Skip to content

Devices Management

Device management forms the foundation of rConfig’s configuration management capabilities. Understanding how to effectively add, configure, and organize devices is critical to building a scalable network automation infrastructure. This comprehensive guide covers everything from basic device addition to advanced role-based access controls and troubleshooting strategies.

In network configuration management, the device inventory serves as the single source of truth for your infrastructure. rConfig V8 provides multiple pathways for device onboarding, each designed for specific use cases—from manual entry for small deployments to bulk imports and API integration for enterprise-scale operations. The system’s flexible architecture ensures that whether you’re managing dozens or thousands of devices, you have the tools necessary for efficient operations.

Understanding Device Management in rConfig

Section titled “Understanding Device Management in rConfig”

rConfig organizes devices using a hierarchical structure that enables both granular control and broad categorization. This architecture addresses the challenge of managing diverse network infrastructures while maintaining security, operational efficiency, and organizational clarity.

Device Lifecycle: Every device in rConfig follows a defined lifecycle from initial onboarding through active management to eventual decommissioning. Understanding this lifecycle helps organizations implement proper governance:

  1. Onboarding: Device credentials, connection parameters, and organizational attributes are defined
  2. Validation: Initial connection attempts verify accessibility and proper configuration
  3. Active Management: Regular configuration backups and change tracking
  4. Maintenance: Updates to credentials, connection templates, or organizational assignments
  5. Decommissioning: Graceful removal with audit trail preservation

Organizational Hierarchy: Devices are organized through multiple dimensions:

  • Command Groups: Functional grouping based on device role (Core Switches, Edge Routers, Firewalls)
  • Vendors: Manufacturer-based organization for template and command consistency
  • Tags: Flexible, multi-dimensional labeling for cross-cutting concerns (Location, Environment, Criticality)
  • Roles: Security-based access control determining user visibility and management permissions

This multi-dimensional organization enables powerful filtering, reporting, and automation capabilities while maintaining strict access controls.

rConfig V8 provides five distinct methods for adding devices to your inventory, each optimized for different scenarios and operational requirements:

The manual addition method provides complete control over individual device configuration and is ideal for:

  • Initial system setup and testing
  • Adding unique or specialized devices
  • Situations requiring careful validation of each parameter
  • Training and familiarization with device structure

When to use: Small-scale deployments (1-10 devices), proof-of-concept environments, or when adding devices with unique configurations that don’t fit bulk import patterns.

Process: Navigate to Devices → Add Device, complete all required fields, and submit. The system immediately validates credentials and initiates an initial configuration download.

Before adding devices to rConfig, establish the foundational configuration elements that define how devices are organized, accessed, and managed. Proper planning of these prerequisites significantly reduces administrative overhead and ensures consistent device management.

ElementPurposeRelationshipConfiguration Priority
Command GroupsFunctional device categorizationOne-to-one (device to group)High - Define first
CommandsDevice interrogation instructionsMany-to-many (commands to groups)High - Define early
Connection TemplatesAccess method specificationOne-to-one (device to template)Critical - Required
VendorsManufacturer organizationOne-to-one (device to vendor)Medium - Useful for filtering
TagsFlexible multi-dimensional labelingMany-to-many (devices to tags)Low - Can add later

Command Groups (formerly Categories) organize devices by functional role within your network infrastructure. This organizational structure determines which command sets execute against which device types.

Design considerations:

  • Align with network architecture layers (Core, Distribution, Access)
  • Consider device functionality (Routing, Switching, Security, Wireless)
  • Plan for future growth and device type expansion
  • Balance granularity with management complexity

Example structure:

Core Infrastructure
├── Core Routers
├── Core Switches
└── Data Center Fabric
Edge Infrastructure
├── Branch Routers
├── Access Switches
└── Wireless Controllers
Security Infrastructure
├── Firewalls
├── VPN Concentrators
└── IDS/IPS Devices

For detailed command group planning, see Command Groups Documentation.

Commands define the specific configuration and operational data retrieved from devices. The command library should comprehensively cover both configuration backup and operational visibility requirements.

Essential command categories:

  • Configuration commands: Full configuration backup (show running-config, show startup-config)
  • Operational commands: Version, inventory, interface status, routing tables
  • Security commands: Access lists, authentication configs, encryption status
  • Diagnostic commands: Logging, error counters, environmental status

Each command associates with one or more Command Groups, enabling targeted execution based on device type. For command creation and management, see Commands Documentation.

