SlideShare uma empresa Scribd logo
1 de 54
The nuts and bolts of Firewall
Analyzer
Firewall Analyzer training: Part I
Presenter
Can you hear me?
Can you see the presentation?
Please confirm by commenting in the chat panel
Agenda
• Why we need Firewall Analyzer?
• Installation of Firewall Analyzer.
• Configuring firewalls.
• Importing firewall logs.
• Classification of reports.
• Alerts & Notification.
Introduction
Why/What is Firewall Analyzer?
• Firewall Analyzer helps to analyze the logs generated by Firewalls using built-in syslog
server and produce various types of report.
Firewall Analyzer – Working
Architecture
Challenges
• Users complaining about Network Connectivity.
• Bandwidth utilization issues.
• Security Threats.
• Identifying & Preventing Security loop holes.
How Firewall Analyzer helpful to meet
Challenges
Firewall Analyzer is a Web based monitoring tool using which we can track the :
• URL activities.
• User based bandwidth.
• Secure networks before security threats arise.
• Meet the Compliance standards.
• Perform Security Audit.
• Do a capacity planning which will improve the performance of the network and
helpful to meet the challenges.
Installation of Firewall Analyzer
Installation requirements
1 GHZ Pentium
Dual Core
processor or
equivalent
6 GB of
RAM
50 GB of disk
space
PostgreSQL or MSSQL Windows or Linux
The disk space and RAM size requirements depend on the number of devices being analyzed and the
number of devices sending log information to Firewall Analyzer.
Device configuration
Configuration depends on vendor type
We have additional information for configuring different firewall types at
http://help.fwanalyzer.com/configure-firewall
Importing log files
After lauching the product for the first time, a screen will pop up, prompting you to import logs
After the initial import, you can always: Go to Settings > Firewall > System Click Import Log
and select which TXT or CSV file you'd like to import.
Setting up firewall logs
Where should I send syslogs?
Ports to be considered:
• web server port: 80
• Listener port—Port on which Firewall Analyzer
receives syslogs: 1514
• Database (Postgres): 13306 Ports are configurable
How do I send syslogs?
Ways of exporting syslogs to Firewall Analyzer:
1) Device configuration
2) Importing logs
Firewall Analyzer Functionalities
• Traffic analysis.
• Security analysis.
• Device management.
Traffic analysis
In Traffic analysis , we can analyze the traffic with
respect to :
• Top protocol.
• Top Applications.
• Hosts/users.
• Firewall rules.
• URL,Bytes sent,received.
Security analysis
In security analysis, we can find out :
• Who is trying to generate top
viruses.
• Attacks and spams.Which will
help us to take appropriate
actions.
• Protect the network from security
threats.
Device management
In Device management ,we can keep track of:
• Device configuration changes ,
• Meet our regulatory compliance requirements.
• Perform security audits.
Change Management
Dashboard overview
• Flexibility to create custom dashboards.
• One click option to change the default dashboard at login.
• Categorized for Traffic statistics, Security statistics,
Application, Attacks.
Custom Dashboard
Device Inventory
Classification of reports
• Traffic reports
• Security reports
• Admin Reports
• VPN reports
• URL Reports
• Internet reports
• Intranet reports
• Streaming and Chat Sites Reports
• Country Reports
• Inbound Outbound Reports
• Attack Reports
• Web Usage Reports
• Virus Reports and more.
Proxy Reports
• Live Reports
• Top Talkers Report
• Website Details Report
• Proxy Usage Report
• URL Categories Reports
• VPN Trend Reports
Search Reports
It allows you to search from the Raw Firewall Logs and aggregated logs database.
• Aggregated Search can be used if you want to
search from the aggregated logs database.
• Raw Search can be used if you want to from the raw
firewall logs.
Alarms and Notifications
• An alarm is triggered whenever an event matching a specific criteria is generated.
An alarm profile lets you define such specific criteria, and also notify you by email,
when the corresponding alarm is triggered.
Types of Alarms:
• Normal
• Anomaly
• Bandwidth
Alert use cases
Use case #1
Need an alert when DDoS attacks happens five times within 10 minutes.
Follow these steps:
• Select the Normal Alert profile.
• Set the criteria as attack contains DDoS.
• Set the threshold to five events in ten
minutes.
Use case #2
Need to be notified when a user suresh visits facebook during working hours and
consumes Total traffic of 1 GB in a day.
Follow these steps:
• Select the Anomaly Alert profile.
• Set the criteria.
• Set the threshold value.
Use case #3
Need to be notified when an Inbound traffic for Identity interface reaches 10 GB.
Follow these steps:
• Select the Bandwidth Alert profile.
• Set the criteria.
• Set the threshold value.
Settings
