Firewall Analyzer

¹æÈ­º® ·Î±× ºÐ¼® ¼ÒÇÁÆ®¿þ¾î

°ü¸®ÀÚ ¼Ö·ç¼Ç:
Firewall Analyzer´Â ¹æÈ­º®, ÇÁ·Ï½Ã ¼­¹ö, IDS/IPS ±×¸®°í VPN Àåºñ¸¦ À§ÇÑ ·Î±× ºÐ¼® ¼ÒÇÁÆ®¿þ¾îÀÔ´Ï´Ù.
  • ´©°¡ ´ë¿ªÆøÀ» ¾ðÁ¦, ¾îµð¼­ »ç¿ëÇÏ´ÂÁö ¸ð´ÏÅ͸µ
  • ³ôÀº ´ë¿ªÆøÀ» »ç¿ëÇÏ´Â »çÀÌÆ®¸¦ ½Äº°
  • ³×Æ®¿öÅ©¿¡¼­ º¸¾È À§Çù¿¡ ´ëÇÑ °¨½Ã
  • ¹æÈ­º®ÀÇ Á¤Ã¥ »ç¿ëÀ» ÃÖ¼ÒÈ­
 
¼º°ø »ç·Ê
"¸î ¹øÀÇ Å¬¸¯À¸·Î ³×Æ®¿öÅ©¿¡¼­ ³ª»Û Æ®·¡ÇÈÀ» ½Å¼ÓÇÏ°Ô Ã£À» ¼ö ÀÖµµ·Ï µµ¿ÍÁÝ´Ï´Ù." - Steve Balon, ÅëÇÕ ³×Æ®¿öÅ© ¼Ö·ç¼Ç » ´õ º¸±â
 
Firewall Rules and URL Monitoring

Firewall Rules Monitoring

Firewall Analyzer provides network administrators a value added feature of monitoring the Firewall rules configured for the network. Firewall Analyzer fetches all the rules of the Firewalls and provides rule wise usage information. With the help of this, you will be able to analyze the usage and effectiveness of the Firewall rules and manage the Firewall rules for optimal usage.

Top Unused Rules
Firewall Analyzer Top Unused Rules

Top Unused Rules provides the list of rules not used by the traffic of your enterprise network through the firewall. This list enables you to ascertain the Firewall rules which were not used and modify or remove the unused rules or create new rules to use them optimally.

Top Used Rules
Firewall Analyzer Top Used Rules

Top Used Rules provides the list of rules used by the traffic of your enterprise network through the firewall. This list enables you to ascertain the Firewall rules which were heavily used and modify the heavily used rules to use them optimally. The number of events triggering the rule are listed along with the used rules.

Top Rules - Protocol group based
Firewall Analyzer Top Used Rules - Protocol Group based

Top Rules - Protocol Group Based report provides the number of events triggering the rule are displayed as graphs and listed in table based on protocol groups. You can get protocol group wise number of events triggering the rule, across each of your network firewalls, thus giving you an idea of the rules being used or over-used in your network environment.

Top Rules - Host based
Firewall Analyzer Top Used Rules - Host based

Top Rules - Host Based report provides the number of events triggering the rule are displayed as graphs and listed in table based on Hosts. You can get Host wise number of events triggering the rule, across each of your network firewalls, thus giving you an idea of the rules being used or over-used in your network environment.

Top Rules - Destination based
Firewall Analyzer Top Used Rules - Destination based

Top Rules - Destination Based report provides the number of events triggering the rule are displayed as graphs and listed in table based on Destinations. You can get Destination wise number of events triggering the rule, across each of your network firewalls, thus giving you an idea of the rules being used or over-used in your network environment.

 

URL Monitoring

Firewall Analyzer provides network administrators top URLs as part of the Web Usage reports. Firewall Analyzer measures network bandwidth usage based on the URLs visited from different network firewalls.

Top URLs
Firewall Analyzer Top URLs

Top URLs report provides the details of hits, percentage hits, bytes, and percentage bytes used for accessing the URLs from your enterprise network through each of your configured firewall.

Firewall Analyzer Download