Vendor designation provides manufacturer-based organization and enables vendor-specific template and command optimization. While not strictly required for operation, vendor classification significantly enhances filtering, reporting, and automation capabilities.

Vendor management benefits:

  • Template association by manufacturer platform
  • Command syntax optimization for vendor-specific CLI
  • Bulk operations on manufacturer-specific device populations
  • License and support tracking by vendor relationship

Connection Templates define the authentication method, protocol, and connection parameters for device access. Templates are the most critical prerequisite—devices cannot be added without an assigned template.

Template components:

  • Protocol: SSH, Telnet, SNMP (v2c/v3)
  • Authentication: Username/password, SSH keys, SNMP communities
  • Connection parameters: Port numbers, timeout values, retry logic
  • Privilege escalation: Enable password handling, privilege mode access

Organizations typically maintain a small library of standard templates (SSH for Cisco IOS, SSH for Juniper Junos, etc.) with variations for different security zones or authentication requirements. For template configuration, see Connection Templates Documentation.

Tags provide flexible, cross-cutting categorization that complements the hierarchical Command Group structure. Unlike Command Groups (one-to-one relationship), devices can have multiple tags, enabling multi-dimensional organization.

Tag strategy examples:

  • Geographic: Region-EMEA, Site-London, Building-HQ
  • Environmental: Production, Staging, Development
  • Criticality: Tier1-Critical, Tier2-Important, Tier3-Standard
  • Lifecycle: Active, Maintenance, Decommissioned
  • Compliance: PCI-DSS, HIPAA, SOX

Tag-based filtering and reporting enables powerful operational capabilities, such as “show all Tier1-Critical devices in Production across EMEA region.” Plan your tag taxonomy carefully to maximize operational value.

The device table serves as the primary interface for device inventory management, providing comprehensive visibility and control over your entire device population.

rConfig device table showing searchable, filterable inventory with status indicators and action menu Device Table - Primary Inventory View

Search and Filter Capabilities:

  • Global search: Instantly locate devices by name, IP, model, or any visible attribute
  • Column filters: Narrow results by vendor, command group, tag, or status
  • Status filters: Quick access to devices by operational state (up/down/disabled)
  • Custom views: Save frequently used filter combinations for rapid access

Table Management:

  • Column customization: Show/hide columns based on operational needs
  • Pagination: Configurable page size for optimal viewing (25/50/100/500 devices per page)
  • Sorting: Multi-column sorting for organized device lists
  • Bulk selection: Select multiple devices for batch operations

Each device row provides immediate access to common management functions through the action dropdown menu:

Device action menu showing management options including roles, edit, clone, disable, and delete Device Action Menu - Quick Access Functions
ActionFunctionUse Case
RolesConfigure role-based accessRestrict device visibility to specific user roles
EditModify device configurationUpdate credentials, templates, or organizational attributes
CloneDuplicate device settingsRapidly add similar devices with pre-populated configuration
DisableSuspend device operationsTemporarily exclude from scheduled jobs without deletion
DeleteRemove device permanentlyDecommission devices (requires confirmation, preserves audit trail)

The device detail view provides comprehensive visibility into individual device status, configuration history, and management capabilities.

Device main view displaying configuration history, download controls, activity logs, and management functions Device Main View - Detailed Device Management Interface

Key components:

  1. Configuration viewer: Access current and historical configurations with diff capabilities
  2. Manual download: Initiate immediate configuration backup outside scheduled jobs
  3. Activity logs: View connection attempts, download history, and error conditions
  4. Device cloning: Launch clone operation pre-populated with current device settings
  5. Debug tools: Copy debug command to clipboard for troubleshooting connection issues

Operational workflows: The main view supports common operational scenarios such as validating configuration changes, investigating backup failures, and performing ad-hoc configuration retrieval during maintenance windows.

Complete device configuration form showing all required and optional fields for device addition Device Configuration Form - Required fields marked with red asterisk

Understanding each field’s purpose and validation requirements ensures successful device onboarding and prevents common configuration errors.

