AlgosecFirewallAnalyzer UserGuide
AlgosecFirewallAnalyzer UserGuide
User Guide
View our most recent updates in our online ASMS Tech Docs.
Document Release Date: 29 March, 2020 | Software Release Date: April 2020
User Guide
Legal Notices
Copyright © 2003-2020 AlgoSec Systems Ltd. All rights reserved.
AlgoSec, FireFlow, AppViz and AppChange are registered trademarks of AlgoSec Systems Ltd. and/or its
affiliates in the U.S. and certain other countries.
Check Point, the Check Point logo, ClusterXL, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer,
INSPECT, INSPECT XL, OPSEC, Provider-1, Safe@Home, Safe@Office, SecureClient, SecureKnowledge,
SecurePlatform, SecuRemote, SecureXL Turbocard, SecureServer, SecureUpdate, SecureXL, SiteManager-
1, SmartCenter, SmartCenter Pro, Smarter Security, SmartDashboard, SmartDefense, SmartLSM, SmartMap,
SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartViewTracker,
UserAuthority, VPN-1, VPN-1 Edge, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1
SecureServer, VPN-1 VSX, VPN-1 XL, are trademarks or registered trademarks of Check Point Software
Technologies Ltd. or its affiliates.
Cisco, the Cisco Logo, Cisco IOS, IOS, PIX, and ACI are trademarks or registered trademarks of Cisco
Systems, Inc. and/or its affiliates in the U.S. and certain other countries.
Juniper Networks, the Juniper Networks logo, NetScreen, and ScreenOS are registered trademarks of
Juniper Networks, Inc. in the United States and other countries. JUNOS and JUNOSe are trademarks of
Juniper Networks, Inc.
All other product names mentioned herein are trademarks or registered trademarks of their respective
owners.
The software contains proprietary information of AlgoSec; it is provided under a license agreement
containing restrictions on use and disclosure and is also protected by copyright law.
Due to continued product development this information may change without notice. The information and
intellectual property contained herein is confidential between AlgoSec and the client and remains the
exclusive property of AlgoSec If you find any problems in the documentation, please report them to us in
writing. AlgoSec does not warrant that this document is error-free.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by
any means, electronic, mechanical, photocopying, recording or otherwise without the prior written
permission of AlgoSec Systems Ltd.
Contents
Welcome to AlgoSec Firewall Analyzer 8
Advanced management and troubleshooting 8
Risk management 9
Change management 9
Policy optimization 9
Regulatory compliance and auditing process 10
Business application visibility 10
Logins and other basics 11
Supported browsers 11
Log in to ASMS 11
View ASMS product details 14
Log out of ASMS 15
AFA components 16
AFA Operations and Optimization module 16
AFA Risk and Compliance 18
AFA ActiveChange 19
Navigate around AFA 20
AFA's main menu 20
Toolbar 21
AFA grids and tables 21
Export AFA screens to PDF 22
Export AFA data to PDF files 22
General Print dialog recommendations 23
Chrome-specific recommendations 24
Firefox-specific recommendations 24
Microsoft Edge-specific recommendations 26
Microsoft Internet Explorer-specific recommendations 27
Quickstart with AFA 28
View risks and risky rules 28
Browse and search through your security policies 29
AFA's network model and its graphical map enable you to automatically detect security
holes in your device policies, helping you manage your network proactively and
efficiently.
In situations where a new exploit uses ports that could be blocked by the devices, AFA
lets you run a traffic simulation query on all your devices to identify whether you are
exposed, and which policies should be tightened up.
AFA reports are very intuitive and user-friendly, allowing you to quickly locate and
resolve critical problems with three mouse clicks. Although AFA reports are easy to
understand, they comprise a profound analysis of five layers of information, with more
than 1500 linked files. The files making up the average AFA report, total about 75 MB*
in size.
l Every protocol
Each report is the result of AFA analysis of more than 1030 possible intrusions.
Risk management
Analyzing complex device policies manually is time consuming and requires an
understanding of all the possible options and combinations. As a result, many risks are
not detected and impose a threat to the organization's security.
The AFA Risk Management module automatically analyzes every type of packet that a
device may encounter and performs a comprehensive analysis - not just a spot check.
Therefore, customers have the ability to view all the risks and the specific rules that
cause them, across all their devices.
Change management
Today's constant demand for application and infrastructure changes poses a significant
risk of compromising security in the process, and exposes organizations to new risks
they might not even know about. That's why an ad-hoc approach to change
management is not recommended.
AFA provides a comprehensive solution that helps report all the changes made to your
device policies, and analyzes their impact, so that you can review and verify that they
are performed correctly. In addition, a complete change history is logged. With AFA, the
change process becomes more efficient, safer and easier to control.
For more details, see Manage real-time monitoring and Managing Analyses.
Policy optimization
Devices work more efficiently and are easier to manage when the policies are
uncluttered and free of unused rules and objects. AFA enables customers to optimize
policies easily and safely, by providing information on the following:
l Unused Rules: rules that are not used according to actual traffic logs
l Covered Rules: rules that are covered by previous rules (and will never be used)
l Disabled rules
l Time-inactive rules
AFA also includes the Intelligent Policy Tuner, which identifies rules that are too wide
and permissive, and rules which contain sparsely used objects, thereby enabling you to
fine tune your policy.
l Sarbanes-Oxley
l HIPAA
l NIST 800-41
l FISMA
l IAVA
Additionally, AFA enables you to incorporate auditing into your work process. Simply
define the schedule for analysis. AFA will automatically perform the analysis according
to your defined triggers and e-mail the results to the relevant people upon completion.
AppViz is available from the bottom left menu in AFA, and opens in a separate tab.
Supported browsers
View ASMS in one the following web browsers, at screen resolution of 1920x1080 or
above.
l Mozilla Firefox
l Google Chrome
l Microsoft Edge
l Internet Explorer 11 and higher. Internet Explorer 8.0 is supported for FireFlow
requestors only.
Log in to ASMS
Log in to ASMS from any desktop computer using the credentials provided by an AFA
administrator.
Do the following:
If a warning message about the web server's certificate appears, click Accept or
OK. For more details, contact your network administrator.
2. In the Username and Password fields, enter your username and password, and click
Login.
For example:
If you are an administrator for any of these products, the relevant administration menu is
available from your user dropdown at the top-right:
Note: CloudFlow is now accessible from inside ASMS. Click the dropdown at the
top-left and select CloudFlow.
l To adjust the size of the main menu, hover between the menu and the workspace
and drag the border left or right.
l To collapse the menu entirely, click at the top. When collapsed, click to
expand it again.
Do the following:
1. In the toolbar, click your username and then select About or Info.
The About dialog appears, showing details about the product you have installed.
For example:
Note: If you are running the FIPS 140-2 compliant version of AFA, this information is
indicated in the window.
Note: If Single Sign On is configured, you must browse to the Logout page hosted on
your IdP to log out.
For more details, see the AlgoSec Firewall Analyzer Administrator Guide.
AFA components
This topic describes the AFA components, including the baseline Operations and
Optimization component, and additional options for Risk and Compliance,and
ActiveChange for direct change implementations.
AFA also enables significant device performance improvements with a rich set of
reports and recommendations that help improve device configuration efficiency, such as
the Intelligent Rule Re-Ordering algorithm.
l Basic compliance
l User notifications
Visual display of the device policy, including topology, traffic, rules and objects,
including an analysis of the routing table and provides a connectivity diagram changes
from previous reports on the same device.
l Analyze several devices together, taking into account their relative hierarchy in
the network.
l Compare any two reports – either the same device or different devices or different
device vendors. Track the changes in a device policy between reports of any two
dates. Show the changes in traffic, rules, services, host groups, topology and
objects
Routing queries allow you to check the end to end routing between two IP addresses on
the map. They are different from the traffic analysis query because they do not take into
account any security rules or NAT rules that may block or alter the routing path.
Basic compliance
By exploring the policy and change history an auditor receives the required information
to produce a report that complies with corporate and regulatory standards such as the
Sarbanes-Oxley Act, Basel II Capital Accord, HIPAA, BS 7799/ISO 17799, FISMA,
Payment Card Security Standard (PCI DSS) and Cyber Security Standards (CIP).
Identify unused, covered, timed out and disabled rules that are candidates for removal.
l List rules that may not conform to company security policies, including rules
without comments, rules without logs and rules with comments that do not include
a ticket number.
l Show unused rules, the most used and the least used rules.
l Refine your device policy using AFA's Intelligent Policy Tuner. Identify rules that
are too wide and permissive, and rules which contain rarely used and unused
objects.
l Reorder your rules intelligently.AFA recommends new positions for the rules to
increase the device performance. The recommended order retains the policy logic.
Typically, by repositioning only a few of the most used rules a significant
improvement in performance is seen.
l List unused, unattached and empty objects that are candidates for removal.
User notifications
Continuously poll device policy changes and send e-mail alerts when a change is
detected
Send e-mails to pre-assigned users following a device analysis with the summary of the
analysis and the changes from previous reports.
Highlights include:
l Deep risk analysis: Identifies every packet the device may encounter.
