Tracking FTP usage with Firewall Analyzer.

What is FTP?

The File Transfer Protocol (FTP) is a standard network protocol used for transferring files between any two computers on a network.

Why should you track FTP usage?

The chance of a properly secured FTP server getting hacked is low, but the possibility is still there; no system is 100 percent secure.

On top of that, FTP has a couple of weaknesses.

  1. By default, there is a provision that allows local commands to be executed in FTP servers built in Linux and Windows servers. A malicious user might be able to elevate privileges by exploiting this security flaw.

  2. FTP is based on plain text. During login, the user name and password are sent across as plain text without encryption; this makes the protocol vulnerable to hackers who can use different tools to obtain these credentials.

How does Firewall Analyzer help track FTP usage?

Firewall Analyzer tracks FTP usage from the firewall syslog and provides a detailed traffic report on:

 

1. Top Host — Total host traffic sent and received using FTP.

Top host graph

 

Top host table

 

2. Top Protocol — Top protocol group traffic sent and received using FTP.

Top Protocol graph

 

Top Protocol table

 

3. Top Users — Top user traffic sent and received using FTP.

Top user graph

 

Top user Table

 

4. Top Rules — The top rules used to access FTP.

Top Rules Table

 

If either the host or the user shows unusual traffic, the security admin can investigate and secure that specific IP.

 

 

Featured links

Other features

Firewall Rule Management

Manage your firewall rules for optimum performance. Anomaly free, properly ordered rules make your firewall secured. Audit the firewall security and manage the rule/config changes to strengthen the security.  

Firewall Compliance Management

Integrated compliance management system automates your firewall compliance audits. Ready made reports available for the major regulatory mandates such as PCI-DSS, ISO 27001, NIST, NERC-CIP, and SANS.

Firewall Log Management

Unlock the wealth of network security information hidden in the firewall logs. Analyze the logs to find the security threats faced by the network. Also, get the Internet traffic pattern for capacity planning. 

Real-time Bandwidth Monitoring

With live bandwidth monitoring, you can identify the abnormal sudden shhot up of bandwidth use. Take remedial measures to contain the sudden surge in bandwidth consumption.

Firewall Alerts

Take instant remedial actions, when you get notified in real-time for network security incidents. Check and restrict Internet usage if banwidth exceeds specified threshold.

Manage Firewall Service

MSSPs can host multiple tenants, with exclusive segmented and secured access to their respective data. Scalable to address their needs. Manages firewalls deployed around the globe.

 

 

A single platter for comprehensive Network Security Device Management