The settings section allows you to configure several system settings from the server running
Firewall Analyzer.
Types of Settings:
• Firewall Settings
• System Settings
• Administration Settings
Firewall Settings
Using Firewall Settings you can configure the following:
• Syslog Server Settings: To configure syslog servers to receive logs at different ports.
• Checkpoint Firewall Settings: To configure settings specific to Check Point firewalls.
• Device Rule: To view Used, Unused rules, Security Audit and Change Management
details of a Firewall device.
• Diagnose Firewall Connections: To monitor and analyze live connections through the
Firewall.
• Firewall Availability Alert: To configure to trigger alerts if there was no logs from
Firewalls for a specific period of time.
• Device Details: To view details of logs received from each device.
System Settings
Using System Settings you can configure the following,
• Import log Files: Used to import log files from the local machine or by FTP.
• Protocol Groups: For managing protocol groups .
• Archived Files: For configuring archiving intervals, or load an archived file into the
database.
• Schedule Listing: Contains the list of reports scheduled.
• Mail Server Settings: For configuring the mail server for reports & alerts.
• Configure Dns: For resolving DNS globally for all the reports.
• Customize Report: Customize the device reports to be shown in Device list.
• Database Console: To execute queries for trouble shooting.
Admin Settings
Using Admin Settings you can configure the following,
• Intranet Settings: To configure intranets to identify internal and external traffic.
• User Management: Used to add, edit, or delete users in Firewall Analyzer .
• External Authentication Setting: To configure Active Directory and RADIUS server
authentication for FWA web login.
• License Management: Manage(License)/ Un-manage(License)/Deleting the
devices.
• User/Hostname to IP mapping: For mapping the users with the IP address using
DHCP or proxy logs.
• Data Storage Options: For configuring data storage duration for the database and
archive of Firewall Analyzer.
• Rebranding FWA Web Client: To customize Firewall Analyzer Web Client.
Support for more than 50 vendors
Firewall Analyzer is a technology partner with :
Technology partnerships
What our partner has to say about us:
"This integration offers administrators an incredible amount of visibility into firewall systems. Application control
goes deeper with detailed usage reports, while change management, security reporting, event trends, and a detailed
compliance report for firewall configuration creates an immediate ROI for customers to present back to their
stakeholders." — Ben Oster, WatchGuard
Need more help?
youtube.com/opmanagertechvideos
help.fwanalyzer.com
forums.manageengine.com/fwanalyzer
fwanalyzer-support@manageengine.com
+1 (888) 720-9500 / +1 (408) 916 - 9595
Upcoming training on May 3rd
Understanding firewall policies and their effectiveness in defending against
network threats.
During this training, you'll learn about:
• Firewall policies.
• Optimizing firewall policies.
• Policy classification reports.
Q&A
Question 1
Live syslog viewer & Wireshark shows syslogs but device not
added. How to fix this?
• Windows Firewall might be enabled.
• Un-supported logs received.
• Time-stamp may not be enabled in case of Cisco Supported device, but
log-format may be changed in version specific vendor device.
Question 2
How to get bandwidth usage reports for specific sub-net (OR) user
based bandwidth?
Add a report filter with CIDR/User specific and create a New-Report Profile to achieve
it.
Question 3
Why Traffic bytes are shown as 0 MB? How to see traffic transaction details less than MB?
Bytes values shown in all reports are in MB. In case of low traffic value, it will be shown as 0 MB in
Graphs &Tables. If you go to Raw-Search, you will get full conversation data with exact byte value
received by application.
Question 4
Where to view VPN user transaction details?
VPN user specific intermittent traffic can be shown from Raw-Search, but normal VPN reports will not show
theses details.
Question 5
VPN user specific session start and end time can be tracked?
Yes, "VPN User Session Time Report" listed in Report-Profile addition will satisfy this need.
Question 6
Unable to see the Application/Virus reports report for Cisco devices in the
product(Firewall Analyzer) Web-UI?
Syslog doesn't give application data, so FWA won't populate.
Question 7
How to get user list for specific url access?
URL value give in Raw-Search will provide required results.
Question 8
How much HDD is required to manage number of firewalls?
HDD space occupancy completely depends on the number of logs received and Data storage
options, based on the following settings HDD space will be allocated accordingly.
Thank you!
fwanalyzer-support@manageengine.com

