Configure Collection
This section covers how to configure the Forward platform to collect from all supported source types.
Network devices
- Adding Devices — add classic network devices via CSV import, network discovery, or manual entry
- Device Credentials — configure SSH, SNMP, and HTTP credentials
- Jump Servers — route collection through intermediate hosts
- Connectivity Test — validate device reachability
- Advanced Configuration — BGP, BMP, concurrency, vendor-specific settings, and more
Cloud and virtual infrastructure
- Cloud Infrastructure — AWS, Azure, GCP, Alkira, IBM Cloud
- Cloud-Managed Devices — Cisco Meraki, Arista VeloCloud
- Cisco ACI — ACI fabric discovery and modeling
- VMware — vCenter and NSX-T
Additional source types
- Synthetic Nodes — Internet/Intranet nodes, L2/L3 VPNs, WAN circuits, encryptors
- Endpoints — custom CLI, SNMP, and HTTP sources
- Endpoint Profiles — reusable collection profiles for endpoints
- Data Connectors — HTTP(S)-based external data integrations
- Data Files — uploaded file-based data inputs
Vulnerability scanners
End host scanner setup is documented alongside the Exposure Analysis feature:
Other topics
- Cloud Proxy — proxy configuration for cloud collection
- Redact Sensitive Data — data anonymization during collection
- Troubleshooting — common collection issues