Skip to content

Policy Assignments

Policy Assignments: Linking Compliance Rules to Network Devices in rConfig V8 Pro

Section titled “Policy Assignments: Linking Compliance Rules to Network Devices in rConfig V8 Pro”

Policy Assignments connect policy definitions to device scopes, creating the link between compliance rules and the devices they evaluate. An assignment specifies which devices to validate (scope), which command output to evaluate (configuration source), and which policy definition to apply (compliance rules). Assignments are the operational layer that transforms abstract policy definitions into concrete compliance validation across your network infrastructure.

Understanding how to configure policy assignments correctly ensures compliance checks target the right devices, evaluate the appropriate configurations, and produce meaningful results for remediation and reporting.

Link policies to devices: Assignments bridge the gap between policy definitions (rules) and device populations (targets), enabling flexible compliance enforcement across any organizational structure.

Define validation scope: Specify exactly which devices are evaluated—individual devices for granular control, categories for device type grouping, or tags for flexible cross-cutting concerns.

Select configuration source: Choose which command output to validate (e.g., show running-config, show version), ensuring policy rules evaluate relevant configuration data.

Enable selective enforcement: Disable assignments for testing or temporary suspension without deleting configuration, preserving assignment history and simplifying re-activation.

Support multiple policies: A single device can be subject to multiple policy assignments, each validating different aspects of configuration (security baseline, service standards, interface requirements).

Organizational flexibility: Different device types, locations, or functions require different compliance policies. Assignments enable this flexibility by allowing varied policy application based on device characteristics.

Scalable enforcement: Apply policies to hundreds or thousands of devices through category or tag assignments without configuring individual devices. As network grows, new devices automatically inherit policies based on their category or tag membership.

Testing and validation: Disabled assignments allow testing new policies against device populations without affecting compliance reports, enabling safe policy development workflows.

Audit trails: Assignment history tracks which policies applied to which devices and when, supporting compliance audits and troubleshooting historical compliance issues.

Granular control: Combine multiple assignments to validate different configuration aspects—one for security baseline, another for service standards, a third for interface configurations—providing comprehensive yet organized compliance validation.

Navigate to Compliance → Policy Assignments to access the assignment management interface.

rConfig V8 Pro policy assignments main view displaying assignment list with device scopes, compliance rules, command outputs, enabled status, and execution timestamps for network configuration validation Policy Assignments Main View

Main view displays:

  • Assignment name and description
  • Scope type (Device, Category, Tag) and scope name
  • Command output being evaluated
  • Policy definition being applied
  • Enabled/disabled status
  • Last execution timestamp
  • Actions: View, Edit, Delete

Expandable details: Click the expand icon next to any assignment to view:

  • Complete assignment configuration
  • Link to view policy definition code
  • Link to view compliance results
  • Quick access to edit assignment
Expanded rConfig V8 Pro policy assignment view showing detailed configuration including scope, command selection, policy definition, and compliance validation settings Policy Assignment Expanded View

Before creating assignments, understand the rules governing assignment configuration:

Rule 1: Single scope per assignment

  • Each assignment can target ONE device, ONE category, OR ONE tag
  • Cannot assign to multiple scopes simultaneously (e.g., cannot select “Device A AND Category B”)
  • Create separate assignments for different scopes, even if using same policy definition

Rule 2: Single command per assignment

  • Each assignment evaluates one command output per device
  • To validate multiple commands, create separate assignments
  • Choose command that contains configurations being validated by policy

Rule 3: Single policy definition per assignment

  • Each assignment applies one policy definition
  • Policy definition can contain multiple rules, but assignment references single definition
  • To apply multiple policy definitions to same scope, create multiple assignments

Rule 4: Reusability

  • Multiple assignments can use the same policy definition
  • Policy definition updates automatically apply to all assignments using that definition
  • Single policy can enforce compliance across varied scopes (different categories, tags, devices)

Rule 5: Enabled/Disabled state

  • Assignments can be disabled without deletion
  • Disabled assignments don’t execute in compliance jobs
  • Useful for testing, troubleshooting, or temporary suspension

Click New Policy Assignment to create an assignment.

