SlideShare a Scribd company logo
The nuts and bolts of Firewall
Analyzer
Firewall Analyzer training: Part I
Presenter
Can you hear me?
Can you see the presentation?
Please confirm by commenting in the chat panel
Agenda
• Why we need Firewall Analyzer?
• Installation of Firewall Analyzer.
• Configuring firewalls.
• Importing firewall logs.
• Classification of reports.
• Alerts & Notification.
Introduction
Why/What is Firewall Analyzer?
• Firewall Analyzer helps to analyze the logs generated by Firewalls using built-in syslog
server and produce various types of report.
Firewall Analyzer – Working
Architecture
Challenges
• Users complaining about Network Connectivity.
• Bandwidth utilization issues.
• Security Threats.
• Identifying & Preventing Security loop holes.
How Firewall Analyzer helpful to meet
Challenges
Firewall Analyzer is a Web based monitoring tool using which we can track the :
• URL activities.
• User based bandwidth.
• Secure networks before security threats arise.
• Meet the Compliance standards.
• Perform Security Audit.
• Do a capacity planning which will improve the performance of the network and
helpful to meet the challenges.
Installation of Firewall Analyzer
Installation requirements
1 GHZ Pentium
Dual Core
processor or
equivalent
6 GB of
RAM
50 GB of disk
space
PostgreSQL or MSSQL Windows or Linux
The disk space and RAM size requirements depend on the number of devices being analyzed and the
number of devices sending log information to Firewall Analyzer.
Device configuration
Configuration depends on vendor type
We have additional information for configuring different firewall types at
http://help.fwanalyzer.com/configure-firewall
Importing log files
After lauching the product for the first time, a screen will pop up, prompting you to import logs
After the initial import, you can always: Go to Settings > Firewall > System Click Import Log
and select which TXT or CSV file you'd like to import.
Setting up firewall logs
Where should I send syslogs?
Ports to be considered:
• web server port: 80
• Listener port—Port on which Firewall Analyzer
receives syslogs: 1514
• Database (Postgres): 13306 Ports are configurable
How do I send syslogs?
Ways of exporting syslogs to Firewall Analyzer:
1) Device configuration
2) Importing logs
Firewall Analyzer Functionalities
• Traffic analysis.
• Security analysis.
• Device management.
Traffic analysis
In Traffic analysis , we can analyze the traffic with
respect to :
• Top protocol.
• Top Applications.
• Hosts/users.
• Firewall rules.
• URL,Bytes sent,received.
Security analysis
In security analysis, we can find out :
• Who is trying to generate top
viruses.
• Attacks and spams.Which will
help us to take appropriate
actions.
• Protect the network from security
threats.
Device management
In Device management ,we can keep track of:
• Device configuration changes ,
• Meet our regulatory compliance requirements.
• Perform security audits.
Change Management
Dashboard overview
• Flexibility to create custom dashboards.
• One click option to change the default dashboard at login.
• Categorized for Traffic statistics, Security statistics,
Application, Attacks.
Custom Dashboard
Device Inventory
Classification of reports
• Traffic reports
• Security reports
• Admin Reports
• VPN reports
• URL Reports
• Internet reports
• Intranet reports
• Streaming and Chat Sites Reports
• Country Reports
• Inbound Outbound Reports
• Attack Reports
• Web Usage Reports
• Virus Reports and more.
Proxy Reports
• Live Reports
• Top Talkers Report
• Website Details Report
• Proxy Usage Report
• URL Categories Reports
• VPN Trend Reports
Search Reports
It allows you to search from the Raw Firewall Logs and aggregated logs database.
• Aggregated Search can be used if you want to
search from the aggregated logs database.
• Raw Search can be used if you want to from the raw
firewall logs.
Alarms and Notifications
• An alarm is triggered whenever an event matching a specific criteria is generated.
An alarm profile lets you define such specific criteria, and also notify you by email,
when the corresponding alarm is triggered.
Types of Alarms:
• Normal
• Anomaly
• Bandwidth
Alert use cases
Use case #1
Need an alert when DDoS attacks happens five times within 10 minutes.
Follow these steps:
• Select the Normal Alert profile.
• Set the criteria as attack contains DDoS.
• Set the threshold to five events in ten
minutes.
Use case #2
Need to be notified when a user suresh visits facebook during working hours and
consumes Total traffic of 1 GB in a day.
Follow these steps:
• Select the Anomaly Alert profile.
• Set the criteria.
• Set the threshold value.
Use case #3
Need to be notified when an Inbound traffic for Identity interface reaches 10 GB.
Follow these steps:
• Select the Bandwidth Alert profile.
• Set the criteria.
• Set the threshold value.
Settings