Automatically maps topology and identifies the most serious threats based on
industry best practices, prioritizes subsequent risks and offers guidance on what
and how to re-mediate.
l Continuous security audit: Provides a complete audit trail and replaces error
prone manual tasks, to ensure configuration is aligned with security policy.
l VPN analysis: Add risks associated with VPN rules and VPN objects to the
Change History page and to e-mail notifications.
AFA ActiveChange
The optional ActiveChange license adds the ability to implement AFA
recommendations directly from the AFA system for Check Point devices accessed via
OPSEC.
Note: When FireFlow is being used, ActiveChange is used from FireFlow and
supports many other device brands.
Highlights include:
l Ability to disable unused, covered, and redundant special case rules: Rules
belonging to any of these three categories can be automatically disabled.
l Policy backup: The policy is backed up before changes are made, enabling one to
easily revert to the pre-change policy.
l Full audit trail: Comments are added to every disabled rule to indicate which user
made the change and when. These comments are visible in the Check Point
Smart Dashboard.
DEVICES. View all devices defined in AFA. Generate, view, compare, and
delete device reports, query device policies, customize device topology and
trusted traffic, locate objects in devices, and monitor device policies for
changes.
GROUPS. View device groups defined in AFA. Generate, view, compare, and
delete group reports and locate objects in groups.
Tip: Adjust the display by dragging the main menu. For details, see Adjust your
screen space.
Toolbar
Click your username at the top-right to display system information, view documentation,
and log out. Administrators can also access the Administration area and view license
information.
Click Analysis Status to view the status of the most recent AFA analysis run.
Sort tables Tables columns that can be used to sort have arrows in their headings.
by columns
For example:
Click a column heading to sort the table. To reverse the sorting order,
click the column again.
A table already sorted by a specific column displays only one arrow in
its heading.
For example: .
Page When a table contains multiple pages, navigate between them using
across the controls below the table.
tables For example:
Filter table Tables that can be filtered have an extra row just below the header.
content Enter data in the box to filter the table by that column data.
Note: Filtering tables with many rows may take some time.
Administrators can disable filtering for tables over a specific size.
1. Click the Export/Print PDF or Export link shown in the upper-right corner of the
screen.
Reports On a report page, your browser will either open a Print dialog to
export the report page currently in view to a PDF, or an Export
item dialog appears.
If the Export item dialog appears, select the report pages you
want to export to open the browser's Print dialog.
Depending on your browser and its settings, a preview version may open in a
separate tab. For example:
2. In the browser Print dialog, select to save the file as PDF. Additionally, use the
print preview to verify that all other print settings are set to show all colors and
graphics, and to ensure that no content is cut off.
Tip: The process and recommended settings may differ depending on the
browser you are using. We recommend using a recent version of Google
Chrome for optimal results.
Use the following recommendations to ensure that your PDF is exported correctly:
l Chrome-specific recommendations
l Firefox-specific recommendations
3. When you are finished with any adjustments required and are satisfied with your
preview, click Save to save your PDF.
In the Save dialog, enter a meaningful name for your PDF, and the location you
want to save the file.
Note: When the Print Preview dialog is open in one browser tab, ASMS cannot
function in a different tab of that browser window.
Background Graphics Select the Background Graphics check box to display the
report in full color. Affected elements may be the status
detail bars and table cell borders.
Header and Footer Select the Header and Footer check box to include
optional data in the report.
Chrome-specific recommendations
In the Chrome Print dialog, set your Destination to Save as PDF.
Firefox-specific recommendations
In the Firefox Print dialog, set your Name to Microsoft Print to PDF.
Open the Print Preview by selecting the Firefox menu button, and then selecting Print.
l Click Page Setup at the top left, and select Print Background (colors & images).
For example:
Firefox troubleshooting
If the print preview shows that the HOME page in the exported report is cut off at
the end of the page, especially when printing multiple sections of the report, export
one page of the report at a time.
l In the Export item dialog select only one checkbox for each report.
On all pages in the report, long frames may be cut off when exporting from
FireFox. In such cases, use the scaling options to squeeze more content into the
frame, or use a different browser. For more details, see https://bugzilla.mozilla.org/.
If the print preview does not appear, you may need to allow popups from your AFA
machine. Click Options in the yellow bar at the top of your browser to allow
popups for AFA.
Edge troubleshooting
HOME page If the print preview shows that the HOME page in the exported report
data cut off is cut off at the end of the page, especially when printing multiple
sections of the report, export one page of the report at a time.
Do one the following:
l In the Export item dialog select only one checkbox for each
report.
l Export to PDF directly from a specific page in the report.
Certificate In Edge, AFA does not support exporting the Policy tab of the report to
requirements PDF on systems that do not have a valid security certificate.
Doing this simply shows a Preparing for Export message, without
continuing.
In such cases, we recommend using a different browser.
Background Microsoft Edge does not support background colors. Therefore, PDFs
colors exported from Edge are in black and white only, and tables may
appear without cell borders. For more details, see
answers.microsoft.com.
To set the Background graphics option, select Settings > Print > Page Setup window,
and select the Print Background Colors and Images check box. For example:
If you do not see the Print Preview dialog by default, in the Internet Explorer settings,
select Print > Print preview.
For example:
For example:
Filter rules by rule fields, objects, IP address, and so on. For example:
l Customize the topology to mark your DMZ networks. Be advised about risky DMZ
traffic.
l Customize trusted traffic to identify traffic that should not trigger risk items.
l Customize trusted networks to identify machines and subnets that should not
trigger risk items.
l Customize Risk Profiles to determine the risk levels and to write your own risk
items.
For complete instructions on all these subjects, see Customizing AFA Risk Detection
(see Customize risk detection).
AFA user interface. For details, see Running Traffic Simulation Queries (see Run traffic
simulation queries).
â See also:
l Exploring Your Network (training video)
Note: Searching the policy in the Policy tab is the preferred method for locating
objects. For details, see Searching policies.
Note: Because the Policy tab does not show NAT rules, use the Locate Object
feature's Find in Rules option to locate objects in NAT rules. For details, see Locate
rules that use specific objects.
Viewing policies
To view a policy:
1. View the desired device, group, or matrix. For details, see View AFA device data,
View AFA group data, and View AFA matrix data.
The columns which appear in the policy tab are specific to each device brand. If
AppViz is licensed, fields from AppViz appear, indicating business information
such as which rules are included as flows in which applications.
Note: NAT rules do not appear in the Policy tab. To locate NAT rules, see
Locate objects.
Note: If AppViz is licensed, you can export traffic flows from the policy to
AppViz.
3. To search the policy for rules and objects, see Searching policies.
Searching policies
AFA provides the ability to perform advanced searches on policies.
For example, you can locate all device rules that use a specific object—whether the rules
include the object explicitly or include an object containing the object—in any device,
group, or matrix, or in any type of report. This is useful when planning to update or
remove an object, since it enables you to detect all the rules that will be affected by the
change.
Note: NAT rules do not appear in the Policy tab. To locate NAT rules, see Locate
rules that use specific objects.
To search a policy:
1. View the policy you want to search. For details, see Viewing policies.
Note: Depending on your AFA configuration, this search feature may not
function in this way. If your AFA is configured to always perform only a textual
search, use the Locate Object feature to search for objects that contain specific
IP addresses. For details, see Locate objects.
3. In the Contains field, type a string, IP address, IP range, service, range of services
(eg., "TCP/20-50" or "All TCP"), or object name for which you want to search the
policy. To search specifically for empty fields, type [EMPTY].
4. To add another search parameter, click And, then complete the fields in the
manner previously described.
6. To find rules that contain objects which contain only/exactly the IP address(es) or
service(s) you searched for, select Exact Match.
Objects that contain what was searched will appear highlighted in the search
results.
Note: For Check Point devices, the results show one device to represent each
policy. Multiple devices with the same policy will not appear in the search results.
Note: These comments are only visible in AFA, not on the devices themselves.
Note: AFA administrators can disable or enable the Documentation field and add
more such fields.
1. View the device/group/matrix policy, and locate the rule you want to edit. For
details, see Searching policies.
3. Select the check box(es) next to the field(s) you want to edit.
4. Type your comments for the rule in the field(s) or delete the comments you want to
remove.
5. Click Update.
1. View the device/group/matrix policy, and locate the rule you want to edit. For
details, see Searching policies.
4. Select the check box(es) next to the field(s) you want to edit.
5. Type your comments for the rules in the field(s) or delete any comments you want
to remove.
6. Click Update.
The comments are added or removed from all the selected rules.
Locate objects
You can locate all objects which contain a specific IP address or range in a device,
group, matrix, or in a specific report.
To locate an object:
1. Do any of the following, as described in View AFA device data, View AFA group
data, and View AFA matrix data:
l To search a single device report for an object, view the desired device, click
the Reports tab, and then select the check box next to the report in which
you want to locate the object.
l To search all device reports for an object, view the ALL_FIREWALL group,
then click the Reports tab, and then select the check box next to the report in
which you want to locate the object.
l To search a group report for an object, view the desired group, click the
Reports tab, and then select the check box next to the report in which you
want to locate the object.
l To search a matrix report for an object, view the desired matrix, click the
Reports tab, and then select the check box next to the report in which you
want to locate the object.
A new window opens displaying a list of objects with the specified IP address,
range, or host group, in the specified devices and/or matrices.