FieldFormat RequirementsNotes & Best Practices
Device NameAlphanumeric with underscores, dots, dashes
Min 3 characters
No spaces allowed
Use consistent naming convention (e.g., SITE-ROLE-NUMBER). Names should be unique and descriptive for easy identification in logs and reports.
Device IPValid IPv4 or IPv6 addressVerify IP reachability before adding device. Use management interface IP for optimal accessibility.
VendorSelection from configured vendorsChoose manufacturer to enable vendor-specific optimizations and template associations.
Command GroupSelection from configured command groupsDetermines which command sets execute against this device. Must align with device capabilities.
TemplateSelection from configured templatesDefines connection method, protocol, and authentication approach. Critical for successful device access.
FieldPurposeConfiguration Guidance
Device PortOverride template default portSpecify when device uses non-standard port (e.g., SSH on 2222 instead of 22). Leave empty to use template default.
ModelDevice model designationSelect from existing or enter new model string. Useful for inventory tracking and template refinement.
TagsMulti-dimensional categorizationAssign multiple tags for flexible filtering (Location, Environment, Criticality). Plan tag taxonomy for maximum operational value.
RoleAccess control assignmentDetermines user visibility and management permissions. Leave empty for admin-only access.
SNMPSNMP polling inclusionEnable to include device in SNMP monitoring and trap reception. Requires SNMP template configuration.

Credential management supports both manual entry and selection from stored credential sets. Organizations managing large device populations benefit significantly from standardized credential sets.

FieldOptionsSecurity Considerations
UsernameManual entry or dropdown selectionSelecting from credential dropdown auto-populates password fields. Credentials are encrypted at rest.
PasswordManual entry or auto-populatedStored securely using AES-256 encryption. Consider using shared credentials for device role rather than unique per-device.
Enable PasswordOptional for privilege escalationRequired only for devices requiring enable mode (Cisco IOS, etc.). Auto-populated when using credential dropdown.

Device prompts enable rConfig to detect successful authentication and command completion. Accurate prompt configuration is critical for reliable device interaction.

Prompt TypeConfiguration ApproachExamples
Main PromptFull specific prompt (preferred) or regex patternFull: router01#
Regex: .*[>#]
Enable PromptPrivilege mode prompt after escalationFull: router01#
Regex: .*#

Prompt configuration strategies:

  • Exact match (most reliable): Specify complete prompt string including hostname
  • Partial match: Use regex for dynamic hostnames or standardized prompt formats
  • Wildcard patterns: Employ when prompt varies by mode or context

For comprehensive prompt configuration guidance including troubleshooting, see Device Prompts Documentation.

After adding a device, perform these validation steps to ensure proper configuration:

  1. Immediate download verification: Check Queue Manager for successful job completion
  2. Activity log review: Verify no authentication or connection errors in device logs
  3. Configuration validation: Access device main view and confirm configuration retrieval
  4. Scheduled job inclusion: Verify device appears in scheduled download job scope

rConfig’s device RBAC system enables granular access control, allowing organizations to implement least-privilege principles while maintaining operational efficiency. Understanding the RBAC architecture is essential for multi-team deployments and compliance-driven environments.

Role-based access control addresses the challenge of secure multi-team operations where different groups require visibility to different device populations. Rather than providing all users with access to all devices, RBAC enables precise control over device visibility and management permissions.

Core RBAC principles:

  • Default deny: Users see only devices explicitly assigned to their roles (except admin role)
  • Role inheritance: Device roles can be inherited from tag associations
  • Admin override: System admin role maintains universal device access (hardcoded, non-configurable)
  • Cascading visibility: Role restrictions apply to devices and all related views (commands, templates, vendors)
Device role assignment interface showing role selection for access control configuration Device RBAC Configuration - Role Assignment Interface

Role assignment methods:

Assign roles directly to individual devices when granular control is required or when devices don’t fit tag-based categorization.

Process:

  1. Navigate to device edit form
  2. Select roles in the Role field (multi-select enabled)
  3. Save device configuration
  4. Role assignment takes effect immediately

When to use: Unique devices, exceptions to tag-based rules, temporary access grants, devices in transition between roles.