The settings section allows you to configure several system settings from the server running
Firewall Analyzer.
Types of Settings:
• Firewall Settings
• System Settings
• Administration Settings
Firewall Settings
Using Firewall Settings you can configure the following:
• Syslog Server Settings: To configure syslog servers to receive logs at different ports.
• Checkpoint Firewall Settings: To configure settings specific to Check Point firewalls.
• Device Rule: To view Used, Unused rules, Security Audit and Change Management
details of a Firewall device.
• Diagnose Firewall Connections: To monitor and analyze live connections through the
Firewall.
• Firewall Availability Alert: To configure to trigger alerts if there was no logs from
Firewalls for a specific period of time.
• Device Details: To view details of logs received from each device.
System Settings
Using System Settings you can configure the following,
• Import log Files: Used to import log files from the local machine or by FTP.
• Protocol Groups: For managing protocol groups .
• Archived Files: For configuring archiving intervals, or load an archived file into the
database.
• Schedule Listing: Contains the list of reports scheduled.
• Mail Server Settings: For configuring the mail server for reports & alerts.
• Configure Dns: For resolving DNS globally for all the reports.
• Customize Report: Customize the device reports to be shown in Device list.
• Database Console: To execute queries for trouble shooting.
Admin Settings
Using Admin Settings you can configure the following,
• Intranet Settings: To configure intranets to identify internal and external traffic.
• User Management: Used to add, edit, or delete users in Firewall Analyzer .
• External Authentication Setting: To configure Active Directory and RADIUS server
authentication for FWA web login.
• License Management: Manage(License)/ Un-manage(License)/Deleting the
devices.
• User/Hostname to IP mapping: For mapping the users with the IP address using
DHCP or proxy logs.
• Data Storage Options: For configuring data storage duration for the database and
archive of Firewall Analyzer.
• Rebranding FWA Web Client: To customize Firewall Analyzer Web Client.
Support for more than 50 vendors
Firewall Analyzer is a technology partner with :
Technology partnerships
What our partner has to say about us:
"This integration offers administrators an incredible amount of visibility into firewall systems. Application control
goes deeper with detailed usage reports, while change management, security reporting, event trends, and a detailed
compliance report for firewall configuration creates an immediate ROI for customers to present back to their
stakeholders." — Ben Oster, WatchGuard
Need more help?
youtube.com/opmanagertechvideos
help.fwanalyzer.com
forums.manageengine.com/fwanalyzer
fwanalyzer-support@manageengine.com
+1 (888) 720-9500 / +1 (408) 916 - 9595
Upcoming training on May 3rd
Understanding firewall policies and their effectiveness in defending against
network threats.
During this training, you'll learn about:
• Firewall policies.
• Optimizing firewall policies.
• Policy classification reports.
Q&A
Question 1
Live syslog viewer & Wireshark shows syslogs but device not
added. How to fix this?
• Windows Firewall might be enabled.
• Un-supported logs received.
• Time-stamp may not be enabled in case of Cisco Supported device, but
log-format may be changed in version specific vendor device.
Question 2
How to get bandwidth usage reports for specific sub-net (OR) user
based bandwidth?
Add a report filter with CIDR/User specific and create a New-Report Profile to achieve
it.
Question 3
Why Traffic bytes are shown as 0 MB? How to see traffic transaction details less than MB?
Bytes values shown in all reports are in MB. In case of low traffic value, it will be shown as 0 MB in
Graphs &Tables. If you go to Raw-Search, you will get full conversation data with exact byte value
received by application.
Question 4
Where to view VPN user transaction details?
VPN user specific intermittent traffic can be shown from Raw-Search, but normal VPN reports will not show
theses details.
Question 5
VPN user specific session start and end time can be tracked?
Yes, "VPN User Session Time Report" listed in Report-Profile addition will satisfy this need.
Question 6
Unable to see the Application/Virus reports report for Cisco devices in the
product(Firewall Analyzer) Web-UI?
Syslog doesn't give application data, so FWA won't populate.
Question 7
How to get user list for specific url access?
URL value give in Raw-Search will provide required results.
Question 8
How much HDD is required to manage number of firewalls?
HDD space occupancy completely depends on the number of logs received and Data storage
options, based on the following settings HDD space will be allocated accordingly.
Thank you!
fwanalyzer-support@manageengine.com