Otherwise, the recommended method to locate rules is through the Policy tab. For more
information, see Searching policies. NAT rules do not appear in the Policy tab.
1. Do any of the following, as described in View AFA device data, View AFA group
data, and View AFA matrix data:
l To search a single device report for an object, view the desired device, click
the Reports tab, and then select the check box next to the report in which
you want to locate the rules.
l To search all device reports for an object, view the ALL_FIREWALL group,
then click the Reports tab, and then select the check box next to the report in
which you want to locate the rules.
l To search a group report for an object, view the desired group, click the
Reports tab, and then select the check box next to the report in which you
want to locate the rules.
l To search a matrix report for an object, view the desired matrix, click the
Reports tab, and then select the check box next to the report in which you
want to locate the rules.
3. Specify the object you want to locate, by doing one of the following:
2. Select the host group you wish to locate. You can search the defined
names alphabetically, or by using the search filter.
3. To locate rules with objects that contain only the specified IP address,
select the Exact match check box.
2. Type the starting and ending IP addresses for the IP range you wish to
locate.
3. To locate rules with objects that contain only the specified IP range,
select the Exact match check box.
If you type a host group that has an IP address as its name, put it in
quotations (for example "10.20.1.1").
Note: For Cisco devices, locating rules with the exact match feature will
not return results where the IP address was added directly to the rule (not
within a network object).
A new window opens displaying a list of rules containing the specified object, in
the specified devices and/or matrices.
6. To export the results to PDF format, in the top-right corner of the report, click
. For more details, see Export AFA screens to PDF.
Tables at the end of each device display relevant network and service object
definitions. Clicking on the object in a rule will bring you to its definition in these
tables.
7. To export the results to CSV format, in the top-right corner of the report, click
. Follow your browser prompts to open the file.
AFA reports
This section explains how to understand and use AFA device, group, and matrix reports.
For more details, see Device report pages, Group report pages, and Matrix report pages.
Comparison reports
AFA enables you to compare reports from the same device from different dates, or
compare reports from different devices. Comparing reports not only detects differences
in objects, but also provides an analysis of the differences' effects.
For example, it reveals which traffic is allowed by one device and not by the other, and
vice-versa. This can be used to determine what has changed in a device over a long
period of time, or to determine whether a vendor conversion project was performed
correctly.
Tip: You may want to compare reports from different vendors if you are considering
migrating your devices to a new vendor.
Note: For full traffic comparison, enable Comprehensive Mode in the AFA
Administration area General options.
This ensures that AFA analyzes all services defined on the device, and not only
the ones relevant for risks.
Do the following:
1. In AFA, navigate to the device you want to compare reports for. For details, see
View a specific device.
View the desired device as described in , then click the Reports tab.
2. On the device details page, click Reports to display a list of available reports.
4. In the Compare reports dialog, click Compare, and watch while AFA compares
the selected reports.
When complete, the comparison report opens in a new window. The comparison report
is also attached to the more recent of the device reports you compared.
Do the following:
1. Either select both devices from the ALL_FIREWALLS group, or select each device
one at a time.
For details, see Viewing the ALL_FIREWALLS Group and View a specific device.
l If selecting from the ALL_FIREWALLS group, click the All Reports tab, and
select the reports you want to compare.
l If selecting from a specific device, browse to your device and click the
Reports tab. Then select a report to compare and click .
At the prompt, select your second device and report, and click
again.
Tip: When selecting devices to compare, you may see light & dark-colored
device report entries.
l Dark entries mean that you have the appropriate permissions to perform
all actions on the device (i.e., customizing the topology, trusted traffic,
refreshing, and deleting report).
2. In the Compare reports dialog, click Compare, and watch while AFA compares
the selected reports.
When complete, the comparison report opens in a new window. The comparison report
is also attached to the more recent of the device reports you compared.
Comparison reports are attached to the more recent of two reports compared. For more
details, see Comparison reports.
Do the following:
1. View a device report to which a comparison is attached. For details, see View
device reports.
2. Click the Policy tab. In the Comparisons area, select the comparison report you
want to view.
The two reports are displayed side by side, with a summary table at the top.
For example:
3. To drill down to more details, click the Traffic link in the summary table.
Traffic details are displayed, with green bullets indicating added traffic and red
bullets indicating removed traffic.
Each traffic direction is listed separately, with hyperlinks to each section at the top
of the page. In each table, rows represent services and contain details about the
traffic changes that occurred.
For example, added traffic might include details about what was blocked before
and is allowed now. Removed traffic might include what was allowed before and
is blocked now.
Note: The comparison report does not cover traffic of services that are defined in only
one report, or are configured differently in each report.
Do the following:
If you started from the HOME tab of the report, a dialog appears where you can
select specific pages to export.
For example:
Select the pages you want to export, and click Export PDF.
If you started from any other page in the report, the print preview opens with an
optimized version for saving to PDF.
Note: Depending on your web browser, there may be adjustments in the print
preview dialog for optimal output.
Delete reports
This procedure describes how to delete reports from AFA.
Do the following:
1. Navigate to the report you want to delete, and then click the Reports tab.
If you are deleting reports for multiple devices, view the ALL_FIREWALLS group,
and then click the All Reports tab. For details, see Viewing the ALL_FIREWALLS
Group.
2. In the list of reports, select the checkboxes for the report or reports you want to
delete.
The reports are deleted, and are no longer accessible from AFA.
l Reports on individual devices, groups, and matrices defined in AFA. For details,
see Run a manual AFA analysis.
l Reports on configuration files, for devices not defined in AFA. For details, see
Analyze device configuration files.
By default, when a group or matrix report is generated manually, AFA generates a new
report for each member of the group or matrix, and then also generates a group or matrix
report. You can also select to aggregate the group or matrix members existing report into
a new group or matrix report.
Do the following:
1. In AFA, navigate to the device, group, or matrix you want to create the report for.
For details, see View AFA device data, View AFA group data, and View AFA
matrix data.
Note: When you select a "parent" tier device, all the devices beneath it are
automatically analyzed with each analysis.
Define the Analyze dialog fields as needed, and then click Start Analysis. For
details, see Analyze dialog field reference.
the change.
Do the following:
Click Save as to save it with a new name, and Edit the policy as needed.
2. Run an analysis on the policy. For details, see Run a manual AFA analysis,
selecting What-if analysis in the Analyze dialog.
For Cisco, Juniper Netscreen, Juniper SRX, Fortinet Fortigate, and Palo Alto
Networks devices, this procedure differs.
1. In AFA, navigate to the report you want to use to perform the analysis, and click
the Explore Policy tab.
3. Right click the configuration file and select save link as to download the file
locally.
The configuration file will have a suffix that corresponds to the device type, such
as .nsc or .fgate.
4. Edit the downloaded file, changing the relevant areas as needed. For example,
you might want to edit the areas in the show config section.
5. Save the file, ensuring that you keep the suffix the same.
6. Use the file to run an analysis. For details, see Analyze device configuration files
This procedure describes how to manually generate a report from data in a device
configuration file.
You might want to do this to perform a what-if analysis on specific device types, or when
testing configurations in a lab environment.
Do the following:
1. In AFA, navigate to the ALL_FIREWALLS group. For details, see Viewing the
ALL_FIREWALLS Group.
2. Click the All Reports tab, and then click Analyze File.
3. In the Analyze File dialog, click Browse to browse to the file you want to analyze.
Note: The file size must be 20 MB or less. If you have a larger file, have an
AFA administrator add it to AFA as a device.
4. Define the Analyze dialog fields as needed, and then click Start Analysis. For
details, see Analyze dialog field reference.
Select risk Select the Risk Profile to use for performing the analysis.
profile Alternatively, you can use the Standard profile, which is the default.
Avoid e-mail Select to configure AFA not to send email notifications when the
notification report is complete.
Analysis Select to generate the report using only logs from a specific date
based on logs range.
from X to Y Specify the date you want to start the date range. The end date is
always the current day.
Note: You cannot select a date earlier than the existing AFA logs
begin.
View Describes how to work with individual devices and their reports.
AFA
device
data
View Describes how to work with groups of devices, and reports that cover the
AFA entire group.
group AFA groups are sets of devices that are managed together without any
data connection to the relationships between the member devices. AFA treats
groups as a single unit, providing a birds-eye view of your group-wide risk
exposure.
View Describes how to work with matrices, and reports that cover then entire
AFA matrix.
matrix AFA matrices are sets of devices that are managed together with
data consideration as to the relationships between the member devices. When a
matrix is created, AFA attempts to calculate the relationships between the
devices, and also enables you to edit the topology manually.
AFA manages a matrix's policy as a single unit, providing a birds-eye view of
your matrix-wide risk exposure.
â See also:
l AFA reports
AFA enables you to manage and view data for each individual
node or parent nodes. Reports at a parent level aggregate all
analysis information for each of the sub-devices. Running an
analysis on a parent node also updates data for each of the
children.
Additionally, Palo Alto Networks Panorama devices and any Juniper SRX devices that
are configured to display virtual routers, VRs appear as the last tier in the device tree.
In this case, AFA provides reports for each VR under each VSYS/LSYS. Although the
VSYS/LSYS analysis aggregates the data for each child VR, it does not contain the full
VR tier data, as is usually the case for parent reports.
