Jump to section

What is network management?

Copy URL

Network management is the process of configuring, monitoring, and maintaining a reliable network—ensuring connectivity between devices and the people or software applications that use them. Network management can be described in many different ways, but it generally involves the provisioning, configuration, security, and measurement practices that network operations teams use to build and sustain efficiency across their company’s network infrastructure.

    Network provisioning can mean either automating the initial configuration of a network device or setting up a network to be accessed by users, servers in a data center, containers, IoT devices, and more.

    Network configuration includes defining the desired state of networks or networked endpoint devices, and then maintaining them in that state over time. Network configuration and network maintenance logically follows network provisioning.

    Network security includes establishing security systems and security management protocols that protect networks against attack, damage, or unauthorized access. Network managers or network security administrators establish traffic routing protocols known as firewalls. They set up fault management systems that identify and remediate security, compliance, and configuration risks—all of which is improved by network automation technology. Some network security systems also provide remediation guidance that helps network administrators troubleshoot issues.

    Network measurement includes network monitoring and testing, troubleshooting, ensuring availability, and preparing disaster recovery plans. These processes help maintain network performance, which is the speed and efficiency at which data is transferred across network devices. Monitoring network traffic metrics informs efforts to improve bandwidth and response time, optimizing user experience throughout the network. Performance management and performance monitoring can help identify performance issues, minimize downtime and outages, and improve app performance.

    As automation is an evolution of management, so too is network automation an evolution of network management. Network management systems now rely on automation to manage enterprise network resources and services.   

    The difference between network management and network automation lies in the (highly subjective) differences between management and automation. Since there’s no such thing as seamless automation, there’s also no objective point at which management becomes automation. At some point, the human effort required to manage a set of tasks is significantly less than before—this is when management might now be described as automation. Automating network resource and management services allows network operations teams to become more flexible and better support modern business demands.

    Underlay network management (or simply underlay networking) involves coordinating hardware devices like hubs, switches, routers, bridges, gateways, modems, and repeaters. Overlay network management (or simply overlay networking) involves building digital connections and managing permissions between end users, applications, or devices—all of which exist virtually as nodes.

    For example: 

    • Underlay network management: A network engineer could use Red Hat® Ansible® Automation Platform to automate the network configuration of physical devices such as servers, switches, routers, and load balancers.
    • Overlay network management: A network administrator could use something like software-defined networking (SDN) to separate network forwarding functions from network control functions in order to create connections between network hardware and digital nodes.

    Underlay network management: Red Hat Ansible Automation Platform contains thousands of network automation modules that can help you configure all types of network hardware. It turns network hardware into infrastructure-as-code (IaC), just like Linux® did. Most network switches come bundled with the vendor’s software, but Red Hat Ansible Automation Platform connects and acts on it. So a network engineer only has to know Red Hat Ansible Automation Platform, which commoditizes speciality network interfaces and proprietary hardware.

    Overlay network management: 

    Because managing a network never starts out as a big lift—but usually ends up as one. We can help you navigate network management challenges with software that manages underlay and overlay networks, and we can teach you along the way.

    Our development model and commitment to open source software development gives you direct access to (and influence over) the innovation and collaboration happening in open source communities—many of which we helped establish.

    Red Hat offers interactive labs in a preconfigured Red Hat Ansible Automation Platform environment. You can use these labs to experiment, practice, and learn how to create, manage, and scale network and IT practices efficiently—from rapid development and deployment, to simplified operations and analytics, to consistent end-to-end user experiences.

    Keep reading


    What is configuration management?

    Configuration management is a process for maintaining computer systems, servers, and software in a desired, consistent state. It can be managed by automation.


    What is application lifecycle management (ALM)?

    Application lifecycle management (ALM) is the people, tools, and processes that manage the life cycle of an application from conception to end of life.


    What is an SOE?

    An SOE is a standard operating environment, or a specific computer operating system and collection of software that an IT department defines as a standard build.

    More about IT management


    System management software that makes Red Hat infrastructure easier to deploy, scale, and manage across any environment.

    A business automation platform for business rules management, business resource optimization, and complex event processing.

    A platform for developing cloud-native applications that automate business decisions and processes.

    A single console, with built-in security policies, for controlling Kubernetes clusters and applications.



    Command Line Heroes Season 3, Episode 2:
    "Learning the BASICs"


    Managing your Kubernetes clusters for dummies


    Red Hat Satellite 6: System management for Red Hat Enterprise Linux


    Free training course

    Red Hat Satellite Technical Overview

    • The OpenStack® Word Mark and OpenStack Logo are either registered trademarks / service marks or trademarks / service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation or the OpenStack community.