This document outlines a 5-phase methodology for auditing firewalls: I) Gather documentation on the firewall setup and security policies; II) Evaluate the firewall configuration for authentication, access controls, and auditing; III) Review each rule in the firewall rule base to ensure it is necessary and properly configured; IV) Test connectivity to hosts behind the firewall to identify any vulnerabilities; V) Ensure adequate change management, backup, logging, and monitoring procedures are in place for ongoing firewall maintenance.