Data for individual VRs include topology and routing information, and the risky rules
associated with the traffic they route. These reports should be consulted to troubleshoot
routing issues, or to view risky rules. All other data, such as policy optimization
recommendations, is in the VSYS/LSYS reports.
Note: This behavior is not relevant to Juniper Netscreen or NSM devices configured
to display virtual routers. Netscreen devices are not sub-devices of a virtual system,
and are displayed as parallell.
l Devices for which the last report generation, real-time monitoring, or log
collection failed appear in red.
l Layer 2 devices that are not placed on the map appear in orange.
Tip: To filter out devices with issues from being listed in the tree, click the
Issues link at the top, and clear the selection for any item types you want to
hide. Click the Issues link again to return to the standard view.
3. Click your device in the tree to view full details in the workspace.
The information displayed at the top of the workspace for each device varies by its
relative position in the hierarchy of the device tree.
Parent Parent devices are also displayed with the number of devices they
devices manage.
l Managing Analyses
In AFA, security sets are groups of instances, ALBs, or VMs with the exact same
security group and network ACLs or subnet security groups applied. Each instance,
ALB, or VM in a security set has identical security policies.
Details shown for each cloud device varies at each tier, and you can manage each tier
individually, such as running analysis on a specific tier only. Reports for "parent" tiers
appear as group reports, and when an analysis is run on a "parent" tier, reports are
automatically generated for each tier below it. For more details, see View AFA group
data.
The following additional data is presented for the top two tiers only (account /
subscription and region / VPC / VNet):
Click the linked number to open a full list of items. For example:
Security group or The name of the security set's group. Click the link to show a
network security list of the security groups and IDs.
group
Network ACLs or The name of the security set's ACLs or subnet network
subnet network security group. Click the link to show a list of the security
security group. groups and IDs.
Instances, ALBs, or The number of instances, ALBs, or VMs. Click the link to
VMs open a searchable list of the instances, ALBs, or VMs and
IDs.
Subnets The number of subnets. Click the link to open a list of the
subnets and IDs.
Monitoring and log The monitoring and log collection status for the specific
collection device.
. Last cycle succeeded.
. Last cycle failed.
. Monitoring / log collection disabled.
To view the full and latest report for a specific device, browse to and select a specific
device, and then click the link at the top of the workspace.
The report opens in a separate tab. For more details, see AFA reports.
Do the following:
2. In the workspace, click the REPORTS tab, which displays a list of all available
reports for the device.
For example:
l To download a report to your computer, click the Zip link in the row for the
report you want to download.
Do the following:
2. In the workspace, click the REPORTS tab, which displays a list of all available
reports for all devices in the system.
The All Reports tab appears, displaying a list of all available reports for all devices
in the system.
l To download a report to your computer, click the Zip link in the row for the
report you want to download.
Tip: At the top right of each page in the report, click Export / Print PDF to export the
report to a shareable PDF file. For more details, see Export AFA screens to PDF.
Risky Rules. Provides a list of all the risky rules (vs. the actual risk displayed
in the summary page) found in the device policy, along with links to all the
risks to which each rule contributed.
Available only with the AFA Risk and Compliance Module.
For details, see RISKY RULES page.
Changes. Displays the changes in rules, objects, and the resulting changes
in allowed traffic and risks, over all the history of AFA reports for this device.
For details, see CHANGES page.
Policy Optimization. Find out what you can eliminate from your device policy
to optimize it and make it more efficient and maintainable.
For details, see POLICY OPTIMIZATION page.
VPN. Allows navigating through the VPN definitions on your device: identify
the users, user groups, VPN rules, and VPN communities, and the
relationships between these entities.
For details, see VPN page.
HOME page
The HOME page provides an overview of the device report. The page's content
depends on your AFA modules.
l Click the titles of the various widgets on the page to dive down to other pages in
the report.
RISKS page
The RISKS page summarizes all risk analysis findings.
The security rating indicates the device's degree of compliance with security
standards. A security rating of 100% indicates full compliance.
l The total number of risks in each severity category, not counting duplicates.
The list includes a brief summary of each threat: the risk, its trigger count (the
number of times it was detected), and a brief description. The New label indicates
risks that were not present in the previous report.
Tip: Click a risk to drill down to a Risk Assessment page for more details about
the risk and any related rules.
The Risk Assessment appears, displaying the findings and the recommended
remedy. The risk is presented in a descriptive manner with links to every entity that
is associated with the risk.
In the example below, AFA shows you the number of internal and external IP
addresses that have access or are reachable by the risky service.
2. Click the Details button to view the specific rules that allow access to the risky
services.
3. In the example above, we see that rule 36 looks like an accept rule that allows
outbound access. Allowing any outbound service is not recommended since it
may be used by Trojan horses to attack business partners. However, this does not
explain why any service is allowed from the outside. Therefore, we navigate
further and click on the group GP_NW_Garden_ICN to examine its definition.
4. The above figure shows that host group GP_NW_Garden_ICN spans the device:
l The purple icon tells us that some of its IP addresses are outside of the
network.
l The blue icon shows that other IP addresses are on the inside.
Since the rule that uses this host group allows access to any destination, the
outside addresses (198.168….) are allowed to enter the network with any protocol.
This is a serious vulnerability.
In this case, the likely culprit is a typing error: the administrator probably planned
to type "192" (which is an inside address) and mistakenly typed "198".
Tip: Click on the icons in the IP ADDRESSES column to see where the IP
addresses are located in the Connectivity Diagram.
l In the Analysis Summary area, click links to drill down to rules, services, and host
groups.
l In the Risk Levels and Security Rating Trend graphs, view data about the risks on
the device over time.
In the Findings table below the graphs, view details about each risky rule found.
Additionally, do any of the following:
Sort the table Click in each column to sort the table by that column.
View rule Click the rule number to drill down to more details about that rule.
details
View risks Risks are shown as colored boxes in the Risks column, indicating
the number of risks in each severity for the rule described in that row.
For example, the following image shows that there is 1 risk with
critical severity, 4 with medium, and 5 with suspected high.
Click a colored box to drill down to the selected risky rule and its
risks. For more details, see Risks and vulnerabilities in AlgoSec
Firewall Analyzer reports.
Click a colored box to drill down to the selected risky rule and its
vulnerabilities. For more details, see Risks and vulnerabilities in
AlgoSec Firewall Analyzer reports.
Note: Vulnerabilities with a CVSS score of 0 are ignored.
When you click a colored box in the Risks or Vulnerability Score column on the Risky
Rules page, the page is refreshed with details about the selected risky rule only, and
risks and vulnerabilities for that rule are shown in tabs below.
For example:
l Switch back and forth between the tabs as needed, and continue to drill down to
view additional information.
l Use the breadcrumbs at the top of the page or the RISKY RULES menu item at
the left to jump back to the main risky rules table.
l Click the Vulnerability Score Legend link above the Findings table for details
about vulnerability score colors.
Note: Vulnerabilities are displayed only if you have AppViz configured with
vulnerability scanners in the AppVizAdministration area.
Risky rules for Palo Alto Networks Panorama and Juniper SRX devices
The Risky Rules page is not included for VSYS/LSYS-level reports on the following
device types:
For these devices, the Risky Rules page is provided for VR reports only, because risky
rules only trigger risks on VRs that route traffic.
Note: VSYS/LSYS reports do include all the risks for each of its VRs in the Risks
page. For details, see RISKS page.
The Regulatory Compliance page provides the following regulatory compliance reports:
l Sarbanes-Oxley
l ISO/IEC 27001
l NIST SP 800-171
l NIST SP 800-53
l NIST SP 800-41
l Basel-II
l ASD ISM
l MAS TRM
l HIPAA
l GDPR
To view a training video that follows an Information Security Officer preparing for an
annual PCI-DSS audit and involves analyzing different sets of reports, see Performing
Compliance and Risk Analysis Using AFA Reports.
This page follows the item numbering and instructions of PCI DSS v3.2 audit
procedures, and fills in any data that is already available to AFA. Using this report can
save you hours of work when you need to prepare your annual or quarterly PCI DSS
compliance report.
If AppViz is being used with a vulnerability scanner, this report can be configured to
display the vulnerability of PCI applications. Requirement 6.1 specifies whether AppViz
is being used and whether vulnerability scanner integration is enabled. If you configure
the PCI zone and a vulnerability threshold in AFA, the requirement additionally specifies
the servers in the PCI zone and the vulnerability assessment for all AppViz applications
which intersect the PCI zone.
Sarbanes-Oxley
This report explains how your current AFA configuration settings support CobiT 5
control objectives and COSO components. Use this report to learn how well you are
doing, and to present to your auditors as needed.
The first part of the report deals with automation and monitoring, and the control
objectives that require them. The report tabulates the details of the AFA automation
capabilities that you have turned on.
The next part of the report deals with risk management, and the control objectives that
relate to risk. In this part you can see the general risk management settings you have in
place, followed by the full list of all the risks that AFA searched for in the current report.
The Status column tells you if the risk was found (indicated with a red X) or if your
device is compliant with respect to this risk (indicated with a green check mark). All risks
that are found appear with their details in the AFA front page.
