or script-based NCM introduces real organisational liability. This article explains why tools like Netmiko, NAPALM, Batfish, Oxidized, and RANCID can’t meet the new bar — and what modern, compliant network automation looks like.

rConfig
rConfig
Your Network Automation Might Be a Legal Risk — Here’s Why
rconfig v8
Nov 13, 2025 4 min read

Your Network Automation Might Be a Legal Risk — Here’s Why

Modern networks have outgrown the script-driven tools that once held them together. With regulations like NIS2 and DORA enforcing strict configuration and audit requirements, network configuration management is now a board-level issue. This article explains why scripting isn’t sustainable anymore and how secure, open-source platforms like rConfig Core v8 meet today’s compliance expectations.

Stephen Stack
Stephen Stack
What Regulators Expect Even When They Don’t Say It
network automation
Oct 10, 2025 8 min read

What Regulators Expect Even When They Don’t Say It

The philosophy of regulatory oversight has fundamentally shifted. Auditors no longer arrive asking, "Do you have a change management policy?" Instead, the question has become far more direct: "Show me the immutable log of every change made to this firewall in the last six months." This change moves the focus from paper policies and good intentions to provable, continuous control over critical infrastructure. The burden of proof now rests squarely on the organization to demonstrate its command over its own environment.

rConfig
rConfig
FortiSwitch Admin Password Vulnerability (CVE-2024-48887): How rConfig Automatically Detects & Secures You At Scale
rconfig v8
Sep 9, 2025 3 min read

FortiSwitch Admin Password Vulnerability (CVE-2024-48887): How rConfig Automatically Detects & Secures You At Scale

A new critical vulnerability (CVE-2025-20188) in Cisco IOS XE Wireless Controller Software allows unauthenticated attackers to execute commands with root privileges. With a perfect CVSS score of 10.0, this flaw demands immediate attention from network teams. This post details the vulnerability and shows how rConfig automates detection and remediation across your Catalyst 9800 devices in minutes, not days.

rConfig
rConfig
Network Automation Isn’t About Speed—It’s About Predictability
network automation
Sep 4, 2025 8 min read

Network Automation Isn’t About Speed—It’s About Predictability

In high-stakes environments, from manufacturing floors to financial markets, success is measured not by raw speed but by the consistency of outcomes. A pharmaceutical company values a perfectly replicated formula over a rushed batch. A pilot prioritizes a stable flight path over record-breaking velocity. The same principle applies to modern IT, where the true value of network automation lies in its ability to deliver predictable, auditable results every time.

rConfig
rConfig
Why rConfig is Going All-In at Zabbix Summit 2025 — and What We’re Launching There
rconfig v8
Jul 22, 2025 3 min read

Why rConfig is Going All-In at Zabbix Summit 2025 — and What We’re Launching There

We’re thrilled to share that rConfig is going Platinum at the Zabbix Summit 2025, taking place this October 8–10 in Riga. This isn’t just a sponsorship — it’s a statement. We're bringing the full power of our new rConfig V8 release to the global stage, including two major new features: a next-gen Zabbix integration and a soon-to-be-revealed AI-powered capability that’s going to change the game for network teams. If you’re in the business of automating, scaling, or securing network operations — you’ll want to see what’s coming.

rConfig
rConfig
Network Automation Isn’t About Speed — It’s About Predictability
network automation
Jul 3, 2025 7 min read

Network Automation Isn’t About Speed — It’s About Predictability

For years, the conversation around network automation has been dominated by a single metric: speed. The prevailing belief was that its primary purpose was to push changes faster. This perspective, however, misses the larger strategic value that automation offers. The true measure of a mature automation strategy is not velocity but predictability. Predictability means every network change is executed consistently, can be repeated without deviation, and is fully auditable. This shift in focus moves the conversation from tactical speed to strategic stability. It aligns directly with what executive leadership truly values: mitigated risk, operational resilience, and uninterrupted business continuity. The concept is not new. In mature disciplines like manufacturing, process control has always prioritized quality and consistency over the raw speed of the assembly line. It is time for network operations to adopt the same mindset.

rConfig
rConfig
🚨 URGENT: Critical Cisco Vulnerability Allows Remote Command Execution with Root Privileges (CVE-2025-20188)
rconfig v8
May 8, 2025 4 min read

🚨 URGENT: Critical Cisco Vulnerability Allows Remote Command Execution with Root Privileges (CVE-2025-20188)

Network security teams are racing to address a new critical vulnerability in Cisco IOS XE Wireless Controller Software. With a maximum CVSS score of 10.0, CVE-2025-20188 allows unauthenticated attackers to remotely execute commands with root privileges across enterprise networks. This post explains the vulnerability details and demonstrates how rConfig's automation tools can detect, mitigate, and verify fixes across your entire infrastructure within minutes instead of days. Protect your Catalyst 9800 devices now with these step-by-step remediation techniques.

rConfig
rConfig