Mais conteúdo relacionado

Mais procurados

Free OpManager training Part 3 - Monitoring Network Performance and Network Maps
Free OpManager training Part 3 - Monitoring Network Performance and Network MapsFree OpManager training Part 3 - Monitoring Network Performance and Network Maps
Free OpManager training Part 3 - Monitoring Network Performance and Network MapsManageEngine, Zoho Corporation
 
Free NetFlow Analyzer training - Getting the initial settings right
Free NetFlow Analyzer training - Getting the initial settings rightFree NetFlow Analyzer training - Getting the initial settings right
Free NetFlow Analyzer training - Getting the initial settings rightManageEngine, Zoho Corporation
 
Configlets, compliance, RBAC & reports - Network Configuration Manager
Configlets, compliance, RBAC & reports - Network Configuration ManagerConfiglets, compliance, RBAC & reports - Network Configuration Manager
Configlets, compliance, RBAC & reports - Network Configuration ManagerManageEngine, Zoho Corporation
 
Firewall Penetration Testing
Firewall Penetration TestingFirewall Penetration Testing
Firewall Penetration TestingChirag Jain
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point FirewallsBen Rothke
 
OpManager training - Device discovery and classification.
OpManager training - Device discovery and classification.OpManager training - Device discovery and classification.
OpManager training - Device discovery and classification.ManageEngine, Zoho Corporation
 
Free OpManager training Part1- Discovery and classification season#3
Free OpManager training Part1- Discovery and classification season#3Free OpManager training Part1- Discovery and classification season#3
Free OpManager training Part1- Discovery and classification season#3ManageEngine, Zoho Corporation
 
How to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall AuditHow to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall Auditkeyuradmin
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor PresentationNafaâ TAYACHI
 
Free Netflow analyzer training - diagnosing_and_troubleshooting
Free Netflow analyzer  training - diagnosing_and_troubleshootingFree Netflow analyzer  training - diagnosing_and_troubleshooting
Free Netflow analyzer training - diagnosing_and_troubleshootingManageEngine, Zoho Corporation
 
OpManager Major Features
OpManager Major FeaturesOpManager Major Features
OpManager Major Featurestecanody
 
Server and application monitoring webinars [Applications Manager] - Part 4
Server and application monitoring webinars [Applications Manager] - Part 4Server and application monitoring webinars [Applications Manager] - Part 4
Server and application monitoring webinars [Applications Manager] - Part 4ManageEngine, Zoho Corporation
 

Mais procurados (20)

Opmanager technical overview
Opmanager technical overviewOpmanager technical overview
Opmanager technical overview
 
Free OpManager training Part 3 - Monitoring Network Performance and Network Maps
Free OpManager training Part 3 - Monitoring Network Performance and Network MapsFree OpManager training Part 3 - Monitoring Network Performance and Network Maps
Free OpManager training Part 3 - Monitoring Network Performance and Network Maps
 
Free OpManager training_ Part 2-server monitoring
Free OpManager training_ Part 2-server monitoringFree OpManager training_ Part 2-server monitoring
Free OpManager training_ Part 2-server monitoring
 
Free training on NCM - Discovery & Disaster recovery
Free training on NCM - Discovery & Disaster recovery Free training on NCM - Discovery & Disaster recovery
Free training on NCM - Discovery & Disaster recovery
 
Free NetFlow Analyzer training - Getting the initial settings right
Free NetFlow Analyzer training - Getting the initial settings rightFree NetFlow Analyzer training - Getting the initial settings right
Free NetFlow Analyzer training - Getting the initial settings right
 
Network fault management and IT automation training
Network fault management and IT automation trainingNetwork fault management and IT automation training
Network fault management and IT automation training
 
Configlets, compliance, RBAC & reports - Network Configuration Manager
Configlets, compliance, RBAC & reports - Network Configuration ManagerConfiglets, compliance, RBAC & reports - Network Configuration Manager
Configlets, compliance, RBAC & reports - Network Configuration Manager
 
Firewall Penetration Testing
Firewall Penetration TestingFirewall Penetration Testing
Firewall Penetration Testing
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 
Network and server performance monitoring training
Network and server performance monitoring trainingNetwork and server performance monitoring training
Network and server performance monitoring training
 
OpManager training - Device discovery and classification.
OpManager training - Device discovery and classification.OpManager training - Device discovery and classification.
OpManager training - Device discovery and classification.
 