ISO/IEC 27001
This page follows the item numbering and instructions of ISO/IEC 27001:2013
International Standard "Information technology - Security techniques - Information
security management systems - Requirements" and of the companion ISO/IEC
27002:2013 "Code of practice for information security management" International
Standard, and fills in any data that is already available to AFA. Using this report can
save you hours of work when you need to prepare your annual or quarterly ISO/IEC
27001 compliance report.
This report addresses the requirements that apply to devices, filtering routers, and
VPNs, as specified in NERC Standards CIP-002-2, CIP-003-2, CIP-004-2, CIP-005-2,
and CIP-007-2. Compliance with these requirements is required of all NERC-registered
entities by June 30, 2010, and this report can save auditors time when compiling CIP
documentation.
The requirement numbers listed in the report are aligned with those specified in the
relevant NERC Standards.
NIST SP 800-171
The AlgoSec Firewall Analyzer compliance report for NIST Special Publication 800-171
uses the National Institute of Standards and Technology (NIST) document Protecting
Controlled Unclassified Information in Nonfederal Information Systems and
Organizations, Revision 1 (June 2015).
(i) when the CUI is resident in non-federal information systems and organizations;
(ii) when the information systems where the CUI resides are not used or operated by
contractors of federal agencies or other organizations on behalf of those agencies;
(iii) where there are no specific safeguarding requirements for protecting the
confidentiality of CUI prescribed by the authorizing law, regulation, or government wide
policy for the CUI category or subcategory listed in the CUI Registry.
NIST SP 800-53
The AlgoSec Firewall Analyzer NIST Special Publication 800-53 Compliance report
uses the National Institute of Standards and Technology (NIST) Security and Privacy
Controls for Federal Information Systems and Organizations , Revision 4 (April 2013).
FIPS Publication 200, Minimum Security Requirements for Federal Information and
Information Systems , is a mandatory federal standard developed by NIST in response
to FISMA. To comply with the federal standard, organizations first determine the security
category of their information system in accordance with FIPS Publication 199,
Standards for Security Categorization of Federal Information and Information Systems,
derive the information system impact level (High, Moderate or Low) from the security
category in accordance with FIPS 200, and then apply the appropriately tailored set of
baseline security controls in NIST Special Publication 800-53, Security and Privacy
Controls for Federal Information Systems and Organizations.
NIST SP 800-41
The AlgoSec Firewall Analyzer NIST Special Publication 800-41 Compliance report
uses the National Institute of Standards and Technology (NIST) Guidelines on Firewalls
and Firewall Policy , Revision 1 (Sep 2009).
This report uses the Information Security IT Booklet issued by the Federal Financial
Institutions Examination Council (FFIEC) in order to comply with the GLBA Safeguards
Rule (section 501(b)).
Basel-II
ASD ISM
This page describes how well your current AFA configuration settings comply with the
Australian Signals Directorate's strategies to mitigate targeted cyber intrusions.
Like the AlgoSec Sarbanes-Oxley report, this page explains how your current AFA
configuration settings support CobiT 5 control objectives, in the Japanese language.
Use this report to learn how well you are doing, and to present to your auditors as
needed.
The first part of the report deals with automation and monitoring, and the control
objectives that require them. The report tabulates the details of the AFA automation
capabilities that you have turned on. The next part of the report deals with risk
management, and the control objectives that relate to risk. In this part you can see the
general risk management settings you have in place, followed by the full list of all the
risks that AFA searched for in the current report. The Status column tells you if the risk
was found (indicated with a red X) or if your device is compliant with respect to this risk
(indicated with a green check mark). All risks that are found appear with their details in
the AFA front page.
Note: If you see the titles of the risk items in English it means that you are using the
English language pack.
MAS TRM
This page describes how well your current AFA configuration settings comply with the
Technology Risk Management Guidelines issued by Monetary Authority of Singapore
dated June 2013.
HIPAA
This page describes how well your current AFA configuration settings comply with the
Security Rule of the Health Insurance Portability and Accountability Act issued on
February 20, 2003. The AlgoSec interpretation of the HIPAA act relies on both NIST SP
800-66 Revision 1, and The HIPAA Security Information Series.
GDPR
To view a training video that follows an Information Security Officer optimizing his
organization's firewall policies, see Performing Policy Optimization
(https://portal.algosec.com/en/training_academy/policy_optimization_online_training).
In the Policy Optimization page, you can view the rules and objects which diminish your
policy's effectiveness and efficiency. Additionally, a graphic display of the number of
unused, time-inactive, un-logged and rules already covered by other rules is provided.
When you click on a link in the Rules Cleanup area all of the relevant rules appear. The
columns which appear for each rule are specific to each device brand. If AppViz is
licensed, fields from AppViz appear, indicating business information such as which
rules are included as flows in which applications.
Below is a description of the different areas of the Policy Optimization page, including a
summary of the types of rules and objects that can make a policy perform sub-optimally:
Rules Cleanup
Rules Cleanup enables the user to make your policy more streamlined and effective. It
may include the following:
Unused rules
Rules that did not match any traffic according to the log data. By default, log data is kept
for 60 days back. For Check Point and Juniper, this analysis is based on the collected
logs. For Cisco Routers, AFA recognizes unused rules based on the access-list match
counters.
Note: The match counters are collected every time the analysis runs, and their
values are saved by AFA to allow long-term usage analysis (even when the device
resets and counters are cleared).
If FireFlow is installed, you can open a FireFlow change request to disable these rules
directly from the report. See Disabling Device Rules (see Disabling Device Rules).
Covered rules
Rules that are covered by other, more general rules. A rule is covered if there is a
combination of rules that are located above it in the rule set that together match all the
traffic that could have been matched by the covered rule. As long as a rule is covered by
other rules, it will never match any traffic. Therefore, covered rules are good candidates
for elimination from the policy.
If FireFlow is installed, you can open a FireFlow change request to disable these rules
directly from the report. See Disabling Device Rules (see Disabling Device Rules).
Clicking the Covered rules link will display each covered rule in a separate table along
with the rules that cover it. The covered rule is at the bottom of the table (shaded in light
gray).
Rules that are included in a subsequent rule and can therefore be removed.
If FireFlow is installed, you can open a FireFlow change request to disable these rules
directly from the report. See Disabling Device Rules (see Disabling Device Rules).
Note: When determining whether a rule is a redundant special case rule, AFA
checks that both the rule and the subsequent rule that includes it have the same
logging setting (enabled or disabled). If the setting is different, the rule will not be
listed as a redundant special case rule. The logging setting is also examined when
checking whether a rule is a consolidate rule. However, this setting is ignored for
covered rules. If the traffic is caught by the first rule, it does not matter whether
logging is enabled for the second rule, since the second rule will never be activated,
Consolidate rules
Rules that can be consolidated into one rule because they are identical except for one
field: source, destination or service. The rules that AFA recommends to consolidate will
always be allowing rules.
If FireFlow is installed, you can open a FireFlow change request to consolidate rules on
Cisco Firewalls directly from the report. If desired, you can edit the AFA
recommendation before opening the change request. See Consolidating Device Rules
(see Consolidating Device Rules).
Unrouted rules
Rules that are not routed through the device. A rule is unrouted if the entire source is not
in the source zone, or the entire destination is not in the destination zone. Removing
these rules will not affect the device's effective security policy.
Clicking the Unrouted rules link will display the rules in a table. The objects that are not
in their respective zone appear highlighted.
Note: Unrouted rules are only supported for Juniper SRX, Juniper Netscreen,
Juniper NSM, Palo Alto Networks, and Fortigate devices. Fortigate devices are not
supported when defined in AFA via FortiManager, and SRX devices are not
supported when defined in AFA, via Juniper Space.
Rules with source objects that are not in the source zone or destination objects that are
not in the destination zone. Removing these objects from the rules will not affect the
device's effective security policy.
Clicking the Unrouted objects within rules link will display the rules in a table. The
objects that are not in their respective zone appear highlighted.
Note: Unrouted objects within rules are only supported for Juniper SRX, Juniper
Netscreen, Juniper NSM, Palo Alto Networks, and Fortigate devices. Fortigate
devices are not supported when defined in AFA via FortiManager, and SRX devices
are not supported when defined in AFA, via Juniper Space.
Disabled rules
Time-inactive rules
Time Inactive Rules are rules that only apply at certain dates or times - and are inactive
at the time of analysis. Such rules are often leftovers from fix-time projects and
temporary patches, and may be candidates for elimination.
Rules without logging are rules that do not produce log records when they match
packets. Many organizations require all, or nearly all, rules, to produce logs, thus a list of
rules without a log keyword may let you ensure that your policy complies with your
organization's requirements. With the exception of Cisco devices, these rules are
always excluded from the list of unused rules since an absence of log records does not
confirm that no traffic was matched.
Note: For Cisco devices, AFA does not rely on logs to determine if a rule is unused.
These rules are rules that do not have comments. Many organizations require all rules
to have a comment indicating who wrote the rule, when, why, and with whose
authorization. For Cisco Routers, AFA recognizes rules with empty comments based on
Many corporate policies dictate that rule comments must contain the ID number for the
change request for which the rule was created or changed. AFA allows specifying a
regular expression that matches these ticket numbers, and then presents the rules with
non-compliant comments (no ticket number).
