Device Configurations are sensitive data and if a malicious user gets hold of a device password, he could wreak havoc to the entire network. Network Configuration Manager stores device configurations in encrypted form in the PGSQL database bundled with the product making the process very secure. Besides, there is also provision for SSH communication between Network Configuration Manager and devices.
Network Configuration Manager serves as a secure, centralized repository for device configurations. Administrators get access to configurations based on their roles and access restrictions. Network Configuration Manager retrieves configurations from devices whenever there occurs a configuration change. Configurations are versioned and stored in the database making configuration management easier.