5 août 2025
The world of Network Configuration Management (NCM) has stayed largely the same for over a decade. Tools like RANCID and Oxidized pull down device configs, log changes, and call it a day. But in modern network environments — where compliance is critical and downtime is costly — that’s no longer enough.
rConfig
All at rConfig
rConfig V8: A New Era of Network Change Visibility and Control
If you’ve been managing networks for a while, you know the pain points: tracking changes, pinpointing root causes, proving compliance, and most importantly — knowing what changed, when, and why. Traditional tools like RANCID and Oxidized have served the community well, offering simple configuration backups. But in today’s fast-paced, compliance-driven environments, they fall short.
With rConfig V8, we’re changing the game.
rConfig V8 introduces Change Pulse, an industry-first dashboard and feature set that doesn’t just track configuration changes — it lets you capture and search historical network state changes. From BGP peer drops to missing prefixes and MAC address tracking, we’re bringing unparalleled visibility into your infrastructure.
Let’s break it down.
1. Configuration & State Backups: Together at Last
Network configuration management (NCM) traditionally focuses on backing up static device configurations. But modern networks are dynamic — routing tables change, interfaces flap, neighbors disappear.
rConfig V8 introduces a dual-backup model:
Configuration Backup – Capture full startup/running configs from supported devices on schedule or manually.
State Backup – Capture dynamic CLI outputs like
show ip route
,show bgp summary
,show mac address-table
, and more.
This ensures you have a point-in-time snapshot not only of your configuration, but of the state of your network when incidents happen.
Need to prove a prefix disappeared before a customer escalation? Need to check when a MAC address was last active? Now you can.
2. Track Changes: Pull or Push-Based
You’ve got options:
Pull-Based Tracking – rConfig V8 polls devices on schedule, compares configurations and state outputs, and highlights differences.
Push-Based Tracking – Devices can now alert rConfig directly via SNMP traps when they detect a config change.
Whether your environment prefers proactive pulls or reactive pushes, Change Pulse handles both.
Every change, from a line added to a config to a new OSPF neighbor, can be captured, tracked, and triaged.
3. Email Digest Reports: Stay Ahead of Drift
Config drift is a slow killer in large-scale environments. A missed ACL tweak here, a forgotten BGP neighbor there — and suddenly, you’ve got outages, or worse, compliance gaps.
With rConfig V8, you get automated change digest emails straight to your inbox. Delivered daily or weekly, these reports include:
A summary of changes
Severity levels
Reviewed/unreviewed statuses
Links to dive deeper into each change event
Perfect for network leads, compliance managers, or auditors.
4. Change Pulse Dashboard: Search Everything
This is where it all comes together.
The Change Pulse Dashboard is your mission control — a unified view into all historical changes across your network.
And it’s fully searchable.
Want to find out:
What changed on all firewalls last Friday?
What critical changes were made last month in the core?
When was the last time anyone updated a config in the WAN category?
You can.
Change Pulse search filters include:
Time Periods – Last 24 hours, 7 days, 30 days, or custom ranges
Devices – Narrow down to specific devices, groups, or locations
Categories – Logical command groups (e.g., Routing, Security, WAN, etc.)
Tags – Label and track changes by type, importance, feature, or project
Reviewers – Track who reviewed what, what’s overdue, and what’s pending
Review Status – Search reviewed/unreviewed changes for audit prep
Date Range – Filter changes by precise calendar periods for forensics
This isn’t just search — it’s full-blown change intelligence.
5. The Only NCM That Sees Everything
There’s no shortage of NCM tools. But none provide:
Historical state awareness
Config + state diffs in one place
Push/pull change detection
Advanced search over all changes
Digest reporting for proactive oversight
RANCID and Oxidized are great at pulling configs and versioning them. But they don’t understand the why or the impact of those changes. And they don’t let you search when a BGP peer dropped at 2am.
rConfig V8 does.
Built for Ops. Designed for Scale.
Whether you're managing 50 devices or 50,000, rConfig V8 is lightweight, fast, and built for serious operations teams:
CLI and GUI workflows for engineers and leads
Role-based access control for delegated responsibilities
API-first architecture for automation and integration
Modern UI built with Vue 3 and Tailwind for fast navigation
And of course — fully self-hosted, secure, and 100% owned by you.
Coming Soon — Stay Tuned
We’re gearing up for the public launch of rConfig V8, and it’s unlike anything else in the network automation and compliance space.
Want to see Change Pulse in action? Join the early access list or request a personalized demo.
This is the new standard for NCM.
Config. State. Intelligence. All in one.
#rConfigV8 #ChangePulse #NCM #NetworkAutomation #NetOps #NetworkCompliance #BGP #Routing #StateMonitoring #rConfig #NetworkEngineering #Oxidized #RANCID #NetworkManagement #NetworkChangeControl
Why rConfig is Going All-In at Zabbix Summit 2025 — and What We’re Launching There
We’re thrilled to share that rConfig is going Platinum at the Zabbix Summit 2025, taking place this October 8–10 in Riga. This isn’t just a sponsorship — it’s a statement. We're bringing the full power of our new rConfig V8 release to the global stage, including two major new features: a next-gen Zabbix integration and a soon-to-be-revealed AI-powered capability that’s going to change the game for network teams. If you’re in the business of automating, scaling, or securing network operations — you’ll want to see what’s coming.

rConfig
All at rConfig
🚨 URGENT: Critical Cisco Vulnerability Allows Remote Command Execution with Root Privileges (CVE-2025-20188)
Network security teams are racing to address a new critical vulnerability in Cisco IOS XE Wireless Controller Software. With a maximum CVSS score of 10.0, CVE-2025-20188 allows unauthenticated attackers to remotely execute commands with root privileges across enterprise networks. This post explains the vulnerability details and demonstrates how rConfig's automation tools can detect, mitigate, and verify fixes across your entire infrastructure within minutes instead of days. Protect your Catalyst 9800 devices now with these step-by-step remediation techniques.

rConfig
All at rConfig
Présentation de rConfig Vector : Gestion de la Configuration Réseau Scalables et Distribuées pour les Équipes Modernes
Découvrez rConfig Vector — la solution NCM distribuée de nouvelle génération conçue pour l'échelle, la rapidité et la sécurité. Conçu pour les équipes informatiques modernes, Vector offre une haute disponibilité, un chiffrement par défaut, des sauvegardes ultra-rapides et une intégration d'outils transparente. Préparez la gestion de votre réseau pour le futur dès aujourd'hui.

Stephen Stack
CTO, rConfig