Network Query Engine: Automate Network Health Checks in Minutes

Last month we introduced our Network Query Engine (NQE) at Cisco Live Europe and to a very impressive technical audience as part of Tech Field Day 2019. If you didn’t have the chance to read through our introduction blog, NQE leverages the internal network data model that Forward Networks builds…

Query Your Network Like a Database to Gain Knowledge and Simplify Operations

There is a wealth of untapped information in your network. Learn to query and extract it! Even before packets start flowing, enterprise networks are complex, data-intensive repositories of topology, configuration and state information. This information is often required to solve operational…

Why should data centers have all the fun?
Network verification now available for AWS

What’s been the biggest change to networking in the past decade? While there have been tremendous improvements in automation, capacity and mobility, nothing has had a greater impact on IT organizations than cloud migration. We all know the business drivers behind this evolution, from cost…

Vulnerable to Cisco ASA and Firepower SIP DoS attacks? Find out how to fix in only a few minutes.

On October 31, 2018, Cisco released a security advisory for its ASA and Firepower threat defense software regarding a Denial of Service (DoS) vulnerability. The full security advisory can be found here. The summary (below) notes that the Session Initiation Protocol (SIP) inspection engine could…

You Can Now Diff Your Entire Network in One Intuitive Platform

In tech terms, a diff is a listing of changes or differences between documents, files, source code, etc. As a Unix command, it became a common method of distributing patches and source updates, or just comparing versions of text files. Diffs became so easy to do and use, and common to so many use…

Forward Enterprise and Cisco NSO deliver Verification + Automation

The great panacea for network IT the last several years has been more and more automation. Automation through orchestration. Simplifying and accelerating network administration tasks at the scale of large enterprise and cloud networks. Automation to keep up with the accelerated deployment of…

Separate Policy Analysis Between Network and Security Teams with Forward Networks Permit-All Mode

A new feature in Forward Enterprise now allows customers to simplify the analysis of network access issues between the network and security teams. We call this feature ACL-less analysis, or permit-all mode. First some context why multiple customers asked us to develop this feature, and the use case…

Automate Policy Verification to Accelerate NetOps and Change Windows

In agile network operations, network configurations need to be updated to reflect new application or policy requirements, or to implement a change in network behavior. As business and application requirements change, we have to translate new policies into specific network configuration changes in…

A Better Way to Document Your Network Topology than Visio

Yesterday, Brandon Heller and I recorded a podcast with Ethan Banks and Greg Ferro of Packet Pushers fame. If you are not a fan of Packet Pusher Podcasts, you should be. They have a large following of highly technical network nerds and their podcasts are always engaging and educational. When they…

Verification in Forward Enterprise: Become “Absolutely Sure” of Your Network Intent

In Part 1 of this blog, I discussed the power of network verification compared to traditional network testing. Verification is the mathematical and logical analysis of your current network configurations and state to detect and highlight violations of your policies and intent. Verification can take…