VIDEOPLACEHOLDER

Step 2: Configure Assignment Name and Description

Section titled “Step 2: Configure Assignment Name and Description”

Assignment Name: Descriptive identifier indicating scope, policy, and purpose.

Naming best practices:

  • Include scope type and name: Routers-Security-Baseline
  • Indicate policy focus: Core-Switches-NTP-Standard
  • Use consistent naming conventions: [Scope]-[PolicyArea]-[Purpose]

Description (optional): Detailed explanation of assignment purpose, why it exists, and any special considerations.

Good naming examples:

  • Production-Routers-Security-Baseline
  • DMZ-Firewalls-PCI-DSS-Requirements
  • Access-Switches-Interface-Standards
  • All-Devices-NTP-DNS-Configuration

Poor naming examples:

  • Assignment1
  • Test
  • Policy-Check

Choose assignment scope type and specific target.

Scope options:

Device: Single device compliance validation

  • Use for: Unique device requirements, testing new policies, troubleshooting specific devices
  • Select: Individual device from dropdown
  • Example: Critical core router requiring enhanced security validation

Category: All devices in category

  • Use for: Device type-specific policies (routers, switches, firewalls), role-based compliance (core, distribution, access)
  • Select: Category from dropdown (e.g., “Cisco-Routers”, “HP-Switches”)
  • Example: All Cisco routers must meet IOS security baseline

Tag: All devices with specific tag

  • Use for: Cross-cutting policies (production vs. lab, PCI scope, geographic location), flexible grouping beyond device type
  • Select: Tag from dropdown (e.g., “Production”, “PCI-Scope”, “DataCenter-A”)
  • Example: All production devices require standard NTP/DNS configuration
rConfig V8 Pro assignment scope selection interface with device, category, and tag options for flexible network configuration compliance policy targeting Assignment Scope Selection

Choose which command output to evaluate against policy rules.

Command selection guidelines:

Match policy to command: Choose command whose output contains configurations validated by policy definition.

  • Validating NTP servers? Use show running-config
  • Validating software version? Use show version
  • Validating interface status? Use show ip interface brief

Avoid mismatches: Don’t select show version to validate SNMP configuration—those configs don’t appear in version output.

Consider output size: Smaller, targeted command outputs process faster than large dumps like show tech-support.

Verify command execution: Ensure selected command exists in device command groups and executes successfully during backups.

rConfig V8 Pro command selection dropdown showing available device configuration outputs including show running-config, show version, and vendor-specific commands for compliance validation Command Selection

Common command choices:

Policy ValidatesAppropriate Command
Running configuration elementsshow running-config
Startup configurationshow startup-config
Software versionshow version
Interface configurationsshow running-config
Routing protocolsshow running-config
SNMP settingsshow running-config
AAA configurationshow running-config

Choose which policy definition contains compliance rules for this assignment.

Policy definition selection:

  • Dropdown lists all available policy definitions
  • Definitions display name and brief description
  • Preview policy content if needed before selecting
  • Can change policy definition later if requirements change
rConfig V8 Pro policy definition selection dropdown listing available network configuration compliance rule definitions for assignment to devices Policy Definition Selection

Selection considerations:

Policy-scope alignment: Ensure policy rules are relevant to device scope.

  • Don’t assign Cisco IOS-specific policies to Juniper devices
  • Don’t assign firewall policies to switches
  • Match policy complexity to device capability

Command compatibility: Verify policy rules evaluate configurations present in selected command output.

  • Policy checking interface configs? Command must output interface configurations
  • Policy validating SNMP? Command must include SNMP configuration

Testing first: For new or modified policies, consider testing on small scope (single device or small category) before broad deployment.

Enabled: Assignment executes in compliance jobs, results appear in reports.

Disabled: Assignment exists in configuration but doesn’t execute. Results don’t appear in current compliance reports (historical results remain).

When to disable:

  • Testing new policy definitions without affecting production reports
  • Troubleshooting policy issues on specific device groups
  • Temporarily suspending compliance validation during maintenance
  • Preparing assignments for future activation

When to enable:

  • Policy definition tested and validated
  • Ready for production compliance enforcement
  • Devices in scope are backing up successfully
  • Command output contains required configuration data

Click Save to create the assignment.