To configure this functionality, complete the Report rules whose comment field... field
in the General sub-tab of the Options tab in the Administration area. For Cisco Routers,
AFA recognizes rules with non-compliant comments based on "set access-list remark"
statements.
Rules with a time clause are rules that only apply at certain dates or times. Such rules
may become redundant when their activity time passes (In which case they will be
reported also as Time Inactive Rules).
These are rules that will expire within a certain number of days. To configure the
number of days before expiration that a rule should be flagged as About to Expire,
complete the Days before expiration alerts field in the General sub-tab of the Options
tab in the Administration area. The default is 14 days.
Unused NAT rules are rules that, according to the device logs, are not used by the
device.
Redundant NAT rules translate traffic that is not permitted by any of the device policy
rules.
Unused objects within rules Rules containing objects that have not been used
recently.
Policy tuner analysis for all Usage information about all rules.
rules
Expired Any VPN user whose access expiration date occurred before the
users report's date is flagged as Expired.
Users Any VPN user whose access expiration date is a certain number of
about to days after the report's date is flagged as About to Expire. To configure
expire the number of days before expiration that a VPN user should be flagged
as About to Expire, complete the Days before expiration alerts field in
the General sub-tab of the Options tab in the Administration area.
Unattached VPN user groups that do not appear in any rule in any policy that is
user managed by the Check Point SmartCenter or CMA are flagged as an
groups Unattached User Group.
Unattached Any VPN user that does not belong to any user group is flagged as
users Unattached. Such users do not have any real VPN access since no rule
can refer to them.
Unused rules Application control rules that did not match any traffic
according to the log data.
Rules without logging Application control rules that do not produce log records
when they match packets.
All rules usage (count, Usage information about all application control rules.
last date)
Rule Reordering
These areas provide recommendations for optimizing the device rules for best
performance and lower CPU utilization, an estimate for the device's performance, and
suggestions for improving the performance with the most effective rule reordering. For
more information, see Reordering Rules (see Reordering Rules).
1. View the desired device's device report. For details, see View AFA device data.
l In the first column, select the check boxes next to the objects you want to
remove.
l Select the check box in the table heading to select all objects.
The change request is created, and a notification appears with a link to the change
request.
Note: When you remove more than one object, one change request is opened
with multiple object lines.
6. Click OK.
If FireFlow is installed, you can consolidate rules on Cisco ASAdevices directly from the
Policy Optimization page, by doing the following:
1. Open a FireFlow change request to add one or more consolidated rules, using the
procedure below.
l Download a CSV file which you can edit and then use to manually open the
You can manually open the change request with the the 190:Verbatim Rule
Addition request template or any custom template/workflow for adding rules
to devices.
Once the change is implemented on the device, the next AFA report will
automatically identify the original rules as redundant. They will appear in the
report as Redundant special case rules.
2. Remove the redundant rules by opening another change request from the new
report. See Disabling Device Rules (see Disabling Device Rules).
Note: The original rules will only be marked as Redundant special case rules if
there are no rules with a "deny" action below the lowest original rule.
1. If not already configured, enable the Access Lists traffic field to the 190:Verbatim
Rule Addition FireFlow change request template, by doing the following:
Note: When opening the change request directly from the AFA report, this is
the only request template that can be used. If you use the AFA provided CSV
file to manually open a change request (an option discussed below), you can
use the 190:Verbatim Rule Addition template or any custom template for
adding rules to devices. The Access Lists traffic field must be enabled in the
template you use.
d. In the Traffic area, click the +Add or remove traffic fields link.
f. Click Save.
2. In AFA, view the desired device's device report. For more details, see View AFA
device data.
The consolidated rules appear. Each table represents a single consolidated rule
and shows the existing rules it could replace.
Each table of rules represents a group of rules you can consolidate into a single
rule.
You can choose all or only some of the rules from a table. Choosing rules from
multiple tables will create a single change request for adding multiple
consolidated rules, one for each table.
l To edit the consolidated rules before opening the change request, do the
following:
4. Populate the traffic area of the change request by clicking the Import
traffic from CSV link and selecting the consolidated rules CSV file.
5. Complete the other fields in the template and submit the change
request.
If FireFlow is installed, you can submit a Rule Removal request to disable redundant,
unused, unrouted, and covered rules in the device's policy, directly from the Policy
Optimization page.
1. In AFA, view the desired device's device report. For more details, see View AFA
device data.
3. Click on one of the supported rule categories (Unused rules, Covered rules,
Redundant special case rules, and Unrouted rules).
l In the first column, select the check boxes next to the rules you want to
disable.
l Select the Select All Covered Rules/Select All Unused Rules/Select All
Special Case Rules check box to select all the rules.
The change request is created and a notification appears with a link to the change
request.
Note: When you disable more than one rule, a separate change request is
created for each rule.
6. Click OK.
The Policy Optimization page's Intelligent Policy Tuner (IPT) enables you to refine your
policy, by identifying rules that are too wide and permissive, and rules which contain
sparsely used and unused objects. In addition, it provides recommendations for
replacing permissive rules with new rules that are tighter, but which still allow all traffic
If desired, you can change how IPT generates recommendations for replacing
permissive rules.
Note: The Intelligent Policy Tuner is only available for devices on which Extensive
logging has been enabled. To enable Extensive logging, add or edit the desired device,
and in the Log Analysis column, select Extensive.
Note: Generating recommendations for replacing permissive rules may take a while,
thus extending the report generation time. If desired, you can disable this feature. .
To refine rules
1. In the Policy Optimization page's Intelligent Policy Tuner area, do one or more of
the following:
Icons appear next to the objects in each rule, indicating the object's degree
of use. You can mouse-over the icons to view the exact percentage of use.
Objects that are sparsely used and include many unused IP addresses or
services are highlighted in blue. It is recommended to refine these objects'
definitions.
l To view unused objects that appear within rules, click Unused objects within
rules.
The table displays a list of rules containing objects that have not been used
recently. For information on the columns, see the table below.
l To view all rule usage, click Policy tuner analysis for all rules.
A table displays a list of all rules. For information on the columns, see the
following table.
Icons appear next to the objects in each rule, indicating the object's degree
of use. You can mouse-over the icons to view the exact percentage of use.
SERVICE The device object representing the service for the connection.
LAST DATE The latest date on which the IP address or range appeared in the
traffic logs.
PERCENTAGE The percentage of times that this rule was used, out of all rules.
Reordering Rules
The Policy Optimization page's Rule Reordering areas provide recommendations for
optimizing the device rules for best performance and lower CPU utilization, an estimate
for the device's performance, and suggestions for improving the performance with the
most effective rule reordering.
The algorithm relies upon the rule usage statistics collected from the device to compute
a RMPP (Rules Matched per Packet) score that measures the device's performance.
The RMPP is the average number of rules that are compared to filtered packets until the
device finds a match, where the average assumes the mix of packets that is observed in
the device rule usage statistics. The RMPP is closely correlated with the device’s CPU
utilization: a lower RMPP typically means a lower CPU utilization.
The intuition behind the RMPP calculation is as follows: Suppose that the rule that
ultimately matched a connection is rule number "i". Then the device spent a
computational effort testing whether the connection matched each of rules 1, 2, …, i-1,
until it arrived at rule "i", found that rule "i" matches the connection, and stopped. We
see that the computational effort to filter this connection is approximately proportional to
the sequence number "i". Therefore, to model the general computational effort the
device is spending, we calculate the mean (expected) number of rules that the device
had to check against incoming connections, when the mean is weighted using the rule
usage statistics gathered from the log data.
If there are N rules in the rule-base then the RMPP is always a number between 1 and
N. Here are some examples. If every connection is always matched by the first rule in
the rule-base then RMPP=1. Conversely, if all the connections are matched by the last
rule then RMPP=N. If neither of the extreme cases occurs then the RMPP will be a
value larger than 1 and smaller than N: E.g., if rule 1 matches 50% of the connections,
rule 10 matches 30%, and rule 25 patches 20%, then RMPP = 1*0.5 + 10*0.3 + 25*0.2 =
0.5+3+5 = 8.5. This means that, on average, for the mix of connections observed by this
device, the device compares 8.5 rules to each connection it needs to filter in order to
reach a decision.
Clearly, we should strive to reduce the RMPP: If we can lower the RMPP toward 1, it
means that on average the device will compare fewer rules to each incoming
connection, and its CPU utilization will drop accordingly.
The Rule Reordering area displays a bar chart showing the RMPP of the current device
configuration, the optimal configuration (using the same set of rules), and a midway
configuration, which can be achieved from the current configuration by up to 10, most
effective rule moves.
Clicking on the bar chart leads to the Rule Reordering page, which provides a detailed
analysis.
n Summary. Summarizes the current RMPP (Rules Matched per Packet) situation.
Note: This summary is also depicted graphically in the Policy Optimization page
in a second Rule Reordering area.
n Optimal Rule Order. Provides a complete list of all device rules, arranged in the
optimal order for best performance based on RMPP.
n Top 10 Rules to Move. A list of up to ten of the most effective steps to generate the
greatest improvement in the RMPP score. Each step is a recommendation to move
one rule to a different location on the list, and shows the projected RMPP
improvement that it will provide.