The RBAC system follows a defined hierarchy that determines effective permissions when multiple role sources exist:

System Admin Role (Hardcoded)
↓ [Universal Access - Cannot be Restricted]
Tag-Based Role Assignment
↓ [Inherited by all devices with tag]
Direct Device Role Assignment
↓ [Explicit device-specific access]
No Role Assignment
↓ [Device invisible to non-admin users]

Key behaviors:

  • Additive permissions: Multiple role assignments are cumulative (union of all assigned roles)
  • No role = admin only: Devices without any role assignment are visible only to admin users
  • Tag changes propagate immediately: Adding or removing tags instantly updates role-based visibility
  • Cross-view restrictions: Role limitations apply to devices, command groups, commands, templates, and vendors

Planning considerations:

  1. Role design: Align roles with organizational structure (teams, regions, functions)
  2. Tag taxonomy: Design tag structure to support role-based access patterns
  3. Exception handling: Plan for devices requiring cross-team visibility
  4. Audit requirements: Ensure role assignments support compliance reporting needs

Common RBAC patterns:

  • Geographic isolation: Regional teams see only local devices via tag-based regional roles
  • Functional separation: Network team roles grant access to infrastructure devices; security team roles grant access to security devices
  • Tiered support: Level 1 support limited to access layer; Level 2 accesses distribution; Level 3 accesses all tiers
  • Vendor specialization: Cisco specialists see Cisco devices; Juniper specialists see Juniper devices

Scaling RBAC to enterprise deployments:

For organizations managing 1,000+ devices across multiple teams, consider these architectural approaches:

  • Implement tag-based roles as primary access control mechanism
  • Reserve direct device assignment for exceptions only (reduces administrative overhead by 90%+)
  • Establish clear governance for tag creation and role assignment
  • Document role-to-team mappings for audit and onboarding purposes
  • Regular access review cycles to validate role assignments remain appropriate

Understanding typical failure scenarios and their resolutions accelerates troubleshooting and reduces downtime during device onboarding.

Symptom: Device addition completes but initial download job fails with authentication or timeout errors.

Common causes and resolutions:

IssueDiagnostic StepsResolution
Invalid credentialsReview activity logs for “Authentication failed” errorsVerify username/password accuracy; test credentials via manual SSH/Telnet session
Network unreachabilityPing device IP from rConfig server;
Check firewall rules
Verify network connectivity; add rConfig server IP to device management ACLs
Incorrect portVerify service listening on expected port (netstat, telnet)Update device port field or template configuration to match actual service port
Prompt mismatchReview logs for timeout during prompt detectionCorrect main/enable prompt fields to match actual device prompt strings
Enable password requiredConnection succeeds but privilege escalation failsAdd enable password to device configuration if privilege mode required

Debug workflow:

  1. Copy debug command from device main view
  2. Execute on rConfig server command line:
    Terminal window
    cd /var/www/html/rconfig8/current
    php artisan rconfig:download-device 1234 -d
    (Replace 1234 with actual device ID)
  3. Review detailed connection trace for specific failure point
  4. Apply appropriate resolution based on failure stage (connection, authentication, privilege escalation, prompt detection)

For persistent issues requiring deeper investigation, utilize these diagnostic commands:

Terminal window
# Navigate to rConfig installation directory
cd /var/www/html/rconfig8/current
# Update all device RBAC data to ensure consistency
php artisan rconfig:update-rbac-data
# Debug specific device connection (replace 1234 with actual device ID)
php artisan rconfig:download-device 1234 -d
# Check queue worker status for job processing issues
php artisan queue:work --once --verbose
# Review system logs for detailed error information
tail -f storage/logs/laravel.log

Device naming conventions: Establish consistent naming that encodes critical device information while maintaining uniqueness:

  • Include site/location identifier
  • Add device role or function
  • Append sequence number or rack position
  • Examples: NYC-CORE-RTR-01, LON-ACCESS-SW-FL3-12, SFO-FW-DMZ-01

Credential management:

  • Create role-based credential sets rather than per-device credentials
  • Implement regular credential rotation schedules (quarterly minimum)
  • Use separate credentials for different security zones or compliance domains
  • Maintain emergency “break-glass” credentials with strict audit requirements

Command group design:

  • Align with network architecture layers and device functions
  • Create granular groups for specialized device types
  • Plan for expansion—avoid overly broad or narrow categorization
  • Document command group purpose and intended device types

Tag taxonomy:

  • Design multi-dimensional tag structure (geography, environment, criticality, function)
  • Establish tag naming conventions to prevent proliferation
  • Document tag meanings and appropriate usage
  • Regularly audit tag assignments to prevent tag sprawl