Post-creation steps:

  1. Verify assignment appears in Policy Assignments list
  2. Confirm scope, command, and policy definition are correct
  3. If enabled, run manual compliance check to validate configuration
  4. Review results and adjust if needed
  5. Create Scheduled Task for automated compliance checking (optional)

Main view: Lists all policy assignments with summary information and status indicators.

Expandable details: Click expand icon to view:

  • Complete assignment configuration
  • View Definition Code: Opens policy definition in read-only view
  • View Compliance: Navigates to compliance results for this assignment
  • Edit Assignment: Opens assignment editor

Click Edit to modify existing assignment.

Editable elements:

  • Assignment name and description
  • Scope (can change scope type or target)
  • Command output selection
  • Policy definition
  • Enabled/disabled status

Edit considerations:

Scope changes: Changing scope (e.g., from Category A to Category B) immediately affects which devices are evaluated. Existing compliance results for old scope remain in history but new jobs evaluate new scope.

Command changes: Changing command output may cause policy failures if policy rules don’t match new command’s output format. Verify policy compatibility before changing commands.

Policy definition changes: Changing to different policy definition entirely changes compliance criteria. Consider creating new assignment instead of modifying existing one if tracking different compliance aspects.

Testing after changes: After significant edits, run manual compliance check to verify assignment works as expected before relying on scheduled execution.

From expanded assignment view, click View Definition Code to see the policy definition being applied.

View capabilities:

  • Read-only display of policy definition content
  • See all rule blocks and validation methods
  • Understand exactly what is being validated
  • Identify potential policy issues affecting compliance results

Cannot edit from this view: To modify policy definition, navigate to Policy Definitions section and edit directly. Changes apply to all assignments using that definition.

From expanded assignment view, click View Compliance to see results for this assignment.

Results navigation: Directly jumps to compliance report filtered for this specific assignment, showing:

  • Per-device compliance status (PASS/FAIL)
  • Individual rule results
  • Last evaluation timestamp
  • Detailed failure information for remediation

See Policy Compliance Results for complete guide to interpreting and acting on compliance results.

Delete assignments that are no longer needed or were created for testing.

Before deleting:

  • Verify assignment is not needed for compliance tracking
  • Consider disabling instead of deleting if might be needed later
  • Export compliance history if needed for audit purposes
  • Document reason for deletion

Deletion impact:

  • Assignment configuration is permanently removed
  • Historical compliance results remain accessible in database (subject to retention policies)
  • Scheduled tasks referencing this assignment will fail—remove or update scheduled tasks first

When to use:

  • Testing new policies before broad deployment
  • Special compliance requirements for specific devices
  • Troubleshooting policy issues on individual devices
  • One-off validation scenarios

Example scenarios:

  • Test new security baseline on single router before applying to all routers
  • Critical device has unique compliance requirements not shared by others
  • Validate policy works correctly before scaling to category or tag

Advantages:

  • Granular control and minimal impact
  • Easy troubleshooting with single device
  • Low risk for testing

Disadvantages:

  • Doesn’t scale—manual assignment per device
  • Difficult to maintain as network grows
  • Devices don’t automatically inherit policies

When to use:

  • Device type-specific compliance (all routers, all switches, all firewalls)
  • Vendor-specific policies (Cisco IOS requirements, Juniper JUNOS standards)
  • Role-based compliance (core layer, distribution layer, access layer)

Example scenarios:

  • All Cisco routers must meet IOS security baseline
  • All HP switches require specific SNMP configuration
  • All firewalls must comply with security policy framework

Advantages:

  • Automatic inheritance—devices in category automatically inherit policies
  • Scales well with network growth
  • Logical organization by device type or role
  • Easy to understand and maintain

Disadvantages:

  • Requires well-maintained device categories
  • Less flexible than tags for cross-cutting concerns
  • Device can only be in one category

When to use:

  • Cross-cutting compliance requirements (production vs. lab, PCI scope, geographic location)
  • Flexible grouping beyond device type (critical infrastructure, internet-facing, management network)
  • Temporary or project-based compliance tracking

