rConfig Blog — Engineering-First Network Automation

Deep dives on network automation, compliance, security, and the future of configuration management — written by engineers, not marketers.

Showing 111 posts in All Categories
What NetMRI Users Loved Most — And How rConfig Delivers the Same Value With a Simpler, Faster Architecture
netmri
Nov 30, 2025 6 min read

What NetMRI Users Loved Most — And How rConfig Delivers the Same Value With a Simpler, Faster Architecture

For years, NetMRI had a reputation for being one of the most dependable NCM tools on the market. It wasn’t flashy, but it did the important things consistently well — and that’s why engineers trusted it. With the product now retired, it’s worth taking a closer look at what made NetMRI so popular and how modern platforms like rConfig carry those strengths forward without the overhead.

rConfig
rConfig
The Future After NetMRI: Active State Verification, Real-Time Change Monitoring, and the Next Wave of NCM
netmri
Nov 19, 2025 6 min read

The Future After NetMRI: Active State Verification, Real-Time Change Monitoring, and the Next Wave of NCM

With NetMRI now retired, the network world is moving into a new phase of configuration management. Teams aren’t just looking for backups and diff reports anymore — they want real-time visibility, active verification, and deeper intelligence about the actual state of their network. This article explores how NCM is evolving and what comes next in a post-NetMRI world.

rConfig
rConfig
Migrating Away from NetMRI: How to Move Configs, Compliance Rules, and Automation Workflows Without Chaos
netmri
Nov 18, 2025 6 min read

Migrating Away from NetMRI: How to Move Configs, Compliance Rules, and Automation Workflows Without Chaos

With NetMRI officially retiring, many teams are now facing the practical reality of moving away from a tool they’ve relied on for years. Migration can feel daunting, especially when daily operations depend on accurate backups, clean compliance reporting, and stable automation. The good news is that with the right approach, the transition doesn’t need to be chaotic.

rConfig
rConfig
Open-Source Roots, Enterprise Power: Why NetMRI Users Are Moving to Leaner NCM Platforms in 2025
netmri
Nov 15, 2025 6 min read

Open-Source Roots, Enterprise Power: Why NetMRI Users Are Moving to Leaner NCM Platforms in 2025

As NetMRI reaches end-of-life, many organisations are rethinking what they actually need from a network configuration management tool. Instead of turning to heavy automation suites, teams are increasingly choosing lean, open-source–rooted platforms that are fast, modern, and easier to operate. This article explores why that shift is happening and what makes these tools so appealing in 2025.

rConfig
rConfig
The End of Script-Driven Networks: Compliance & What’s Next
compiance & regulation
Nov 14, 2025 4 min read

The End of Script-Driven Networks: Compliance & What’s Next

Script-driven network automation once helped teams move fast — but in 2025, it no longer meets compliance, security, or audit requirements. With NIS2 and DORA enforcing strict configuration governance, unauthenticated or script-based NCM introduces real organisational liability. This article explains why tools like Netmiko, NAPALM, Batfish, Oxidized, and RANCID can’t meet the new bar — and what modern, compliant network automation looks like.

rConfig
rConfig
Your Network Automation Might Be a Legal Risk — Here’s Why
rconfig v8
Nov 13, 2025 4 min read

Your Network Automation Might Be a Legal Risk — Here’s Why

Modern networks have outgrown the script-driven tools that once held them together. With regulations like NIS2 and DORA enforcing strict configuration and audit requirements, network configuration management is now a board-level issue. This article explains why scripting isn’t sustainable anymore and how secure, open-source platforms like rConfig Core v8 meet today’s compliance expectations.

Stephen Stack
Stephen Stack
FortiSwitch Admin Password Vulnerability (CVE-2024-48887): How rConfig Automatically Detects & Secures You At Scale
rconfig v8
Sep 9, 2025 3 min read

FortiSwitch Admin Password Vulnerability (CVE-2024-48887): How rConfig Automatically Detects & Secures You At Scale

A new critical vulnerability (CVE-2025-20188) in Cisco IOS XE Wireless Controller Software allows unauthenticated attackers to execute commands with root privileges. With a perfect CVSS score of 10.0, this flaw demands immediate attention from network teams. This post details the vulnerability and shows how rConfig automates detection and remediation across your Catalyst 9800 devices in minutes, not days.

rConfig
rConfig
Why rConfig is Going All-In at Zabbix Summit 2025 — and What We’re Launching There
rconfig v8
Jul 22, 2025 3 min read

Why rConfig is Going All-In at Zabbix Summit 2025 — and What We’re Launching There

We’re thrilled to share that rConfig is going Platinum at the Zabbix Summit 2025, taking place this October 8–10 in Riga. This isn’t just a sponsorship — it’s a statement. We're bringing the full power of our new rConfig V8 release to the global stage, including two major new features: a next-gen Zabbix integration and a soon-to-be-revealed AI-powered capability that’s going to change the game for network teams. If you’re in the business of automating, scaling, or securing network operations — you’ll want to see what’s coming.

rConfig
rConfig
🚨 URGENT: Critical Cisco Vulnerability Allows Remote Command Execution with Root Privileges (CVE-2025-20188)
rconfig v8
May 8, 2025 4 min read

🚨 URGENT: Critical Cisco Vulnerability Allows Remote Command Execution with Root Privileges (CVE-2025-20188)

Network security teams are racing to address a new critical vulnerability in Cisco IOS XE Wireless Controller Software. With a maximum CVSS score of 10.0, CVE-2025-20188 allows unauthenticated attackers to remotely execute commands with root privileges across enterprise networks. This post explains the vulnerability details and demonstrates how rConfig's automation tools can detect, mitigate, and verify fixes across your entire infrastructure within minutes instead of days. Protect your Catalyst 9800 devices now with these step-by-step remediation techniques.

rConfig
rConfig