More Related Content

What's hot

Opmanager technical overview
Opmanager technical overviewOpmanager technical overview
Opmanager technical overview
ManageEngine, Zoho Corporation
 
Free OpManager training Part 3 - Monitoring Network Performance and Network Maps
Free OpManager training Part 3 - Monitoring Network Performance and Network MapsFree OpManager training Part 3 - Monitoring Network Performance and Network Maps
Free OpManager training Part 3 - Monitoring Network Performance and Network Maps
ManageEngine, Zoho Corporation
 
Free OpManager training_ Part 2-server monitoring
Free OpManager training_ Part 2-server monitoringFree OpManager training_ Part 2-server monitoring
Free OpManager training_ Part 2-server monitoring
ManageEngine, Zoho Corporation
 
Free training on NCM - Discovery & Disaster recovery
Free training on NCM - Discovery & Disaster recovery Free training on NCM - Discovery & Disaster recovery
Free training on NCM - Discovery & Disaster recovery
ManageEngine, Zoho Corporation
 
Free NetFlow Analyzer training - Getting the initial settings right
Free NetFlow Analyzer training - Getting the initial settings rightFree NetFlow Analyzer training - Getting the initial settings right
Free NetFlow Analyzer training - Getting the initial settings right
ManageEngine, Zoho Corporation
 
Network fault management and IT automation training
Network fault management and IT automation trainingNetwork fault management and IT automation training
Network fault management and IT automation training
ManageEngine, Zoho Corporation
 
Configlets, compliance, RBAC & reports - Network Configuration Manager
Configlets, compliance, RBAC & reports - Network Configuration ManagerConfiglets, compliance, RBAC & reports - Network Configuration Manager
Configlets, compliance, RBAC & reports - Network Configuration Manager
ManageEngine, Zoho Corporation
 
Firewall Penetration Testing
Firewall Penetration TestingFirewall Penetration Testing
Firewall Penetration Testing
Chirag Jain
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
Ben Rothke
 
Network and server performance monitoring training
Network and server performance monitoring trainingNetwork and server performance monitoring training
Network and server performance monitoring training
ManageEngine, Zoho Corporation
 
OpManager training - Device discovery and classification.
OpManager training - Device discovery and classification.OpManager training - Device discovery and classification.
OpManager training - Device discovery and classification.
ManageEngine, Zoho Corporation
 
Free OpManager training Part1- Discovery and classification season#3
Free OpManager training Part1- Discovery and classification season#3Free OpManager training Part1- Discovery and classification season#3
Free OpManager training Part1- Discovery and classification season#3
ManageEngine, Zoho Corporation
 
Proof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManagerProof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManager
ManageEngine, Zoho Corporation
 
Overview OpManager
Overview OpManagerOverview OpManager
Overview OpManager
Fanky Christian
 
How to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall AuditHow to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall Audit
keyuradmin
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor Presentation
Nafaâ TAYACHI
 
Free Netflow analyzer training - diagnosing_and_troubleshooting
Free Netflow analyzer  training - diagnosing_and_troubleshootingFree Netflow analyzer  training - diagnosing_and_troubleshooting
Free Netflow analyzer training - diagnosing_and_troubleshooting
ManageEngine, Zoho Corporation
 
OpManager Major Features
OpManager Major FeaturesOpManager Major Features
OpManager Major Features
tecanody
 
OpManager Technical Overview
OpManager Technical OverviewOpManager Technical Overview
OpManager Technical Overview
ManageEngine, Zoho Corporation
 
Server and application monitoring webinars [Applications Manager] - Part 4
Server and application monitoring webinars [Applications Manager] - Part 4Server and application monitoring webinars [Applications Manager] - Part 4
Server and application monitoring webinars [Applications Manager] - Part 4
ManageEngine, Zoho Corporation
 

What's hot (20)

Opmanager technical overview
Opmanager technical overviewOpmanager technical overview
Opmanager technical overview
 
Free OpManager training Part 3 - Monitoring Network Performance and Network Maps
Free OpManager training Part 3 - Monitoring Network Performance and Network MapsFree OpManager training Part 3 - Monitoring Network Performance and Network Maps
Free OpManager training Part 3 - Monitoring Network Performance and Network Maps
 
Free OpManager training_ Part 2-server monitoring
Free OpManager training_ Part 2-server monitoringFree OpManager training_ Part 2-server monitoring
Free OpManager training_ Part 2-server monitoring
 
Free training on NCM - Discovery & Disaster recovery
Free training on NCM - Discovery & Disaster recovery Free training on NCM - Discovery & Disaster recovery
Free training on NCM - Discovery & Disaster recovery
 
Free NetFlow Analyzer training - Getting the initial settings right
Free NetFlow Analyzer training - Getting the initial settings rightFree NetFlow Analyzer training - Getting the initial settings right
Free NetFlow Analyzer training - Getting the initial settings right
 
Network fault management and IT automation training
Network fault management and IT automation trainingNetwork fault management and IT automation training
Network fault management and IT automation training
 
Configlets, compliance, RBAC & reports - Network Configuration Manager
Configlets, compliance, RBAC & reports - Network Configuration ManagerConfiglets, compliance, RBAC & reports - Network Configuration Manager
Configlets, compliance, RBAC & reports - Network Configuration Manager
 
Firewall Penetration Testing
Firewall Penetration TestingFirewall Penetration Testing
Firewall Penetration Testing
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 
Network and server performance monitoring training
Network and server performance monitoring trainingNetwork and server performance monitoring training
Network and server performance monitoring training
 
OpManager training - Device discovery and classification.
OpManager training - Device discovery and classification.OpManager training - Device discovery and classification.
OpManager training - Device discovery and classification.
 
