Introduction

One of the day to day activities for networking teams is configuration management. Historically the Catalyst SD-WAN solution provided the templates as the go-to method to create and assign configuration in a reusable way. Along the years, Cisco has been learning and listening to the field and the feedback was clear, the configuration management needed to improve.

Version 20.8.x was the first one to see Configuration Groups constructs, but they were quite limited. Throughout subsequent versions, new features were added to make Config groups more robust and better suited to support more and more use cases. With the announcement of 20.15 as recommended release, Configuration Groups took the stage as it’s the first version where we can consider the feature is mature enough for most use cases.

And there’s another important point: new devices that Cisco is releasing now come only with support for Configuration Groups.

So what exactly are Configuration Groups? And why should you care?

If you’re still thinking in terms of templates, this post will help you understand the new model and why it makes your life easier.

What Are Configuration Groups?

At a high level, a Configuration Group represents the full configuration of a device.

Instead of stitching together multiple feature templates like we used to, now we build configurations using a more structured and modular approach.

A Configuration Group is made of:

  • Feature Profiles
  • Which contain Features
  • Which contain actual configuration (and variables)

Let’s break that down.

The Building Blocks

Features

Features are the smallest building blocks.

Think of them as individual configuration elements like:

  • BFD
  • OMP
  • Interfaces
  • VPN configuration
  • AAA, logging, CLI add-ons

They can include:

  • Global configuration
  • Variables (placeholders for per-device values)
  • Default value

Feature Profiles

Feature Profiles group related features together into logical sections.

For example:

  • System Profile → system, AAA, logging
  • Transport & Management Profile → VPN 0, interfaces, VPN 512
  • Service Profile → VPNs, routing (OSPF, BGP, etc.)
  • CLI Add-On Profile → custom CLI

These profiles give structure to the configuration and make it reusable across multiple deployments.

The screenshot shows an interface configuration (Interface Feature), notice the same principles that apply to templates are here.

🚀
SD-WAN Course

This is covered in depth in the UX 2.0 course

Configuration Groups, Policy Groups, and topology management — with lab files and running configs.

See the Course →

Configuration Groups

Now we bring everything together.

A Configuration Group:

  • Combines multiple Feature Profiles
  • Represents the entire configuration of a device
  • Can be applied to one or many devices
  • Is device model agnostic

This last point is important.

You’re no longer tightly coupling your configuration to a specific hardware model like before.

In the screenshot above, we can see different models, although both of them are virtual routers, we could very well have a Catalyst 8300, ASR1000 or any other model.

How Is This Different from Templates?

If you’ve used feature templates before, you’ll immediately notice the difference.

Here’s how I think about it.

1. Deployment Workflow

With templates:

  • You modify and deploy at the same time

Configuration Groups:

  • You modify first
  • Then deploy when ready

This gives you more control and avoids accidental changes hitting production.

2. Deployment Granularity

Templates:

  • Bulk deployment (all or nothing)

Configuration Groups:

  • Selective deployment

You can push the changes to a single device (or more) instead of every device associated to it.

3. Reusability

Templates:

  • Model-specific
  • Harder to reuse across platforms

Configuration Groups:

  • Model agnostic
  • Designed for reuse across different device types

This is a big win in mixed environments.

4. Complexity

Templates:

  • Non-intuitive structure
  • Harder to understand dependencies

Configuration Groups:

  • Guided workflow that takes you step by step through the configuration
  • Cleaner structure with logical grouping

My Experience So Far

After working with Configuration Groups in the lab and with multiple customers, here’s what I’ve learned:

  • The mental transition for those coming from templates can be tough. The best way to get past it is simple: get your hands dirty.
  • The best way to build Configuration Groups is to reverse engineer them. Don’t start with the group — start with the device requirements, then build your Feature Profiles and Configuration Groups around that.
  • The flexibility to modify and deploy at different times is golden.
  • At the beginning, it’s not always obvious where each piece of configuration lives between Configuration Groups and Policy Groups. I built this tool to help with that.
  • Some scenarios are more challenging to migrate. Start with Configuration Groups, then move to Policy Groups. It’s perfectly fine to run a mix of Configuration Groups and traditional policies for a while.

Key Takeaways

If you only remember three things from this post, make them these:

  • Configuration Groups represent the full device configuration
  • They use a structured model: Features → Feature Profiles → Configuration Group
  • They replace templates with a more reusable and flexible approach
🚀
SD-WAN Course

This is covered in depth in the UX 2.0 course

Configuration Groups, Policy Groups, and topology management — with lab files and running configs.

See the Course →