Configure Firewall Credentials to Fetch Configuration and Rules


In a Firewall device, there could be numerous rules/access-list defined to secure the network from external attacks. Out of the rules/access-list configured, there could be certain rules which would be most used and certain which are least used or never used. Firewall Analyzer captures the most used rules in the Top Used Rules as they would be available in the logs generated by Firewall. But, to get the  Unused Rules, one needs to configure the Firewall Analyzer to fetch the complete rules from the device. Once, Firewall Analyzer fetches the complete rules configured in the Firewall, it can provide the Unused Rules view.

 To view Unused Firewall Rules, configure the Firewall Analyzer by following the steps given below:

  • In the Firewall Analyzer web client, select the Settings tab.
  • In Settings screen, select the Firewall > Firewall Server > Device Rule link. Device Rule Info page appears.

Device Rule Info

 Devices Details

After entering and saving the Device Info values through the Firewall Analyzer GUI, the device, with details to fetch rules, is listed in the Device Details table. The details of the columns of the Device Details table are:

Device DetailsDescription
StatusThe status of fetching device rules/access control of the Firewall device
Devices NameThe names of the devices for which the rules will be fetched
Virtual FWsFor multi (vdom/context) Firewalls, this will display the number of vdoms/contexts associated to this specific device rule. Clicking on the count will show the details of the vdoms/contexts individually. Refer the screen shot below.
Security AuditThe configuration changes of the Firewall devices are reported. The report is available on clicking the link and the link text shows the time the configuration change report was generated. You can instantly fetch the current configuration change report by clicking the icon.
Config ChangesThe configuration changes of the Firewall devices are reported. The report is available on clicking the link and the link text shows the time the configuration change report was generated. You can instantly fetch the current configuration change report by clicking the icon.
Last Update OnThe time when the rules of the device were updated last.
On Demand
  • Generate Configuration Analysis report
  • Generate Security Analysis report
  • Fetch rules
  • Export configuration to file
ActionAn icon to edit the details of the rules fetching info of the device. Click icon to edit the device info.

Virtual Firewalls

  • When you click the Virtual FWs number displayed in the Device Details list you will see the details of the virtual domains in a pop-up window which will provide you with all the options

Add Device Info

  1. Click the Add Device Info link to add the device information to fetch the rules and configurations using Telnet or SSH. The Enter Device Details screen opens up.
  2. Select the Firewall device in the Select Device drop down list.
  3. In the Fetch Rules/Config drop down list, there will be two options to fetch rules and configurations
    1. From Device
    2. From File

Select the option as per your requirement.

Next, there will be two tabs, Credentials and Choose Report.

The Credentials tab

You can configure the individual device credentials to fetch the rules and configuration from the device or you can create a common profile of device credential which can be used for a group of devices to fetch rules.

Note:

Fetching the rules directly from the device is supported for the following devices only:

  • Cisco
  • Fortigate
  • Netscreen
  • Juniper SRX
  • PaloAlto
  • Sonicwall
  • WatchGuard

For the rest of the devices, please use the Fetch Rules/Config > From File option.

 

Fetch Rules/Config > From Device

  1. Select the protocol (Telnet or SSH) in the Protocol drop down list.
  2. Select the profile in the Use Profile drop down list. If there is no profile available or you want to create and use a new profile, click New Profile link besides the combo box.
  3. Enter the Device Info. The Device Info has been split into two sections:
  • Primary Info - deal with parameters that are necessary to establish communication with the device. Details such as Login Name, Password, Prompt, Enable UserName, Enable Password and Enable Prompt are classified as basic details.
  • Secondary Info - certain parameters usually take standard values. All such parameters have been classified under 'Secondary Info'. Port, login prompt, enable user prompt, password prompt, enable password prompt values are usually assigned with certain Standard Values by default. Such standard values have been filled for these parameters. Most of the devices would work well with these values and you need not edit these details unless you want to provide different set of details.

Primary Info

Device Info

Description

Login Name

While establishing connection with a device, if the device asks for a Login Name, set a value for this parameter. This parameter is Optional.

Password

To set the Password for accessing the device.

Admin PrivilegeWhether administrator privilege is required for device access. Select Yes or No
Banner PromptThe prompt that appears for the banner
Banner InputThe banner message

Prompt

The prompt that appears after successful login.