Free OpManager training Part1- Discovery and classification season#3
Free OpManager training Part1- Discovery and classification season#3Free OpManager training Part1- Discovery and classification season#3
Free OpManager training Part1- Discovery and classification season#3
 
Proof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManagerProof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManager
 
Overview OpManager
Overview OpManagerOverview OpManager
Overview OpManager
 
How to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall AuditHow to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall Audit
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor Presentation
 
Free Netflow analyzer training - diagnosing_and_troubleshooting
Free Netflow analyzer  training - diagnosing_and_troubleshootingFree Netflow analyzer  training - diagnosing_and_troubleshooting
Free Netflow analyzer training - diagnosing_and_troubleshooting
 
OpManager Major Features
OpManager Major FeaturesOpManager Major Features
OpManager Major Features
 
OpManager Technical Overview
OpManager Technical OverviewOpManager Technical Overview
OpManager Technical Overview
 
Server and application monitoring webinars [Applications Manager] - Part 4
Server and application monitoring webinars [Applications Manager] - Part 4Server and application monitoring webinars [Applications Manager] - Part 4
Server and application monitoring webinars [Applications Manager] - Part 4
 

Semelhante a Copy of learn_the_art_of_firewall_security(1)

NetFlow Analyzer Training Part I: Getting the initial settings right
NetFlow Analyzer Training Part I: Getting the initial settings rightNetFlow Analyzer Training Part I: Getting the initial settings right
NetFlow Analyzer Training Part I: Getting the initial settings rightManageEngine, Zoho Corporation
 
Export flows, group traffic, map application traffic and more: NetFlow Analyz...
Export flows, group traffic, map application traffic and more: NetFlow Analyz...Export flows, group traffic, map application traffic and more: NetFlow Analyz...
Export flows, group traffic, map application traffic and more: NetFlow Analyz...ManageEngine, Zoho Corporation
 
11 palo alto user-id concepts
11 palo alto user-id concepts11 palo alto user-id concepts
11 palo alto user-id conceptsMostafa El Lathy
 
[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and ITSite24x7
 
5 ways you can strengthen and secure your network infrastructure with Firewal...
5 ways you can strengthen and secure your network infrastructure with Firewal...5 ways you can strengthen and secure your network infrastructure with Firewal...
5 ways you can strengthen and secure your network infrastructure with Firewal...ManageEngine, Zoho Corporation
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewallsDivya Jyoti
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11Waqas Ahmed Nawaz
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfThangDang53
 
Webinar NETGEAR - Insight, le funzionalita' per il Networking Management
Webinar NETGEAR - Insight, le funzionalita' per il Networking ManagementWebinar NETGEAR - Insight, le funzionalita' per il Networking Management
Webinar NETGEAR - Insight, le funzionalita' per il Networking ManagementNetgear Italia
 
Observability for Integration Using WSO2 Enterprise Integrator
Observability for Integration Using WSO2 Enterprise IntegratorObservability for Integration Using WSO2 Enterprise Integrator
Observability for Integration Using WSO2 Enterprise IntegratorWSO2
 
Net Rounds Product Sheet
Net Rounds Product SheetNet Rounds Product Sheet
Net Rounds Product Sheetguest3f034b
 
Cisco umbrella youtube
Cisco umbrella youtubeCisco umbrella youtube
Cisco umbrella youtubeDhruv Sharma
 
Dncybersecurity
DncybersecurityDncybersecurity
DncybersecurityAnne Starr
 
Nagios, Getting Started.
Nagios, Getting Started.Nagios, Getting Started.
Nagios, Getting Started.Hitesh Bhatia
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data planeNetProtocol Xpert
 
Brkcrt 2214
Brkcrt 2214Brkcrt 2214
Brkcrt 2214Mac An
 

Semelhante a Copy of learn_the_art_of_firewall_security(1) (20)