Example scenarios:

  • All production devices require standard NTP/DNS regardless of type
  • Devices in PCI scope require specific security configurations
  • Devices in DataCenter-A have different DNS servers than DataCenter-B

Advantages:

  • Maximum flexibility—devices can have multiple tags
  • Cross-cutting policies span device types
  • Easy to add/remove devices from compliance scope
  • Support temporary groupings for projects

Disadvantages:

  • Requires disciplined tag management
  • Can become complex with many overlapping tags
  • Less intuitive than category-based organization

Layered compliance: Use multiple assignments to validate different aspects of device configuration.

Example layered approach:

Device: Core-Router-01
├── Assignment 1: Security-Baseline (Category: Routers)
│ └── Validates: Enable secret, SSH, AAA, no Telnet
├── Assignment 2: Standard-Services (Tag: Production)
│ └── Validates: NTP, DNS, SNMP, Logging
├── Assignment 3: Interface-Standards (Category: Routers)
│ └── Validates: Interface descriptions, no shutdown
└── Assignment 4: PCI-DSS-Requirements (Tag: PCI-Scope)
└── Validates: Encryption, access controls, logging

Benefits of layered approach:

  • Modular policies easier to maintain
  • Clearer reporting—failures isolated to specific compliance area
  • Flexible policy application—apply some policies broadly, others selectively
  • Testing simplified—disable specific layer without affecting others

Use consistent, descriptive names: Establish and follow naming conventions across all assignments.

Recommended format: [Scope]-[PolicyArea]-[Purpose]

Examples:

  • Routers-Security-Baseline
  • Production-Devices-Standard-Services
  • PCI-Scope-Security-Requirements
  • Core-Switches-Interface-Standards

Include:

  • Scope type/name for context
  • Policy focus for quick identification
  • Purpose or compliance area

Avoid:

  • Generic names: Policy1, Assignment-Test
  • Unclear abbreviations: Prod-SW-Cfg-1
  • Inconsistent formats across assignments

Use description field: Always provide detailed descriptions explaining:

  • Why assignment exists
  • What compliance it enforces
  • Any exceptions or special considerations
  • Related tickets, change requests, or audit requirements

Example description:

Enforces PCI-DSS security baseline requirements for all devices
in cardholder data environment. Validates encryption, access
controls, and logging as required by PCI-DSS v3.2.1 sections
2.2, 2.3, and 8.1. Created per ticket SEC-2024-156.

Always test new assignments:

  1. Create assignment with status Disabled
  2. Test manually on single device or small group
  3. Review results and adjust policy or assignment if needed
  4. Enable assignment for production enforcement
  5. Monitor initial results for unexpected failures

Incremental rollout:

  1. Start with device-level assignment for testing
  2. Expand to small category or tag
  3. Validate results across broader scope
  4. Finally apply to full production population

Keep scopes organized:

  • Maintain clean category structure
  • Use tags consistently across devices
  • Document tag purposes and usage
  • Regularly audit device categorization and tagging

Avoid scope overlap confusion:

  • If device is in multiple scopes with same policy, it will be evaluated multiple times (not harmful but inefficient)
  • Use layered approach with different policies for each scope rather than duplicating policies

Verify command availability:

  • Ensure command exists in device command groups
  • Confirm command executes successfully during backups
  • Check command output contains configurations policy evaluates

Use appropriate command granularity:

  • Prefer specific commands over large dumps
  • show running-config for most configuration validations
  • show version for version/hardware validation
  • Targeted commands for specific feature validation

Regular review cycle:

  • Monthly: Review assignment enabled/disabled status
  • Quarterly: Validate assignments still align with compliance requirements
  • After major changes: Review affected assignments for continued relevance
  • Audit period: Verify assignments meet current regulatory requirements

Clean up obsolete assignments:

  • Delete or disable assignments no longer needed
  • Archive historical compliance data if required
  • Document reasons for assignment removal

Symptoms: Compliance results don’t appear for assignment despite enabled status.