Free OpManager training Part1- Discovery and classification season#3
Free OpManager training Part1- Discovery and classification season#3Free OpManager training Part1- Discovery and classification season#3
Free OpManager training Part1- Discovery and classification season#3
 
Proof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManagerProof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManager
 
Overview OpManager
Overview OpManagerOverview OpManager
Overview OpManager
 
How to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall AuditHow to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall Audit
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor Presentation
 
Free Netflow analyzer training - diagnosing_and_troubleshooting
Free Netflow analyzer  training - diagnosing_and_troubleshootingFree Netflow analyzer  training - diagnosing_and_troubleshooting
Free Netflow analyzer training - diagnosing_and_troubleshooting
 
OpManager Major Features
OpManager Major FeaturesOpManager Major Features
OpManager Major Features
 
OpManager Technical Overview
OpManager Technical OverviewOpManager Technical Overview
OpManager Technical Overview
 
Server and application monitoring webinars [Applications Manager] - Part 4
Server and application monitoring webinars [Applications Manager] - Part 4Server and application monitoring webinars [Applications Manager] - Part 4
Server and application monitoring webinars [Applications Manager] - Part 4
 

Similar to Copy of learn_the_art_of_firewall_security(1)

Firewall Analyzer - Middle East Workshop
Firewall Analyzer - Middle East WorkshopFirewall Analyzer - Middle East Workshop
Firewall Analyzer - Middle East Workshop
ManageEngine, Zoho Corporation
 
whats-new_Fireware_v11-10
whats-new_Fireware_v11-10whats-new_Fireware_v11-10
whats-new_Fireware_v11-10
Serhat Cakmakoglu
 
Tripwire ppt
Tripwire pptTripwire ppt
NetFlow Analyzer Training Part I: Getting the initial settings right
NetFlow Analyzer Training Part I: Getting the initial settings rightNetFlow Analyzer Training Part I: Getting the initial settings right
NetFlow Analyzer Training Part I: Getting the initial settings right
ManageEngine, Zoho Corporation
 
Export flows, group traffic, map application traffic and more: NetFlow Analyz...
Export flows, group traffic, map application traffic and more: NetFlow Analyz...Export flows, group traffic, map application traffic and more: NetFlow Analyz...
Export flows, group traffic, map application traffic and more: NetFlow Analyz...
ManageEngine, Zoho Corporation
 
11 palo alto user-id concepts
11 palo alto user-id concepts11 palo alto user-id concepts
11 palo alto user-id concepts
Mostafa El Lathy
 
[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT
Site24x7
 
5 ways you can strengthen and secure your network infrastructure with Firewal...
5 ways you can strengthen and secure your network infrastructure with Firewal...5 ways you can strengthen and secure your network infrastructure with Firewal...
5 ways you can strengthen and secure your network infrastructure with Firewal...
ManageEngine, Zoho Corporation
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
Divya Jyoti
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
Waqas Ahmed Nawaz
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
ThangDang53
 
Webinar NETGEAR - Insight, le funzionalita' per il Networking Management
Webinar NETGEAR - Insight, le funzionalita' per il Networking ManagementWebinar NETGEAR - Insight, le funzionalita' per il Networking Management
Webinar NETGEAR - Insight, le funzionalita' per il Networking Management
Netgear Italia
 
Observability for Integration Using WSO2 Enterprise Integrator
Observability for Integration Using WSO2 Enterprise IntegratorObservability for Integration Using WSO2 Enterprise Integrator
Observability for Integration Using WSO2 Enterprise Integrator
WSO2
 
Net Rounds Product Sheet
Net Rounds Product SheetNet Rounds Product Sheet
Net Rounds Product Sheet
guest3f034b
 
Cisco umbrella youtube
Cisco umbrella youtubeCisco umbrella youtube
Cisco umbrella youtube
Dhruv Sharma
 
INT_Ch17.pptx
INT_Ch17.pptxINT_Ch17.pptx
INT_Ch17.pptx
NguyenLong773850
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
Anne Starr
 
Nagios, Getting Started.
Nagios, Getting Started.Nagios, Getting Started.
Nagios, Getting Started.
Hitesh Bhatia
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data plane
NetProtocol Xpert
 
Brkcrt 2214
Brkcrt 2214Brkcrt 2214
Brkcrt 2214
Mac An
 

Similar to Copy of learn_the_art_of_firewall_security(1) (20)

