Bulk Device Rule Addition in Firewall Analyzer

    Firewall Analyzer supports bulk device rule addition, enabling administrators to associate multiple firewall devices with a credential profile in a single operation. This feature simplifies onboarding and reduces manual effort when configuring credentials for multiple firewall devices.
    Using this wizard, you can verify connectivity, validate credentials, and apply device rules efficiently across multiple firewalls.

    Prerequisites

    Before proceeding with bulk device rule addition, ensure that:

    • The firewall devices are already discovered and available in Firewall Analyzer.
    • Valid credential profiles are created for the required firewall vendors.
    • Network connectivity is available between Firewall Analyzer and the target devices.
    • Required ports (for example, SSH/HTTPS) are accessible.

    To access the Bulk Device Rule wizard:

    1. Go to Settings.
    2. Click Firewall Server.
    3. Select Credentials.
    4. Click Add Bulk.

    The Add Bulk Device Rule wizard will be displayed.

    Step 1: Device & Credentials

    1. In this step, you select the firewall type and associate a credential profile.
      • From the Device Type drop-down list, select the required firewall vendor (for example, ZyWALL, Fortinet, Palo Alto, etc.).
      • From the Credential Profile drop-down list, choose an existing credential profile.
      • To create a new profile, click Add Credentials and provide the required authentication details.
    2. Review the credential profile information displayed below, including:
      • Mode (CLI / API)
      • Username
      • Protocol (SSH / HTTPS)
    3. Select Devices
    4. Under the Devices tab:

      • Select one or more devices from the Available list.
      • Click the right arrow (→) to move them to the Selected list.
      • Alternatively, use the Device Groups tab to select devices based on predefined groups.
    5. Click Next to proceed to the next step.

    Bulk Device Rule

    Step 2: Device Specific Details

    1. In this step, you can review and validate device-level information.
      • The selected devices will be displayed in a tabular format.
      • For each device, verify the following fields:
        • Device Name
        • IP Address
    2. After verifying the device details, click Next to continue.

    Bulk Device Rule

    Step 3: Verify Credentials

    1. In this step, Firewall Analyzer validates the selected credentials against the chosen devices.
      • The system initiates an automatic login attempt to each selected device using the configured credential profile.
      • A progress bar indicates the verification status.
    2. Once completed, the following details are displayed:
      • Device Name
      • IP Address
      • Login Status (Success / Failure)
      • Reason for Failure (if applicable)
    3. Review the Login Status for all devices:
      • Success indicates that the credentials are valid.
      • Failure indicates authentication or connectivity issues.
    4. If any device fails verification:
      • Review the failure reason.
      • Verify the username, password, and protocol settings.
      • Check network connectivity and firewall access.
    5. After successful verification, select the required devices and click Next.

    Bulk Device Rule

    Step 4: Schedule

    1. In this step, you configure how frequently Firewall Analyzer should connect to each selected firewall device to fetch configurations and perform monitoring.
    2. The selected devices are displayed in a table with scheduling fields.
    3. For each device, configure the following values:
      • Days: Specify the number of days between successive polling cycles.
      • Hours: Specify the number of hours between polling intervals.
      • Minutes: Specify the number of minutes between polling intervals.
      • Click the drop-down list under each column to select the required interval.
      • You can configure different schedules for different devices based on monitoring requirements.
    4. Click Save to complete the bulk device rule configuration.

    Bulk Device Rule

    Firewall Analyzer applies the configured schedule and starts fetching configurations based on the defined interval.

    After successful configuration, Firewall Analyzer uses the assigned credentials to fetch device configurations, perform compliance audits, generate rule and traffic reports, and monitor policy changes. The configured devices will appear under credential-based monitoring with validated access.

    Thank you for your feedback!

    Was this content helpful?

    We are sorry. Help us improve this page.

    How can we improve this page?
    Do you need assistance with this topic?
    By clicking "Submit", you agree to processing of personal data according to the Privacy Policy.