Firewall Analyzer - Middle East Workshop
Firewall Analyzer - Middle East WorkshopFirewall Analyzer - Middle East Workshop
Firewall Analyzer - Middle East Workshop
 
whats-new_Fireware_v11-10
whats-new_Fireware_v11-10whats-new_Fireware_v11-10
whats-new_Fireware_v11-10
 
Tripwire ppt
Tripwire pptTripwire ppt
Tripwire ppt
 
NetFlow Analyzer Training Part I: Getting the initial settings right
NetFlow Analyzer Training Part I: Getting the initial settings rightNetFlow Analyzer Training Part I: Getting the initial settings right
NetFlow Analyzer Training Part I: Getting the initial settings right
 
Export flows, group traffic, map application traffic and more: NetFlow Analyz...
Export flows, group traffic, map application traffic and more: NetFlow Analyz...Export flows, group traffic, map application traffic and more: NetFlow Analyz...
Export flows, group traffic, map application traffic and more: NetFlow Analyz...
 
11 palo alto user-id concepts
11 palo alto user-id concepts11 palo alto user-id concepts
11 palo alto user-id concepts
 
[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT[old] Network Performance Monitoring for DevOps and IT
[old] Network Performance Monitoring for DevOps and IT
 
5 ways you can strengthen and secure your network infrastructure with Firewal...
5 ways you can strengthen and secure your network infrastructure with Firewal...5 ways you can strengthen and secure your network infrastructure with Firewal...
5 ways you can strengthen and secure your network infrastructure with Firewal...
 
Introduction to firewalls
Introduction to firewallsIntroduction to firewalls
Introduction to firewalls
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 11
 
ITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdfITN6_Instructor_Materials_Chapter11.pdf
ITN6_Instructor_Materials_Chapter11.pdf
 
Webinar NETGEAR - Insight, le funzionalita' per il Networking Management
Webinar NETGEAR - Insight, le funzionalita' per il Networking ManagementWebinar NETGEAR - Insight, le funzionalita' per il Networking Management
Webinar NETGEAR - Insight, le funzionalita' per il Networking Management
 
Observability for Integration Using WSO2 Enterprise Integrator
Observability for Integration Using WSO2 Enterprise IntegratorObservability for Integration Using WSO2 Enterprise Integrator
Observability for Integration Using WSO2 Enterprise Integrator
 
Net Rounds Product Sheet
Net Rounds Product SheetNet Rounds Product Sheet
Net Rounds Product Sheet
 
Cisco umbrella youtube
Cisco umbrella youtubeCisco umbrella youtube
Cisco umbrella youtube
 
INT_Ch17.pptx
INT_Ch17.pptxINT_Ch17.pptx
INT_Ch17.pptx
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
Nagios, Getting Started.
Nagios, Getting Started.Nagios, Getting Started.
Nagios, Getting Started.
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data plane
 
Brkcrt 2214
Brkcrt 2214Brkcrt 2214
Brkcrt 2214
 

Mais de ManageEngine, Zoho Corporation

NetFlow Analyzer Free Training Series Part I - May 2020
NetFlow Analyzer Free Training Series Part I - May 2020NetFlow Analyzer Free Training Series Part I - May 2020
NetFlow Analyzer Free Training Series Part I - May 2020ManageEngine, Zoho Corporation
 
Overcome real-time server and VM monitoring challenges
Overcome real-time server and VM monitoring challengesOvercome real-time server and VM monitoring challenges
Overcome real-time server and VM monitoring challengesManageEngine, Zoho Corporation
 
Modernizing Cloud and Hyperconverged Infrastructure monitoring
Modernizing Cloud and Hyperconverged Infrastructure monitoringModernizing Cloud and Hyperconverged Infrastructure monitoring
Modernizing Cloud and Hyperconverged Infrastructure monitoringManageEngine, Zoho Corporation
 
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020ManageEngine, Zoho Corporation
 
From web interface to the database:Monitor all that matters
From web interface to the database:Monitor all that mattersFrom web interface to the database:Monitor all that matters
From web interface to the database:Monitor all that mattersManageEngine, Zoho Corporation
 
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - ESTNetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - ESTManageEngine, Zoho Corporation
 
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMTNetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMTManageEngine, Zoho Corporation
 
Monitoring cloud applications and hyperconverged infrastructure
Monitoring cloud applications and hyperconverged infrastructureMonitoring cloud applications and hyperconverged infrastructure
Monitoring cloud applications and hyperconverged infrastructureManageEngine, Zoho Corporation
 
