Virtual Firewalls of Cisco, Fortigate, and Check Point devices supported

Why Virtual Firewall?

The hosted environment is increasingly getting virtual day by day. So the Firewalls cannot lag behind. Every customer of a service provider need security as well as privacy for the hosted server / service. Since the service provider caters to a number of customers it is multi-tenant environment. In such an environment, security and privacy of an individual customer cannot be compromised. Every service provider customer requires a separate Firewall to be allocated. If the number of customers keep growing, the service provider cannot go on adding heaps of Firewall hardware. Hence, the service provider has to strike a balance. Without adding huge amount of Firewall hardware, the service provider has to ensure the security and privacy of the customer servers and services. In such a situation, Virtual Firewall comes handy. In one base physical Firewall device, multiple virtual Firewalls can be hosted. These virtual Firewalls are mutually exclusive and assures the same level of security as the base Firewall. Service Providers started adapting these virtual Firewalls in a big way.

How Firewall Analyzer addresses the Virtual Firewall management requirement?

The next harder task for the service provider is to find an appropriate monitoring solution, which has to again assure the privacy requirements in a multi-tenant environment. This is where the Firewall Analyzer comes in to play. Firewall Analyzer supports the logs from Virtual Firewalls. Adding this support with user based client view, empowers the service provider with mutually exclusive, individual Firewall reports and alerts to the customers. This way the service provider meets the requirements of the customers in a fool proof manner effectively.

Firewall Analyzer now supports logs from the Virtual Firewalls (context / vdom) present in the Cisco, FortiGate, and Check Point devices. There is no special configuration required. The application automatically recognizes the logs originating from the Virtual Firewalls. Each Virtual Firewall is treated as a separate device. Hence, the reports, alerts, etc., are generated separately.

This facility is best suitable for enterprises and MSPs / MSSPs where multi-vendor, multi-tenancy need to be catered for in offering virtual firewall service for each of the vendors exclusively.

A single platter for comprehensive Network Security Device Management