Enable CommandThe command to fetch the rule and configurations

Enable UserName

When entering into privileged mode, some devices require UserName to be entered. Provide the username if prompted; otherwise leave this field empty.

Enable Password

This is for entering into privileged mode to perform configuration operations like backup/upload. This parameter is mandatory.

Enable Prompt

This is the prompt that will appear after going into enable mode.

 

Note:

Both Primary and Secondary credentials (Login Name and Password) of the Firewalls are encrypted and stored in the Firewall Analyzer.

Secondary Info

Click the link Secondary Info to view/enter values for these parameters. All the parameters are usually assigned with certain Standard Values by default. Such standard values have been filled for these parameters. Most of the devices would work well with these values and you need not edit these details unless you want to provide different set of details.

Device Info

Description

Port (Telnet/SSH)

Port number of Telnet/SSH - 23 (for Telnet) and 22 (for SSH) by default.

Login Prompt

The text/symbol that appears on the console to get the typed login name is referred as login prompt. For example, Login:

Password Prompt

The text displayed on the console when asking for password. For example, Password:

Enable User Prompt

The text displayed on the console when asking for Enable UserName. For example, UserName:

Enable Password Prompt

The text displayed on the console when asking for password. For example, Password:

IP AddressIP Address of the Firewall device to which the Firewall Analyzer will connect through FTP. See Note below.
Command

The command to be executed, to fetch the Firewall rules is displayed in the Command field.

 

  1. Click Test button, to test the validity of the device info.

The Choose Report tab

  1. Select Schedule > Fetch Rules check box to fetch the rules from the Firewall device.
    If commands are not available to fetch rules from the device, Choose File button automatically appears besides the select item. If the file is not yet selected, 'No file chosen' message appears besides the button. If it is not supported for the particular device [Not Supported] messages appears besides the select item.
  2. Select Schedule > Generate Security Audit report check box to generate Firewall Security Audit report. If commands are not available to fetch configurations from the device, Choose File button automatically appears besides the select item. If the file is not yet selected, 'No file chosen' message appears besides the button. If it is not supported for the particular device [Not Supported] messages appears besides the select item.
  3. Select the Want to Schedule the Rules/Config fetching to schedule the rules and/or configuration fetching using the Every <1 to 31> day(s) @ <0 to 23> Hrs <0 to 50> Min. (For example: If you configure like Every 10 day(s) @ 2 Hrs 30 Min, the rules and/or configuration will be fetched from the device, every 10 days at 02:30 AM).
Note:

In the Fetch Rules from the device section, if the following message appears: 'Unable to generate compliance report. Reason: Failed to locate Nipper. Click here to enable it'. Carry out the procedure given at the end of the document.

 

  1. Select Report > Generate Change Management Report check box to generate configuration change management report. In this section, Notification Options and Scheduling Options, for the configuration changes of the device, are available. If commands are not available to fetch configurations from the device, there will not be any Change Management report.
  2. Under the Notification Options, enter the Email address of the user(s), who need to be informed via Email when any configuration change happens, in the Mail To: text box. Click the link Click here to configure to configure mail server for Firewall Analyzer, enter the cellular phone number of the user(s), who need to be informed via SMS when any configuration change happens, in the SMS To: text box. Click the link Click here to configure to configure SMS server for Firewall Analyzer.
  3. Under the Scheduling Options, enter the Email address of the user(s), to whom the report to be sent via em ail when a scheduled configuration change report is generated, in the Mail To: text box. Click the link Click here to configure to configure mail server for Firewall Analyzer. Select the schedule for report generation using the Get Report for Every <1 to 31> day(s) @ <0 to 23> Hrs <0 to 50> Min. (For example: If you configure like Every 10 day(s) @ 2 Hrs 30 Min, the reports will be generated for the device, every 10 days at 02:30 AM), For the <Previous Week, Last 7 Days, Previous Month, Last 30 Days> for the selected duration. Select the report format to be sent via em ail using the PDF, CSV radio buttons.
  4. Click Save button to apply the values.

 

Note:

If the Firewall Analyzer is not receiving the logs directly from the Firewall device (i.e., the logs are received from a log forwarder tool), to fetch the rules from the Firewall device, configure the IP Address of the actual Firewall. Configure the IP Address, using Secondary Info > IP Address field.

