network configuration management (NCM)

Network configuration management is the process of organizing and maintaining information about all of the components in a computer network. When a network needs repair, modification, expansion or upgrading, the administrator refers to the network configuration management database to determine the best course of action. This database contains the locations and IP address or network address of all hardware devices, as well as information about the default settings, programs, versions and updates installed in network computers.

Features of network configuration management systems

A primary feature of network configuration management is its ability to replace the functions of a network device in the event of failure. Different network devices save configurations in different formats, and finding configuration information can be difficult when a particular device has to be replaced. With a network configuration management system in place, configuration information will be stored in a centrally located server, where device configurations can be easily downloaded.

Devices that rely on command line interface need a reliable administrator using a standard protocol such as the Secure File Transfer Protocol to obtain the necessary information, but backups can also be automated, often through a third party.

Network configuration management illustrated

Network configuration tools

Network configuration tools can be vendor-neutral or vendor-specific. Vendor-neutral tools are more common and are designed for networks containing hardware and programs from multiple vendors. Vendor-specific tools usually work only with the products of a single vendor and can offer enhanced performance in networks where that vendor dominates the market.

Configuration tools can be used for more than just relaunching a device after it fails. Some configuration management tools track configuration data on a daily basis to spot any changes in configuration files, which could reveal cyber threats and potential failures. Network configuration tools can be used to create bulk changes. For instance, a company could quickly roll out a blanket password change if password data is leaked. In addition to making changes in bulk, configuration management tools can be used for auditing and reporting. Although they do not display information such as memory or CPU performance, they can be used to display exact firewall rules or VPN parameters.

Network configuration management tools also have reporting capabilities, enabling system personnel to easily track information about network components.

Advantages of network configuration

Network configuration can reduce downtime by allowing system administrators to rapidly identify changes being made in the network. It also helps ensure that software versions and hardware components are up to date and comply with licensing agreements. Visibility and accountability is also improved, as system personnel have an easy way to determine the identity of components and software operating on the network.

In addition, network configuration can:

  • Streamline the processes of maintenance, repair, expansion and upgrading.
  • Minimize configuration errors as part of change management.
  • Optimize network security.
  • Ensure that changes made to a device or system do not adversely affect other devices or systems.
  • Roll back changes to a previous configuration if system updating or replacement efforts are unsatisfactory.
  • Archive the details of all network configuration changes.
This was last updated in March 2019

Continue Reading About network configuration management (NCM)

Dig Deeper on Network Infrastructure

Unified Communications
Mobile Computing
Data Center