Visibility-from web application interface to the database
Visibility-from web application interface to the databaseVisibility-from web application interface to the database
Visibility-from web application interface to the databaseManageEngine, Zoho Corporation
 
Free OpManager training Part 4 - Monitoring Network Performance and Network Maps
Free OpManager training Part 4 - Monitoring Network Performance and Network MapsFree OpManager training Part 4 - Monitoring Network Performance and Network Maps
Free OpManager training Part 4 - Monitoring Network Performance and Network MapsManageEngine, Zoho Corporation
 

Mais de ManageEngine, Zoho Corporation (20)

Create seamless customer experiences
Create seamless customer experiencesCreate seamless customer experiences
Create seamless customer experiences
 
From web interface to database: Monitor what matters
From web interface to database: Monitor what mattersFrom web interface to database: Monitor what matters
From web interface to database: Monitor what matters
 
NetFlow Analyzer Free Training Series Part I - May 2020
NetFlow Analyzer Free Training Series Part I - May 2020NetFlow Analyzer Free Training Series Part I - May 2020
NetFlow Analyzer Free Training Series Part I - May 2020
 
Overcome real-time server and VM monitoring challenges
Overcome real-time server and VM monitoring challengesOvercome real-time server and VM monitoring challenges
Overcome real-time server and VM monitoring challenges
 
Modernizing Cloud and Hyperconverged Infrastructure monitoring
Modernizing Cloud and Hyperconverged Infrastructure monitoringModernizing Cloud and Hyperconverged Infrastructure monitoring
Modernizing Cloud and Hyperconverged Infrastructure monitoring
 
Deliver seamless digital experience
Deliver seamless digital experienceDeliver seamless digital experience
Deliver seamless digital experience
 
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
Free NetFlow Analyzer training Season 1 Part 2 - Feb 2020
 
From web interface to the database:Monitor all that matters
From web interface to the database:Monitor all that mattersFrom web interface to the database:Monitor all that matters
From web interface to the database:Monitor all that matters
 
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - ESTNetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - EST
 
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMTNetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
NetFlow Analyzer Training Season 1 Part 1 - Feb 2020 - GMT
 
NetFlow Analyzer Product Overview
NetFlow Analyzer Product OverviewNetFlow Analyzer Product Overview
NetFlow Analyzer Product Overview
 
Monitoring cloud applications and hyperconverged infrastructure
Monitoring cloud applications and hyperconverged infrastructureMonitoring cloud applications and hyperconverged infrastructure
Monitoring cloud applications and hyperconverged infrastructure
 
Building the right website monitoring strategy
Building the right website monitoring strategyBuilding the right website monitoring strategy
Building the right website monitoring strategy
 
Unlock the value of your big data infrastructure
Unlock the value of your big data infrastructureUnlock the value of your big data infrastructure
Unlock the value of your big data infrastructure
 
Key to optimal end user experience
Key to optimal end user experienceKey to optimal end user experience
Key to optimal end user experience
 
Monitoring cloud applications and containers
Monitoring cloud applications and containersMonitoring cloud applications and containers
Monitoring cloud applications and containers
 
implementing the right website monitoring strategy
 implementing the right website monitoring strategy implementing the right website monitoring strategy
implementing the right website monitoring strategy
 
Big data and non relational database
Big data and non relational databaseBig data and non relational database
Big data and non relational database
 
Visibility-from web application interface to the database
Visibility-from web application interface to the databaseVisibility-from web application interface to the database
Visibility-from web application interface to the database
 
Free OpManager training Part 4 - Monitoring Network Performance and Network Maps
Free OpManager training Part 4 - Monitoring Network Performance and Network MapsFree OpManager training Part 4 - Monitoring Network Performance and Network Maps
Free OpManager training Part 4 - Monitoring Network Performance and Network Maps
 

Último

Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfkalichargn70th171
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptrcbcrtm
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 

Último (20)

Odoo Development Company in India | Devintelle Consulting Service
Odoo Development Company in India | Devintelle Consulting ServiceOdoo Development Company in India | Devintelle Consulting Service
Odoo Development Company in India | Devintelle Consulting Service
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.ppt
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 

Copy of learn_the_art_of_firewall_security(1)