Note: The description above refers to the Check Point device screen. The screen
l Cisco – Each access list has its own Optimal access-list order (one list per
interface).
l Netscreen – Each policy list has its own Optimal Policy list.
Note: For Cisco ASA devices version 7.0 or above, access lists are
always "compiled". Consequently, the expected performance gain
obtained by reordering the rules is small.
Baseline compliance profiles are specified per device when defining the device in AFA.
POLICY Page
AFA provides various advanced capabilities that enable you to explore complex details
of your device policy. Click on the Policy tab in the report to drill down into various
aspects of your policy:
You can focus in on a sensitive host group to see which services can reach it and which
corresponding rule is responsible, by clicking the links in the one Traffic by Service
area.
The values in the Source IP addresses and Destination IP addresses columns are the
number of IP addresses impacted by the service, excluding Trusted Networks, the IP
addresses of the device interfaces, and Private IP addresses.
You can further explore where a specific service can reach by clicking its link in the
Service column.
CHANGES page
The CHANGES page provides detailed information about changes to the device, over
the whole history of AFA reports for the device. Reports include all change monitoring
supported for real-time change monitoring as well as changes to risks and baseline
compliance.
VPN page
The VPN page in the AFA report provides you with a clear view of all your VPN settings,
and gives you a single place from which to navigate and review the details of your
definitions. The report covers VPN definitions related to remote login users that are
terminated on the device, and also to point-to-point VPNs. The contents of this page
depend on the device vendor.
For Check Point devices, the VPN report consists of the following sections:
n VPN Rules: lists all the VPN rules found on the device, with links to the user groups
that are in use.
n User Groups: lists all the user groups, with links to the rules each group participates
in, and the users that belong to the group.
n Users: lists all the users defined on the device, each with its authentication and
encryption parameters and expiration date, with links to all the groups each user
belongs to.
n Communities: lists all the VPN communities, each with all the member devices.
For Juniper, the VPN report includes the VPN Rules, VPN Tunnels, IKE Information,
User Groups and Users definitions.
For Cisco ASA devices, the VPN report includes the Crypto maps, Transform sets, and
IKE Policy.
The VPN report page is not available for Forcepoint (McAfee) Security Management
Center, Forcepoint (McAfee) SideWinder, F5 Big-IP, Juniper Space, Fortinet, and
Hillstone devices.
Note: The Policy Optimization page also contains information which is relevant to
VPN management. Specifically, it contains a list of expired users, unattached user
groups, and unattached users. See the Policy Optimization Page (see
POLICY OPTIMIZATION page).
Note:
Support for the Forcepoint brands (Sidewinder, StoneGate) and Hillstone was
deprecated in ASMS version A30.00.
If you had defined these devices in an earlier version of ASMS, these devices are
still available to you, with all the existing capabilities, but you cannot add new ones
after upgrading.
We recommend backing up device data before or after upgrading and then removing
these devices from AFA. Make sure to download any report zip files for the device
before deleting.
The Groups menu appears in the main menu, displaying all of the groups defined
in AFA. Groups for which the last report generation failed appear in red. Groups for
which real-time monitoring or log collection have failed appear in orange.
a. Type part or all of the desired group's name in the Search field.
The device tree appears with the search results. Device results appear with
the group to which they belong. Group results appear with their device
members collapsed.
3. (Optional) To filter out the groups with issues, do one of the following:
2. Clear the check boxes of the issues you do not want to appear in the
filtered results.
The device tree appears with only devices with issues and their group. If you
specified which issues should appear, only those issues appear.
For details of the information displayed at the top of the workspace, see Group
Information Fields (see Group Information Fields).
You can view the individual devices in the group by selecting them in the in the
menu.
Latest Report A button that brings you to the last successful report generated for
this group.
Date and Time The date and time when the group was last analyzed.
The Devices menu appears in the main menu, displaying all of the devices
defined in AFA. Devices for which the last report generation failed appear in red.
Devices for which real-time monitoring or log collection have failed appear in
orange.
For information on the fields displayed at the top of the workspace, see Group
Information Fields (see Group Information Fields).
1. View the desired group. For details, see Viewing User-Defined Groups.
The Overview tab displays a preview of the latest report for the group.
at the top of the page signify the status of their last process:
2. When the last analysis succeeded, view the report by do one of the following:
The latest report opens, displaying the report's Home page in the
workspace.
l Within the Overview tab, click on the report section you want to view.
The latest report opens, displaying the specified section in the workspace.
The report menu appears in the left pane, and the selected page appears in
the workspace. You can navigate between the different pages of the report
by selecting the page in the report menu. For information on each of the
various report pages, see Group report pages.
All report pages are structured to allow drilling down from a high-level
overview to low-level, detailed information. Any item that appears underlined
when you hover over it can be clicked for further details.
3. When the last analysis succeeded, you can view support files for it by doing the
following:
1. View the desired group. For details, see Viewing User-Defined Groups.
The Reports tab appears, displaying all of the available reports for the group.
Reports that were successfully generated are marked with a . Reports that are
currently being generated are marked with a . Reports for which generation failed
are marked with a .
l To view a report without downloading it, in the Report column, click on the
desired report's name.
l To download a report to your computer, in the desired report's row, click Zip.
The compressed report downloads to your computer. Unzip the report to view it.
The report menu appears in the left pane, and the selected page appears in the
workspace. You can navigate between the different pages of the report by
selecting the page in the report menu. For information on each of the various
report pages, see Group Report Pages (see Group report pages).
All report pages are structured to allow drilling down from a high-level overview to
low-level, detailed information. Any item that appears underlined when you hover
over it can be clicked for further details.
Page Description
POLICY OPTIMIZATION page Find out what you can eliminate from each
device's policy to optimize it and make it more
efficient and maintainable.
Page Description
For more details, see View AFA group data, View AFA device data, and Device report
pages.
HOME page
The Home page provides an overview of the group report. The page's content depends
on your AFA modules.
RISKS page
The Risks page summarizes all risk analysis findings by providing the following:
The security rating indicates the group's degree of compliance with security standards.
A security rating of 100% indicates full compliance.
l The total number of risks in each severity category, not counting duplicates.
The list includes a brief summary of each threat: the risk, its trigger count (the number of
times it was detected), and a brief description. The New label indicates risks that were
not present in the previous report.
l A visual representation of the risks per device, with each device's security rating.
To access an individual device's report, in the Lowest Security Rating area, click on the
device's name.
For further information about the Risks page, see RISKS page.
l Payment Card Industry Data Security Standard (see Payment Card Industry Data
Security Standard (PCI DSS))
l NERC Standards for Critical Infrastructure Protection (see NERC Standards for
Critical Infrastructure Protection (NERC CIP))
For more information on using this page, see Policy Optimization Page (see
POLICY OPTIMIZATION page).
POLICY page
The Policy page enables you to drill down into various aspects of your policy.
CHANGES page
The Changes page provides detailed information about changes to the devices in the
group, over the whole history of AFA reports for the group.
Viewing Matrices
To view information about a matrix:
The Matrices menu appears in the main menu, displaying all of the matrices
defined in AFA. Matrices for which the last report generation failed appear in red.
Matrices for which real-time monitoring or log collection have failed appear in
orange.
a. Type part or all of the desired matrix's name in the Search field.
The device tree appears with the search results. Device results appear with
the matrix to which they belong. Matrix results appear with their device
members collapsed.
3. (Optional) To filter out the matrices with issues, do one of the following:
2. Clear the check boxes of the issues you do not want to appear in the
filtered results.
The device tree appears with only devices with issues and their matrix. If you
specified which issues should appear, only those issues appear.
For details of the information displayed at the top of the workspace, see Group
Information Fields.
You can view the individual devices in the group by selecting them in the in the
menu.
The Overview tab displays a preview of the latest report for the matrix.
at the top of the page signify the status of their last process:
2. When the last analysis succeeded, view the report by do one of the following:
The latest report opens, displaying the report's Home page in the
workspace.
l Within the Overview tab, click on the report section you want to view.
The latest report opens, displaying the specified section in the workspace.
The report menu appears in the left pane, and the selected page appears in
the workspace. You can navigate between the different pages of the report
by selecting the page in the report menu. For information on each of the
various report pages, see Matrix Report Pages (see Matrix report pages).
All report pages are structured to allow drilling down from a high-level
overview to low-level, detailed information. Any item that appears underlined
when you hover over it can be clicked for further details.
3. When the last analysis succeeded, you can view support files for it by doing the
following:
The Reports tab appears, displaying all of the available reports for the matrix.
Reports that were successfully generated are marked with a . Reports that are
currently being generated are marked with a . Reports for which generation failed
are marked with a .
l To view a report without downloading it, in the Report column, click on the
desired report's name.
l To download a report to your computer, in the desired report's row, click Zip.
The compressed report downloads to your computer. Unzip the report to view it.
The report menu appears in the left pane, and the selected page appears in the
workspace. You can navigate between the different pages of the report by
selecting the page in the report menu. For information on each of the various
report pages, see Matrix Report Pages (see Matrix report pages).
All report pages are structured to allow drilling down from a high-level overview to
low-level, detailed information. Any item that appears underlined when you hover
over it can be clicked for further details.