Bulk operations: Leverage bulk capabilities for efficiency at scale:

  • Use CSV import for initial population or major inventory updates (50+ devices)
  • Employ API integration for continuous synchronization with authoritative sources
  • Utilize device cloning for rapid standardized deployments
  • Implement tag-based bulk operations (disable all devices with specific tag)

Template standardization: Maintain a focused template library:

  • Create standard templates for common platform/protocol combinations
  • Avoid template proliferation—combine similar templates when possible
  • Document template purpose and intended device types
  • Version template changes and test against representative devices

RBAC governance:

  • Implement tag-based role assignment for 90%+ of devices
  • Reserve direct device assignment for genuine exceptions
  • Document role-to-team mappings and maintain in configuration management
  • Regular access reviews to validate role assignments remain appropriate (quarterly)
  • Establish clear procedures for access requests and approvals

Credential security:

  • Never store credentials in unencrypted external systems
  • Use rConfig’s credential dropdown feature to minimize credential exposure during device addition
  • Implement credential rotation aligned with organizational security policy
  • Audit credential usage through activity logs

Access control:

  • Apply principle of least privilege via RBAC role assignments
  • Regularly review user-to-role mappings for appropriateness
  • Implement separation of duties for critical infrastructure devices
  • Audit device access patterns through activity logs and compliance reports

Network security:

  • Restrict rConfig server access to management networks only
  • Implement firewall rules limiting rConfig to required device management protocols
  • Use encrypted protocols (SSH) instead of plaintext (Telnet) wherever possible
  • Isolate rConfig in dedicated management VLAN with strict access controls

Compliance requirements:

  • Maintain audit trails for all device configuration changes
  • Implement RBAC aligned with compliance mandates (PCI-DSS, HIPAA, SOX)
  • Establish retention policies for historical configurations
  • Document device access patterns for audit review

Job queue optimization: Ensure efficient job processing for large device populations:

  • Run multiple queue workers for parallel job processing
  • Prioritize critical devices using queue priorities
  • Monitor queue depth and worker performance metrics
  • Scale queue workers based on job volume (1 worker per 500 devices recommended)

API rate limiting: When using API integration for continuous synchronization:

  • Implement exponential backoff for API retry logic
  • Batch API calls to minimize overhead (50-100 devices per request)
  • Schedule bulk synchronization during off-peak hours
  • Monitor API rate limits and adjust synchronization frequency accordingly

While rConfig does not include built-in network discovery, organizations can implement automated device discovery through integration workflows:

Discovery workflow architecture:

  1. External discovery tool identifies network devices (network scanners, SNMP discovery, cloud inventory APIs)
  2. Discovery results formatted as CSV or JSON payload
  3. Automated process imports devices via CSV import or REST API
  4. Initial configuration download validates device accessibility
  5. Failed devices flagged for credential or connectivity remediation

Integration examples:

  • SNMP-based discovery: Use network management platform to discover SNMP-enabled devices, export inventory, import to rConfig
  • Cloud inventory: Query cloud provider APIs (AWS EC2, Azure VM) for virtual network appliances, sync via API
  • CMDB synchronization: Scheduled job exports network devices from CMDB, imports to rConfig maintaining single source of truth

Beyond static command groups and tags, implement dynamic grouping for operational flexibility:

Use cases:

  • Maintenance windows: Create temporary “Under-Maintenance” tag, assign to devices, exclude from scheduled jobs
  • Phased rollouts: Tag devices by rollout phase, target configuration changes incrementally
  • Incident response: Rapidly identify and group affected devices using tag combinations
  • Audit scoping: Dynamic tag-based queries for compliance reporting (all PCI devices in production)

Implementation approach: Leverage tag multi-select and advanced search to create virtual device groups without rigid hierarchical constraints.