Firewall Analyzer - Middle East Workshop
Firewall Analyzer - Middle East WorkshopFirewall Analyzer - Middle East Workshop
Firewall Analyzer - Middle East Workshop
 
whats-new_Fireware_v11-10
whats-new_Fireware_v11-10whats-new_Fireware_v11-10
whats-new_Fireware_v11-10
 
Tripwire ppt
Tripwire pptTripwire ppt
Tripwire ppt
 
NetFlow Analyzer Training Part I: Getting the initial settings right
NetFlow Analyzer Training Part I: Getting the initial settings rightNetFlow Analyzer Training Part I: Getting the initial settings right
NetFlow Analyzer Training Part I: Getting the initial settings right
 
Export flows, group traffic, map application traffic and more: NetFlow Analyz...
Export flows, group traffic, map application traffic and more: NetFlow Analyz...Export flows, group traffic, map application traffic and more: NetFlow Analyz...
Export flows, group traffic, map application traffic and more: NetFlow Analyz...
 
11 palo alto user-id concepts
11 palo alto user-id concepts11 palo alto user-id concepts
11 palo alto user-id concepts
 
[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT
 
5 ways you can strengthen and secure your network infrastructure with Firewal...
5 ways you can strengthen and secure your network infrastructure with Firewal...5 ways you can strengthen and secure your network infrastructure with Firewal...
5 ways you can strengthen and secure your network infrastructure with Firewal...
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
Webinar NETGEAR - Insight, le funzionalita' per il Networking Management
Webinar NETGEAR - Insight, le funzionalita' per il Networking ManagementWebinar NETGEAR - Insight, le funzionalita' per il Networking Management
Webinar NETGEAR - Insight, le funzionalita' per il Networking Management
 
Observability for Integration Using WSO2 Enterprise Integrator
Observability for Integration Using WSO2 Enterprise IntegratorObservability for Integration Using WSO2 Enterprise Integrator
Observability for Integration Using WSO2 Enterprise Integrator
 
Net Rounds Product Sheet
Net Rounds Product SheetNet Rounds Product Sheet
Net Rounds Product Sheet
 
Cisco umbrella youtube
Cisco umbrella youtubeCisco umbrella youtube
Cisco umbrella youtube
 
INT_Ch17.pptx
INT_Ch17.pptxINT_Ch17.pptx
INT_Ch17.pptx
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
Nagios, Getting Started.
Nagios, Getting Started.Nagios, Getting Started.
Nagios, Getting Started.
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data plane
 
Brkcrt 2214
Brkcrt 2214Brkcrt 2214
Brkcrt 2214
 

More from ManageEngine, Zoho Corporation

Create seamless customer experiences
Create seamless customer experiencesCreate seamless customer experiences
Create seamless customer experiences
ManageEngine, Zoho Corporation
 
From web interface to database: Monitor what matters
From web interface to database: Monitor what mattersFrom web interface to database: Monitor what matters
From web interface to database: Monitor what matters
ManageEngine, Zoho Corporation
 
NetFlow Analyzer Free Training Series Part I - May 2020
NetFlow Analyzer Free Training Series Part I - May 2020NetFlow Analyzer Free Training Series Part I - May 2020
NetFlow Analyzer Free Training Series Part I - May 2020
ManageEngine, Zoho Corporation
 
Overcome real-time server and VM monitoring challenges
Overcome real-time server and VM monitoring challengesOvercome real-time server and VM monitoring challenges
Overcome real-time server and VM monitoring challenges
ManageEngine, Zoho Corporation
 
Modernizing Cloud and Hyperconverged Infrastructure monitoring
Modernizing Cloud and Hyperconverged Infrastructure monitoringModernizing Cloud and Hyperconverged Infrastructure monitoring
Modernizing Cloud and Hyperconverged Infrastructure monitoring
ManageEngine, Zoho Corporation
 
Deliver seamless digital experience
Deliver seamless digital experienceDeliver seamless digital experience
Deliver seamless digital experience
ManageEngine, Zoho Corporation
 
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
ManageEngine, Zoho Corporation
 
From web interface to the database:Monitor all that matters
From web interface to the database:Monitor all that mattersFrom web interface to the database:Monitor all that matters
From web interface to the database:Monitor all that matters
ManageEngine, Zoho Corporation
 
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - ESTNetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
ManageEngine, Zoho Corporation
 
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMTNetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
ManageEngine, Zoho Corporation
 
NetFlow Analyzer Product Overview
NetFlow Analyzer Product OverviewNetFlow Analyzer Product Overview
NetFlow Analyzer Product Overview
ManageEngine, Zoho Corporation
 