  • 1. The nuts and bolts of Firewall Analyzer Firewall Analyzer training: Part I
  • 3. Can you hear me? Can you see the presentation? Please confirm by commenting in the chat panel
  • 4. Agenda • Why we need Firewall Analyzer? • Installation of Firewall Analyzer. • Configuring firewalls. • Importing firewall logs. • Classification of reports. • Alerts & Notification.
  • 5. Introduction Why/What is Firewall Analyzer? • Firewall Analyzer helps to analyze the logs generated by Firewalls using built-in syslog server and produce various types of report.
  • 6. Firewall Analyzer – Working Architecture
  • 7. Challenges • Users complaining about Network Connectivity. • Bandwidth utilization issues. • Security Threats. • Identifying & Preventing Security loop holes.
  • 8. How Firewall Analyzer helpful to meet Challenges Firewall Analyzer is a Web based monitoring tool using which we can track the : • URL activities. • User based bandwidth. • Secure networks before security threats arise. • Meet the Compliance standards. • Perform Security Audit. • Do a capacity planning which will improve the performance of the network and helpful to meet the challenges.
  • 10. Installation requirements 1 GHZ Pentium Dual Core processor or equivalent 6 GB of RAM 50 GB of disk space PostgreSQL or MSSQL Windows or Linux The disk space and RAM size requirements depend on the number of devices being analyzed and the number of devices sending log information to Firewall Analyzer.
  • 11. Device configuration Configuration depends on vendor type We have additional information for configuring different firewall types at http://help.fwanalyzer.com/configure-firewall
  • 12. Importing log files After lauching the product for the first time, a screen will pop up, prompting you to import logs After the initial import, you can always: Go to Settings > Firewall > System Click Import Log and select which TXT or CSV file you'd like to import.
  • 13. Setting up firewall logs Where should I send syslogs? Ports to be considered: • web server port: 80 • Listener port—Port on which Firewall Analyzer receives syslogs: 1514 • Database (Postgres): 13306 Ports are configurable How do I send syslogs? Ways of exporting syslogs to Firewall Analyzer: 1) Device configuration 2) Importing logs
  • 14. Firewall Analyzer Functionalities • Traffic analysis. • Security analysis. • Device management.
  • 15. Traffic analysis In Traffic analysis , we can analyze the traffic with respect to : • Top protocol. • Top Applications. • Hosts/users. • Firewall rules. • URL,Bytes sent,received.
  • 16. Security analysis In security analysis, we can find out : • Who is trying to generate top viruses. • Attacks and spams.Which will help us to take appropriate actions. • Protect the network from security threats.
  • 17. Device management In Device management ,we can keep track of: • Device configuration changes , • Meet our regulatory compliance requirements. • Perform security audits.
  • 18.
  • 20. Dashboard overview • Flexibility to create custom dashboards. • One click option to change the default dashboard at login. • Categorized for Traffic statistics, Security statistics, Application, Attacks.
  • 21.
  • 24. Classification of reports • Traffic reports • Security reports • Admin Reports • VPN reports • URL Reports • Internet reports • Intranet reports • Streaming and Chat Sites Reports • Country Reports • Inbound Outbound Reports • Attack Reports • Web Usage Reports • Virus Reports and more.
  • 25.
  • 26. Proxy Reports • Live Reports • Top Talkers Report • Website Details Report • Proxy Usage Report • URL Categories Reports • VPN Trend Reports
  • 27.
  • 28. Search Reports It allows you to search from the Raw Firewall Logs and aggregated logs database. • Aggregated Search can be used if you want to search from the aggregated logs database. • Raw Search can be used if you want to from the raw firewall logs.
  • 29. Alarms and Notifications • An alarm is triggered whenever an event matching a specific criteria is generated. An alarm profile lets you define such specific criteria, and also notify you by email, when the corresponding alarm is triggered. Types of Alarms: • Normal • Anomaly • Bandwidth
  • 31. Use case #1 Need an alert when DDoS attacks happens five times within 10 minutes. Follow these steps: • Select the Normal Alert profile. • Set the criteria as attack contains DDoS. • Set the threshold to five events in ten minutes.
  • 32. Use case #2 Need to be notified when a user suresh visits facebook during working hours and consumes Total traffic of 1 GB in a day. Follow these steps: • Select the Anomaly Alert profile. • Set the criteria. • Set the threshold value.
  • 33. Use case #3 Need to be notified when an Inbound traffic for Identity interface reaches 10 GB. Follow these steps: • Select the Bandwidth Alert profile. • Set the criteria. • Set the threshold value.