Possible causes:

  1. Assignment disabled: Verify enabled status in assignment configuration
  2. No devices in scope: Category or tag has no assigned devices
  3. Scheduled task not configured: Manual execution required if no scheduled task
  4. Horizon queue issues: Compliance jobs not processing

Resolution:

  1. Check assignment enabled status
  2. Verify devices exist in selected scope (category/tag membership)
  3. Run manual compliance check to validate assignment
  4. Review Horizon queue for failed compliance jobs
  5. Check application logs for assignment-related errors

Symptoms: Every device in assignment scope fails compliance, even known-good devices.

Possible causes:

  1. Policy definition error: Rules don’t match actual device configuration format
  2. Wrong command selected: Command output doesn’t contain configurations policy validates
  3. Case sensitivity issues: Policy strings don’t match device output case
  4. Configuration not downloaded: Devices missing recent configuration files

Resolution:

  1. Review policy definition against actual device configuration
  2. Verify command output contains configurations being validated
  3. Test policy against known-good device manually
  4. Check case sensitivity in policy strings
  5. Ensure devices have recent backup files for selected command

Some Devices Show “NOT EVALUATED - CONFIG NOT FOUND”

Section titled “Some Devices Show “NOT EVALUATED - CONFIG NOT FOUND””

Symptoms: Some devices in scope show “NOT EVALUATED” instead of PASS/FAIL.

Cause: Configuration file for selected command doesn’t exist for those devices.

Resolution:

  1. Verify affected devices are backing up successfully
  2. Confirm selected command exists in device command groups
  3. Check backup logs for command execution failures
  4. Run manual device backup to generate missing configuration files
  5. Re-run compliance check after successful backups

Symptoms: Same device shows different results between compliance runs without configuration changes.

Possible causes:

  1. Policy definition modified: Rules changed between compliance runs
  2. Configuration actually changed: Device configuration modified between evaluations
  3. Command output varies: Dynamic content in command output affects evaluation
  4. Timing issues: Compliance check ran before backup completed

Resolution:

  1. Review policy definition change history
  2. Check device configuration history for changes
  3. Verify policy rules don’t evaluate dynamic content (timestamps, uptime)
  4. Ensure compliance checks run after backups complete
  5. Schedule compliance tasks with appropriate delays after backup tasks

Symptoms: Delete operation fails or is blocked.

Cause: Scheduled tasks may reference the assignment.

Resolution:

  1. Identify scheduled tasks using this assignment
  2. Delete or update scheduled tasks to remove assignment reference
  3. Retry assignment deletion
  4. Alternatively, disable assignment instead of deleting if scheduled tasks need preservation
  1. One scope per assignment (device, category, OR tag)
  2. One command per assignment
  3. One policy definition per assignment
  4. Multiple assignments can use same policy definition
  5. Assignments can be disabled for testing
Scope TypeUse WhenExample
DeviceSingle device, testing, unique requirementsCritical core router
CategoryDevice type, vendor, or role-based policiesAll Cisco routers
TagCross-cutting concerns, flexible groupingAll production devices

Policy Assignments are the operational bridge between policy definitions and device populations, enabling flexible, scalable compliance enforcement across network infrastructure. Proper assignment configuration—selecting appropriate scope, matching commands to policy content, and following best practices—ensures compliance validation produces meaningful, actionable results.

Flexible scoping: Device, category, and tag-based assignments provide granular to broad compliance enforcement, adapting to any organizational structure or compliance requirement.

Command-policy alignment: Selecting command output that contains configurations policy validates is critical to assignment success. Misaligned selections cause false failures or missed validations.

Testing and validation: Always test new assignments on small scopes before production deployment, using disabled status during testing to prevent false compliance reports.

Layered approach: Multiple assignments on same devices validate different compliance aspects, providing comprehensive yet organized compliance coverage without policy definition complexity.

Regular maintenance: Review assignments periodically to ensure continued alignment with compliance requirements, removing obsolete assignments and updating as network evolves.

With properly configured policy assignments linking tested policy definitions to appropriate device scopes and commands, rConfig provides reliable, automated compliance validation that scales from single devices to enterprise networks with thousands of devices.