Monitoring cloud applications and hyperconverged infrastructure
Monitoring cloud applications and hyperconverged infrastructureMonitoring cloud applications and hyperconverged infrastructure
Monitoring cloud applications and hyperconverged infrastructure
ManageEngine, Zoho Corporation
 
Building the right website monitoring strategy
Building the right website monitoring strategyBuilding the right website monitoring strategy
Building the right website monitoring strategy
ManageEngine, Zoho Corporation
 
Unlock the value of your big data infrastructure
Unlock the value of your big data infrastructureUnlock the value of your big data infrastructure
Unlock the value of your big data infrastructure
ManageEngine, Zoho Corporation
 
Key to optimal end user experience
Key to optimal end user experienceKey to optimal end user experience
Key to optimal end user experience
ManageEngine, Zoho Corporation
 
Monitoring cloud applications and containers
Monitoring cloud applications and containersMonitoring cloud applications and containers
Monitoring cloud applications and containers
ManageEngine, Zoho Corporation
 
implementing the right website monitoring strategy
 implementing the right website monitoring strategy implementing the right website monitoring strategy
implementing the right website monitoring strategy
ManageEngine, Zoho Corporation
 
Big data and non relational database
Big data and non relational databaseBig data and non relational database
Big data and non relational database
ManageEngine, Zoho Corporation
 
Visibility-from web application interface to the database
Visibility-from web application interface to the databaseVisibility-from web application interface to the database
Visibility-from web application interface to the database
ManageEngine, Zoho Corporation
 
Free OpManager training Part 4 - Monitoring Network Performance and Network Maps
Free OpManager training Part 4 - Monitoring Network Performance and Network MapsFree OpManager training Part 4 - Monitoring Network Performance and Network Maps
Free OpManager training Part 4 - Monitoring Network Performance and Network Maps
ManageEngine, Zoho Corporation
 

More from ManageEngine, Zoho Corporation (20)

Create seamless customer experiences
Create seamless customer experiencesCreate seamless customer experiences
Create seamless customer experiences
 
From web interface to database: Monitor what matters
From web interface to database: Monitor what mattersFrom web interface to database: Monitor what matters
From web interface to database: Monitor what matters
 
NetFlow Analyzer Free Training Series Part I - May 2020
NetFlow Analyzer Free Training Series Part I - May 2020NetFlow Analyzer Free Training Series Part I - May 2020
NetFlow Analyzer Free Training Series Part I - May 2020
 
Overcome real-time server and VM monitoring challenges
Overcome real-time server and VM monitoring challengesOvercome real-time server and VM monitoring challenges
Overcome real-time server and VM monitoring challenges
 
Modernizing Cloud and Hyperconverged Infrastructure monitoring
Modernizing Cloud and Hyperconverged Infrastructure monitoringModernizing Cloud and Hyperconverged Infrastructure monitoring
Modernizing Cloud and Hyperconverged Infrastructure monitoring
 
Deliver seamless digital experience
Deliver seamless digital experienceDeliver seamless digital experience
Deliver seamless digital experience
 
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
 
From web interface to the database:Monitor all that matters
From web interface to the database:Monitor all that mattersFrom web interface to the database:Monitor all that matters
From web interface to the database:Monitor all that matters
 
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - ESTNetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
 
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMTNetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
 
NetFlow Analyzer Product Overview
NetFlow Analyzer Product OverviewNetFlow Analyzer Product Overview
NetFlow Analyzer Product Overview
 
Monitoring cloud applications and hyperconverged infrastructure
Monitoring cloud applications and hyperconverged infrastructureMonitoring cloud applications and hyperconverged infrastructure
Monitoring cloud applications and hyperconverged infrastructure
 
Building the right website monitoring strategy
Building the right website monitoring strategyBuilding the right website monitoring strategy
Building the right website monitoring strategy
 
Unlock the value of your big data infrastructure
Unlock the value of your big data infrastructureUnlock the value of your big data infrastructure
Unlock the value of your big data infrastructure
 
Key to optimal end user experience
Key to optimal end user experienceKey to optimal end user experience
Key to optimal end user experience
 
Monitoring cloud applications and containers
Monitoring cloud applications and containersMonitoring cloud applications and containers
Monitoring cloud applications and containers
 
implementing the right website monitoring strategy
 implementing the right website monitoring strategy implementing the right website monitoring strategy
implementing the right website monitoring strategy
 
Big data and non relational database
Big data and non relational databaseBig data and non relational database
Big data and non relational database
 
Visibility-from web application interface to the database
Visibility-from web application interface to the databaseVisibility-from web application interface to the database
Visibility-from web application interface to the database
 
Free OpManager training Part 4 - Monitoring Network Performance and Network Maps
Free OpManager training Part 4 - Monitoring Network Performance and Network MapsFree OpManager training Part 4 - Monitoring Network Performance and Network Maps
Free OpManager training Part 4 - Monitoring Network Performance and Network Maps
 