  • 34. Settings The settings section allows you to configure several system settings from the server running Firewall Analyzer. Types of Settings: • Firewall Settings • System Settings • Administration Settings
  • 35. Firewall Settings Using Firewall Settings you can configure the following: • Syslog Server Settings: To configure syslog servers to receive logs at different ports. • Checkpoint Firewall Settings: To configure settings specific to Check Point firewalls. • Device Rule: To view Used, Unused rules, Security Audit and Change Management details of a Firewall device. • Diagnose Firewall Connections: To monitor and analyze live connections through the Firewall. • Firewall Availability Alert: To configure to trigger alerts if there was no logs from Firewalls for a specific period of time. • Device Details: To view details of logs received from each device.
  • 36.
  • 37. System Settings Using System Settings you can configure the following, • Import log Files: Used to import log files from the local machine or by FTP. • Protocol Groups: For managing protocol groups . • Archived Files: For configuring archiving intervals, or load an archived file into the database. • Schedule Listing: Contains the list of reports scheduled. • Mail Server Settings: For configuring the mail server for reports & alerts. • Configure Dns: For resolving DNS globally for all the reports. • Customize Report: Customize the device reports to be shown in Device list. • Database Console: To execute queries for trouble shooting.
  • 38.
  • 39. Admin Settings Using Admin Settings you can configure the following, • Intranet Settings: To configure intranets to identify internal and external traffic. • User Management: Used to add, edit, or delete users in Firewall Analyzer . • External Authentication Setting: To configure Active Directory and RADIUS server authentication for FWA web login. • License Management: Manage(License)/ Un-manage(License)/Deleting the devices. • User/Hostname to IP mapping: For mapping the users with the IP address using DHCP or proxy logs. • Data Storage Options: For configuring data storage duration for the database and archive of Firewall Analyzer. • Rebranding FWA Web Client: To customize Firewall Analyzer Web Client.
  • 40.
  • 41. Support for more than 50 vendors
  • 42. Firewall Analyzer is a technology partner with : Technology partnerships What our partner has to say about us: "This integration offers administrators an incredible amount of visibility into firewall systems. Application control goes deeper with detailed usage reports, while change management, security reporting, event trends, and a detailed compliance report for firewall configuration creates an immediate ROI for customers to present back to their stakeholders." — Ben Oster, WatchGuard
  • 44. Upcoming training on May 3rd Understanding firewall policies and their effectiveness in defending against network threats. During this training, you'll learn about: • Firewall policies. • Optimizing firewall policies. • Policy classification reports.
  • 45. Q&A
  • 46. Question 1 Live syslog viewer & Wireshark shows syslogs but device not added. How to fix this? • Windows Firewall might be enabled. • Un-supported logs received. • Time-stamp may not be enabled in case of Cisco Supported device, but log-format may be changed in version specific vendor device.
  • 47. Question 2 How to get bandwidth usage reports for specific sub-net (OR) user based bandwidth? Add a report filter with CIDR/User specific and create a New-Report Profile to achieve it.
  • 48. Question 3 Why Traffic bytes are shown as 0 MB? How to see traffic transaction details less than MB? Bytes values shown in all reports are in MB. In case of low traffic value, it will be shown as 0 MB in Graphs &Tables. If you go to Raw-Search, you will get full conversation data with exact byte value received by application.
  • 49. Question 4 Where to view VPN user transaction details? VPN user specific intermittent traffic can be shown from Raw-Search, but normal VPN reports will not show theses details.
  • 50. Question 5 VPN user specific session start and end time can be tracked? Yes, "VPN User Session Time Report" listed in Report-Profile addition will satisfy this need.
  • 51. Question 6 Unable to see the Application/Virus reports report for Cisco devices in the product(Firewall Analyzer) Web-UI? Syslog doesn't give application data, so FWA won't populate.
  • 52. Question 7 How to get user list for specific url access? URL value give in Raw-Search will provide required results.
  • 53. Question 8 How much HDD is required to manage number of firewalls? HDD space occupancy completely depends on the number of logs received and Data storage options, based on the following settings HDD space will be allocated accordingly.