Comprehensive device management requires understanding related rConfig capabilities:

MethodBest ForScaleComplexityAutomation
ManualInitial setup, unique devices1-10 devicesLowNone
CloneSimilar devices, standardized deployments10-50 devicesLowMinimal
CSV ImportBulk onboarding, migrations50-5,000 devicesMediumPartial
REST APIContinuous sync, integrationUnlimitedHighFull
Third-PartyExisting tool integrationUnlimitedHighFull
Terminal window
# Navigate to rConfig directory
cd /var/www/html/rconfig8/current
# Update device RBAC data for consistency
php artisan rconfig:update-rbac-data
# Debug specific device connection (replace 1234 with device ID)
php artisan rconfig:download-device 1234 -d
# Monitor queue worker status
php artisan queue:work --once --verbose
# View recent system logs
tail -f storage/logs/laravel.log
FieldRequiredFormatNotes
Device NameYesAlphanumeric, _, ., - (no spaces, min 3 chars)Use consistent naming convention
Device IPYesValid IPv4/IPv6Must be reachable from rConfig server
Device PortNoNumericOverride template port if needed
VendorYesDropdown selectionFor organization and filtering
Command GroupYesDropdown selectionDetermines command execution
ModelNoText or dropdownUseful for inventory tracking
TagsNoMulti-selectEnables flexible categorization
RoleNoMulti-selectControls access visibility
SNMPNoCheckboxInclude in SNMP monitoring
UsernameYesText or credential dropdownCredential dropdown auto-populates password
PasswordYesPassword or auto-populatedEncrypted at rest
Enable PasswordNoPassword or auto-populatedRequired for privilege escalation
TemplateYesDropdown selectionDefines connection method
Main PromptYesExact string or regexCritical for connection success
Enable PromptNoExact string or regexFor privilege mode detection
Access Level Hierarchy (Top = Highest Privilege):
1. System Admin Role
└─ Universal access to all devices (hardcoded, non-configurable)
2. Tag-Based Role Assignment
└─ Inherited by all devices with matching tag
└─ Dynamic (changes with tag addition/removal)
3. Direct Device Role Assignment
└─ Explicit device-specific access
└─ Overrides for special cases
4. No Role Assignment
└─ Device visible to admin users only
└─ Hidden from all other roles
Device Connection Fails
├─ Authentication Error?
│ ├─ Verify credentials manually (SSH/Telnet)
│ ├─ Check username/password accuracy
│ └─ Confirm enable password if required
├─ Timeout/Network Unreachable?
│ ├─ Verify IP reachability (ping from rConfig server)
│ ├─ Check firewall rules
│ └─ Confirm correct port configuration
├─ Prompt Detection Fails?
│ ├─ Review device logs for actual prompt string
│ ├─ Update main/enable prompt fields
│ └─ Test with exact match before using regex
└─ Configuration Download Fails?
├─ Verify command group has appropriate commands
├─ Check device supports command syntax
└─ Review activity logs for specific error details

Effective device management in rConfig V8 forms the foundation for successful network configuration automation. This comprehensive guide has covered the critical aspects of device onboarding, organization, access control, and operational management.

Core concepts to remember:

  1. Multiple onboarding paths: Choose the appropriate method based on scale—manual for small deployments, CSV import for migrations, API for continuous integration, and third-party integrations for existing tool ecosystems.

  2. Prerequisite planning: Successful device management begins with proper configuration of command groups, commands, templates, vendors, and tags. Invest time in this foundational design to reduce long-term administrative overhead.

  3. Organizational flexibility: Leverage the multi-dimensional organization model (command groups for functional hierarchy, tags for cross-cutting concerns, vendors for manufacturer grouping) to enable powerful filtering, reporting, and automation.

  4. Security through RBAC: Implement role-based access control using tag-based assignment for scalability (90%+ of devices) and direct assignment for exceptions. Always apply principle of least privilege.

  5. Operational efficiency: Utilize bulk operations, standardized templates, credential sets, and saved filter views to manage large device populations efficiently. Regular maintenance ensures optimal performance at scale.

  6. Troubleshooting methodology: Follow systematic diagnostic approaches—verify credentials manually, check network connectivity, validate prompt configuration, and leverage debug commands for detailed investigation.

Next steps:

Enterprise considerations: Organizations managing 1,000+ devices, operating in regulated industries, or requiring advanced deployment capabilities should engage with rConfig enterprise support for architectural consultation, implementation guidance, and optimization services.

By mastering device management fundamentals and implementing the best practices outlined in this guide, network operations teams can build a scalable, secure, and efficient configuration management infrastructure that serves as the backbone for network automation initiatives.


For additional assistance, consult the rConfig Documentation Portal or contact support at [email protected]. Enterprise customers should reach out to their dedicated support contact for architecture consultation and advanced deployment guidance.