Recently uploaded

Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
What is Master Data Management by PiLog Group
What is Master Data Management by PiLog GroupWhat is Master Data Management by PiLog Group
What is Master Data Management by PiLog Group
aymanquadri279
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
Yara Milbes
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
Grant Fritchey
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Envertis Software Solutions
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
Peter Muessig
 
SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024
Hironori Washizaki
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 

Recently uploaded (20)

Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
What is Master Data Management by PiLog Group
What is Master Data Management by PiLog GroupWhat is Master Data Management by PiLog Group
What is Master Data Management by PiLog Group
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
 
SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024SWEBOK and Education at FUSE Okinawa 2024
SWEBOK and Education at FUSE Okinawa 2024
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 

Copy of learn_the_art_of_firewall_security(1)

  • 1. The nuts and bolts of Firewall Analyzer Firewall Analyzer training: Part I
  • 3. Can you hear me? Can you see the presentation? Please confirm by commenting in the chat panel
  • 4. Agenda • Why we need Firewall Analyzer? • Installation of Firewall Analyzer. • Configuring firewalls. • Importing firewall logs. • Classification of reports. • Alerts & Notification.
  • 5. Introduction Why/What is Firewall Analyzer? • Firewall Analyzer helps to analyze the logs generated by Firewalls using built-in syslog server and produce various types of report.
  • 6. Firewall Analyzer – Working Architecture
  • 7. Challenges • Users complaining about Network Connectivity. • Bandwidth utilization issues. • Security Threats. • Identifying & Preventing Security loop holes.
  • 8. How Firewall Analyzer helpful to meet Challenges Firewall Analyzer is a Web based monitoring tool using which we can track the : • URL activities. • User based bandwidth. • Secure networks before security threats arise. • Meet the Compliance standards. • Perform Security Audit. • Do a capacity planning which will improve the performance of the network and helpful to meet the challenges.
  • 10. Installation requirements 1 GHZ Pentium Dual Core processor or equivalent 6 GB of RAM 50 GB of disk space PostgreSQL or MSSQL Windows or Linux The disk space and RAM size requirements depend on the number of devices being analyzed and the number of devices sending log information to Firewall Analyzer.
  • 11. Device configuration Configuration depends on vendor type We have additional information for configuring different firewall types at http://help.fwanalyzer.com/configure-firewall
  • 12. Importing log files After lauching the product for the first time, a screen will pop up, prompting you to import logs After the initial import, you can always: Go to Settings > Firewall > System Click Import Log and select which TXT or CSV file you'd like to import.
  • 13. Setting up firewall logs Where should I send syslogs? Ports to be considered: • web server port: 80 • Listener port—Port on which Firewall Analyzer receives syslogs: 1514 • Database (Postgres): 13306 Ports are configurable How do I send syslogs? Ways of exporting syslogs to Firewall Analyzer: 1) Device configuration 2) Importing logs
  • 14. Firewall Analyzer Functionalities • Traffic analysis. • Security analysis. • Device management.
  • 15. Traffic analysis In Traffic analysis , we can analyze the traffic with respect to : • Top protocol. • Top Applications. • Hosts/users. • Firewall rules. • URL,Bytes sent,received.
  • 16. Security analysis In security analysis, we can find out : • Who is trying to generate top viruses. • Attacks and spams.Which will help us to take appropriate actions. • Protect the network from security threats.
  • 17. Device management In Device management ,we can keep track of: • Device configuration changes , • Meet our regulatory compliance requirements. • Perform security audits.
  • 18.
  • 20. Dashboard overview • Flexibility to create custom dashboards. • One click option to change the default dashboard at login. • Categorized for Traffic statistics, Security statistics, Application, Attacks.
  • 21.
  • 24. Classification of reports • Traffic reports • Security reports • Admin Reports • VPN reports • URL Reports • Internet reports • Intranet reports • Streaming and Chat Sites Reports • Country Reports • Inbound Outbound Reports • Attack Reports • Web Usage Reports • Virus Reports and more.
  • 25.
  • 26. Proxy Reports • Live Reports • Top Talkers Report • Website Details Report • Proxy Usage Report • URL Categories Reports • VPN Trend Reports
  • 27.
  • 28. Search Reports It allows you to search from the Raw Firewall Logs and aggregated logs database. • Aggregated Search can be used if you want to search from the aggregated logs database. • Raw Search can be used if you want to from the raw firewall logs.
  • 29. Alarms and Notifications • An alarm is triggered whenever an event matching a specific criteria is generated. An alarm profile lets you define such specific criteria, and also notify you by email, when the corresponding alarm is triggered. Types of Alarms: • Normal • Anomaly • Bandwidth