 

Note:

Generating Change Management Report is supported for the following devices:

  • Cisco
  • Fortigate
  • Netscreen
  • Juniper SRX
  • PaloAlto
  • Sonicwall
  • WatchGuard

 

Note:

Getting Rules/ Configuration Information from the individual virtual Firewalls (vdom/context)

  • Add Device Info menu supports fetching the rules/configurations for the Firewall devices. It lists only the physical devices in the Select Device drop down list. It does not distinguish between vdom/context enabled Firewall and normal Firewall device. By default, both the vdom/context Firewall (if any) and the physical Firewall rules and configurations are fetched.
  • If you want to fetch the rules/configurations for a selected vdom/context individually, create a separte Device Profile and associate the vdom/context to the profile for which you need the reports. Select the option 'Display Virtual Domains in the below resources list.' in Associate Profiles to Devices page. It lists both the virtual Firewalls (vdom/context) and the physical Firewall devices in the Select Device drop down list.

 

Fetch Rules > From File

  1. In the From File tab, you will find the two options: Import Rule File and Import Configuration File.
  2. In the Import Rule File option, click the Browse button to locate the file which contains the rules details of the Firewall device.
  3. In the Import Configuration File option, click the Browse button to locate the file which contains the complete configuration details of the Firewall device.
  4. Click Import button to import the rule/configuration file. Click Cancel to cancel the rules/configuration details file importing operation.

 

Note:

Rule File

  • User should create a rule file containing rules details.
  • The file should contain rule name, rule hash value (optional) and description only in comma separated format.
  • Each rule should be in a new line.

Configuration File

  • Configuration File should contain complete configuration of device in readable format.

Only for Check Point Firewall

  • In the case of Check Point firewalls, there will be multiple configuration files. In that case, if you are using "From File" mode, it should be provided in the Zip file format.
  • The configuration files are:
    • objects.C
    • objects.C_41
    • objects_5_0.C
    • rules.C
    • rulebases.fws
    • rulebases_5_0.fws
  • The files are stored in the directory conf or database.

 

Note:

Getting Rules/ Configuration Information from the individual virtual Firewalls (virtual domain)

If you want to fetch the rules/configurations from the individual virtual Firewalls (virtual domain) separately, select the option 'Display Virtual Domains in the below resources list.' in Associate Profiles to Devices page. It lists both the virtual Firewalls (virtual domain) and the physical devices in the Select Device drop down list.

 

Note:

Trouble Shooting: If the following message appears in the Compliance Reports field, enable Nipper.

'Unable to generate compliance report. Reason: failed to locate nipper. Click here to enable it'

 

Procedure to enable Nipper

In the Compliance Report field, the following message appears: 'Unable to generate compliance report. Reason: Failed to locate Nipper. Click here to enable it'. What should I do?

Supported Platform:

  • Ubuntu 9.1.10
  • Fedora 12
  • OpenSuSE 11.2
  • CentOS 5.5

Prerequisite:

The GNU/Linux platform requires Qt 4.5 to be installed. Your package manager system should automatically install this for you.

Steps:

  1. Download Nipper libraries from https://www.manageengine.com/products/firewall/download-third-party-utilities.html according to your platform
  2. Install the rpm or deb according to your Operating System
  3. Connect to Firewall Analyzer web client and type the following URL: 'http://<host name>:8500/fw/userConfig.do'
  4. In that, there is an option to provide the path in which you have installed 'Nipper'. For ex: '/usr/bin/nipper'
  5. Click on Save link

After performing the above steps, go to Setting > Device Rule > Add Device Info, the option to generate compliance report for the device will be enabled.
 

Video Zone
OpManager Customer Videos
Michael Senatore, Operations Manager, Rojan Australia Pty Ltd.
  
  •  Venkatesan Veerappan, IT Consultant
     Mohd Jaffer Tawfiq Murtaja, Information Security officer from Al Ain sports club
  •  Jonathan ManageEngine Customer
     IT Admin from "Royal flying doctor service", Australia
  •  Michael Senatore, Operations Manager, Rojan Australia Pty Ltd.
     Michael - Network & Tech, ManageEngine Customer
  •  Altaleb Alshenqiti - Ministry of National Guard - Health Affairs
     Donald Stewart, IT Manager from Crest Industries
  •  John Rosser, MIS Manager - Yale Chase Equipment & Services
     David Tremont, Associate Directory of Infrastructure,USA