Firewall Analyzer - Change Management - FAQ

1. In 'Change Management' report diff shows lot of data which are not changed by that user. Why?

These changes are dynamically done by firewall. You can add these under Settings > Firewall Server > Exclude Criteria to exclude these changes from this report.

2. What is the meaning of 'Changed by' and 'Changed from'?

  • Changed by - User name (who had made the changes).
  • Changed from - Remote host IP address of user.

Changed by and Changed from values will be taken from Logout syslog when Change Management notification option is selected in Device Rule. This value will be N/A and '-' respectively, if values are not available in syslogs and scheduled report.

3. How to view the commands executed at the time of configuration change?

  1. Go to Reports > Firewall Reports.
  2. Select specific firewall, choose Admin Reports.
  3. You can check the commands in Commands Executed widget.

4. What is the configuration storage warning, and how can I resolve it?

The warning message appears when the stored configuration files of all firewall devices exceed 20GB. To address this concern, schedule a cleanup to eliminate outdated and unnecessary configuration files. Once the storage usage drops below 20GB, the warning message will be removed automatically.

5. Why is my configuration storage space is still the same even after running the configuration cleanup?

The selected configurations have been marked for removal. They will be deleted when the database runs its cleanup operations (Example: Ghost cleanup, Vaccum operation etc,). Following which the configuration storage space will be updated.

6. When does Startup-Running configuration conflict report shows data?

A Startup-Running configuration conflict occurs when the two configurations are not in synchronization with each other. Any change that has been made to the Running configuration has to be written over the Startup configuration also. If the network admin fails to write the changes made to the Running configuration to the Startup configuration, a Startup-Running configuration conflict occurs and this report shows that data.

 

 

 

A single platter for comprehensive Network Security Device Management