  • 31. Use case #1 Need an alert when DDoS attacks happens five times within 10 minutes. Follow these steps: • Select the Normal Alert profile. • Set the criteria as attack contains DDoS. • Set the threshold to five events in ten minutes.
  • 32. Use case #2 Need to be notified when a user suresh visits facebook during working hours and consumes Total traffic of 1 GB in a day. Follow these steps: • Select the Anomaly Alert profile. • Set the criteria. • Set the threshold value.
  • 33. Use case #3 Need to be notified when an Inbound traffic for Identity interface reaches 10 GB. Follow these steps: • Select the Bandwidth Alert profile. • Set the criteria. • Set the threshold value.
  • 34. Settings The settings section allows you to configure several system settings from the server running Firewall Analyzer. Types of Settings: • Firewall Settings • System Settings • Administration Settings
  • 35. Firewall Settings Using Firewall Settings you can configure the following: • Syslog Server Settings: To configure syslog servers to receive logs at different ports. • Checkpoint Firewall Settings: To configure settings specific to Check Point firewalls. • Device Rule: To view Used, Unused rules, Security Audit and Change Management details of a Firewall device. • Diagnose Firewall Connections: To monitor and analyze live connections through the Firewall. • Firewall Availability Alert: To configure to trigger alerts if there was no logs from Firewalls for a specific period of time. • Device Details: To view details of logs received from each device.
  • 36.
  • 37. System Settings Using System Settings you can configure the following, • Import log Files: Used to import log files from the local machine or by FTP. • Protocol Groups: For managing protocol groups . • Archived Files: For configuring archiving intervals, or load an archived file into the database. • Schedule Listing: Contains the list of reports scheduled. • Mail Server Settings: For configuring the mail server for reports & alerts. • Configure Dns: For resolving DNS globally for all the reports. • Customize Report: Customize the device reports to be shown in Device list. • Database Console: To execute queries for trouble shooting.
  • 38.
  • 39. Admin Settings Using Admin Settings you can configure the following, • Intranet Settings: To configure intranets to identify internal and external traffic. • User Management: Used to add, edit, or delete users in Firewall Analyzer . • External Authentication Setting: To configure Active Directory and RADIUS server authentication for FWA web login. • License Management: Manage(License)/ Un-manage(License)/Deleting the devices. • User/Hostname to IP mapping: For mapping the users with the IP address using DHCP or proxy logs. • Data Storage Options: For configuring data storage duration for the database and archive of Firewall Analyzer. • Rebranding FWA Web Client: To customize Firewall Analyzer Web Client.
  • 40.
  • 41. Support for more than 50 vendors
  • 42. Firewall Analyzer is a technology partner with : Technology partnerships What our partner has to say about us: "This integration offers administrators an incredible amount of visibility into firewall systems. Application control goes deeper with detailed usage reports, while change management, security reporting, event trends, and a detailed compliance report for firewall configuration creates an immediate ROI for customers to present back to their stakeholders." — Ben Oster, WatchGuard
  • 44. Upcoming training on May 3rd Understanding firewall policies and their effectiveness in defending against network threats. During this training, you'll learn about: • Firewall policies. • Optimizing firewall policies. • Policy classification reports.
  • 45. Q&A
  • 46. Question 1 Live syslog viewer & Wireshark shows syslogs but device not added. How to fix this? • Windows Firewall might be enabled. • Un-supported logs received. • Time-stamp may not be enabled in case of Cisco Supported device, but log-format may be changed in version specific vendor device.
  • 47. Question 2 How to get bandwidth usage reports for specific sub-net (OR) user based bandwidth? Add a report filter with CIDR/User specific and create a New-Report Profile to achieve it.
  • 48. Question 3 Why Traffic bytes are shown as 0 MB? How to see traffic transaction details less than MB? Bytes values shown in all reports are in MB. In case of low traffic value, it will be shown as 0 MB in Graphs &Tables. If you go to Raw-Search, you will get full conversation data with exact byte value received by application.
  • 49. Question 4 Where to view VPN user transaction details? VPN user specific intermittent traffic can be shown from Raw-Search, but normal VPN reports will not show theses details.
  • 50. Question 5 VPN user specific session start and end time can be tracked? Yes, "VPN User Session Time Report" listed in Report-Profile addition will satisfy this need.
  • 51. Question 6 Unable to see the Application/Virus reports report for Cisco devices in the product(Firewall Analyzer) Web-UI? Syslog doesn't give application data, so FWA won't populate.
  • 52. Question 7 How to get user list for specific url access? URL value give in Raw-Search will provide required results.
  • 53. Question 8 How much HDD is required to manage number of firewalls? HDD space occupancy completely depends on the number of logs received and Data storage options, based on the following settings HDD space will be allocated accordingly.