Network automation has numerous benefits for organizations adopting a DevOps model for managing their infrastructure, including speed, agility, and a consistent change control process. However, with improvements in speed, there comes an added risk of configuration errors rapidly propagating through the network. To safeguard against potential mistakes, network and security verification become an essential part of the network DevOps lifecycle. This page outlines an approach to pre-change and post-change network and security verification using Forward Enterprise and CloudVision to continuously validate that the network is compliant with security and availability policies.
Arista CloudVision is a network-wide approach for workload orchestration, workflow automation, and real-time telemetry as a turnkey solution for Cloud Networking.
CloudVision’s network-wide perspective delivers a more efficient approach for several operational and network telemetry use-cases:
The Forward Enterprise platform provides network intelligence that makes networks more predictable, agile and secure. Forward Enterprise generates a vendor-neutral software abstraction (digital twin) that models the entire multi-vendor network infrastructure including switches, routers, firewalls, and load balancers, both on-premises and in the cloud.
With available REST APIs, it easily integrates into new and existing network management workflows.
• Security: enhance the network’s security posture with automated security posture connectivity analysis, blast radius of compromised hosts, enhanced automated vulnerability analysis, and cloud security verification.
• Behavior Diffs: side-by-side comparison in one quick view of configuration file and state changes for any device, between any points in time. Identify what policy rules and behavior checks have changed between snapshots. Quickly see new device connections, topology changes, and interface updates. Learn how routes are altered due to changes with the ability to filter results by VRF, next-hop address, IP destination, and more.
• Network Query Engine (NQE): query the network like a database. Define and perform custom verification checks.
• Predict: understand the outcome of network configuration changes for ACL and NAT environments. Proactively identify potential connectivity and security policy violations.
• Dashboard: see key network insights with visualizations that are easily consumable and exportable.
• Propose a change for one or more devices and analyze it to ensure it is feasible.
• Request a new pre-change network snapshot from the Forward Enterprise platform using an API call.
• Deploy the configuration change to the network.
• Provide real-time monitoring of the network and track the configuration changes over time.