Some report pages include information about the devices. For more details, see View
AFA device data and Device report pages
Page Description
Page Description
POLICY OPTIMIZATION page Find out what you can eliminate from each
device's policy to optimize it and make it more
efficient and maintainable.
HOME page
The Home page provides an overview of the matrix report. The page's content depends
on your AFA modules.
RISKS page
The Risks page summarizes all risk analysis findings by providing the following:
Note: The risks which appear are associated with traffic that is allowed across all
devices in the matrix. If one of the devices in the path blocks the traffic, the risk does
not appear.
l The security rating for the matrix. The security rating indicates the matrix's degree
of compliance with security standards. A security rating of 100% indicates full
compliance.
l The total number of risks in each severity category, not counting duplicates.
The list includes a brief summary of each threat: the risk, its trigger count (the
number of times it was detected), and a brief description. The New label indicates
risks that were not present in the previous report.
l A visual representation of the risks per device, with each device's security rating.
To access an individual device's report, in the Lowest Security Rating area, click
on the device's name.
l Payment Card Industry Data Security Standard (see Payment Card Industry Data
Security Standard (PCI DSS))
l NERC Standards for Critical Infrastructure Protection (see NERC Standards for
Critical Infrastructure Protection (NERC CIP))
POLICY page
The Policy page enables you to drill down into various aspects of your policy.
CHANGES page
The Changes page provides detailed information about changes to the devices in the
matrix, over the whole history of AFA reports for the matrix. The information is divided
into policy changes and risk profile changes.
AFA uses the graphic network map when running traffic simulation queries on groups;
therefore, it is important to ensure that the map is correct and that it includes all relevant
network elements (especially routers). If necessary, you can modify the graphic network
map to better reflect the network architecture.
Note: From the network map, you can run a routing query to see the devices in the
path without policy simulation. For details, see Run a routing query
Do the following:
1. View the device, group, or matrix you want to zoom in on. For details, see View
AFA device data, View AFA group data, and View AFA matrix data.
All of your devices are shown in the map, but the map centers on the device,
group, or matrix you selected.
Note: Management devices are not displayed in the map. Instead, the map
shows each individual device, even if it's managed by a management device.
Note: A score for the completeness of the network map appears at the bottom of the
map. For more details, see Modify the graphic network map.
Resize to fit To resize the graphic network map to fit the screen, click .
Pan across On the direction control button, click the arrow pointing in the direction
the screen you want to take.
If the cursor is not in Pan mode, switch by clicking . Then, click the
map and drag it in the desired direction.
1. Hover over the element. If there's any details available, a tooltip appears
displaying the information.
For example:
2. If the element is a cloud, and the tooltip states that additional information is
available, either double-click the cloud, or right-click the cloud and select View
Ranges.
The Cloud Ranges window appears displaying the cloud's IP address ranges.
The latest report opens in the new window. For more details, see View AFA device
data.
2. In the Route Lookup dialog, enter the IP address you want to view the route to.
l To hide the neighborhood, double-click the device again, or right-click and select
Collapse.
l To return to the default view, double-click the device or right-click and click
Expand.
Hidden elements will be exposed in the map they are relevant to a search or Route
Lookup.
l The elements that make up the AWS or Azure account will appear in the map as
individual icons, and traffic simulation queries benefit from the routing information
within the system. For Azure, you must first configure this manually.
l The network elements represented in the map include VPC / VNet routers, VPC /
VNet peerings, internet gateways, and VPN gateways.
l The subnets coming off the the VPC / VNet router include the containers.
Note: Private cloud devices (VMware NSX and Cisco ACI) do not appear in the
graphic network map.
Element Description
An MPLS tunnel.
l If only one endpoint of the tunnel is defined in AFA, the IP address of
the inferred router is displayed in brackets under the tunnel icon.
l If both endpoints of the tunnel are defined in AFA, the IP addresses
of each endpoint appear in brackets under the tunnel icon.
Mouse over to view the tunnel's CIDR and route target.
Element Description
A router that was created by merging more than one router in the graphic
network map.
1. In the text box above the map, type the IP address, subnet or device name you
want to search for, then press Enter.
The first occurrence of the search input is selected in the network map. The total
number of occurrences and the number of occurrences that are clouds are
specified.
If multiple occurrences are clouds, the Merge Clouds link appears, enabling you to
easily merge any or all of the clouds. For more information on merging clouds, see
Merging Clouds.
1. View the graphic network map. For details, see View the network map.
2. Click .
The graphic network map is exported to an *.svg file and can be opened and/or
saved to your computer.
Note: The accuracy of AFA traffic simulation queries affects FireFlow whenever
FireFlow uses query results, for example, in Initial Planning.
For instructions for how to perform basic map actions, see Modify the graphic network
map.
Match a Risk Profile to Your Topology: Watch to learn about applying risk profiles
If the neighborhood of a device (network map elements which do not connect two
devices) is visible, clicking on a device automatically highlights all neighborhood
elements.
Select multiple Use the SHIFT or CTRL keys to select multiple elements
elements simultaneously.
To select all elements within a specific area on the map, press
the SPACEBAR and drag a selection area around the
elements you want to select.
Clear the selection If you have multiple elements selected, press SHIFT or
on a single element CTRL and click on a specifically selected element to clear the
selection on that element.
Clear the selection Either click any open space in the network map, or select a
on multiple selected new element.
elements The selection is cleared on all previously selected elements.
Merge routers
If the same router appears twice in the graphic network map, you may want to merge the
two instances.
To merge routers:
1. View the graphic network map. For details, see AFA's graphic network map.
2. Select the two routers you want to merge. For details, see Modify the graphic
network map.
3. Right-click on one of the selected routers, and then click Merge Routers.
4. In the New Device name field, type a name for the merged router.
5. Click OK.
The routers are merged. The routers appear as a single merged router in the map.
6. Click Save.
Note: To ensure that subsequent activity is based on the updated map, save
immediately.
7. Click OK.
Note: You can also add a routing element to AFA as you would add any other
device.
1. View the graphic network map. For details, see AFA's graphic network map.
2. Right click on the router you want to define as a monitoring device, and then click
Define as Routing Element.
The Devices setup page appears with the IP address field pre-filled.
Merging Clouds
If the same cloud appears twice in the graphic network map, you may want to merge the
two instances.
1. View the graphic network map. For details, see AFA's graphic network map.
3. If you used the Merge Clouds link, select the clouds to merge.
4. In the New Cloud name field, type a name for the merged cloud.
5. Click OK.
6. Click Save.
Note: To ensure that subsequent activity is based on the updated map, save
immediately.
7. Click OK.
1. View the graphic network map. For details, see AFA's graphic network map.
3. Click Save.
4. Click OK
To rename elements:
1. View the graphic network map. For details, see AFA's graphic network map.
2. Right-click on the element you want to rename, and then click Rename.
3. In the Type Name field, type a new name for the element.
4. Click OK.
5. Click Save.
6. Click OK.
Note: Moving edges directly is not supported. Edges move automatically when the
element to which they are connected is moved.
Note: An element will remain in its position for the remainder of the session, even if
the map is not saved, and even if you navigate away from the map.
To move an element:
l Click on the desired element and drag it to the desired location on the map.
1. View the graphic network map. For details, see AFA's graphic network map.
2. Right-click on the edge that represents the interface you want to remove.
To place or remove L2 devices from the perspective of the subnet (transit network or
computer network), see Placing Any L2 Devices into a Subnet or Removing L2 Devices
from a Subnet.
You can place an L2 device into a subnet directly from the main menu. In the main
menu, unplaced L2 devices appear orange.
Note: This procedure is only for L2 devices that appear in the main menu. If the L2
device does not appear in the main menu, see Placing Any L2 Devices into a
Subnet.
4. Click OK.
You can optionally place L2 devices from the perspective of the subnet. You can
perform the following actions:
l Place any L2 devices into a subnet that do not appear with a Place now link in the
main menu
1. In the map, right click the subnet (either a computer network or transit network).
A menu appears.
3. Select one or more devices from the Device list, or perform a search by typing into
the field.
4. Click OK.
5. Save the map. For details, see Saving the Graphic Network Map.
1. In the map, right click the subnet whose devices you want to remove.
A menu appears.
3. Save the map. For details, see Saving the Graphic Network Map.
Note: Unsaved changes are reflected in the map but will not be reflected in queries
or route lookups.
1. View the graphic network map. For details, see AFA's graphic network map.
2. Click Save.
3. Click OK.
1. View the graphic network map. For details, see AFA's graphic network map.
3. Click OK.
1. View the graphic network map. For details, see AFA's graphic network map.
Overview
Once AFA has analyzed a device, group, or matrix, you can issue your own traffic
simulation query to be tested against the policy. When running a traffic simulation query
on a group or matrix, AFA finds the devices in the path of the traffic, using the graphic
network map, and queries all these devices. If traffic is blocked by the device, you can
determine which rules block it. This provides you with a powerful help desk support
functionality. Furthermore, using the traffic simulation query feature allows users to
determine whether the devices are protecting the organization's networks against traffic
from a new exploit, or which device is letting a particular type of traffic through.
NAT is fully supported for traffic simulation queries on groups of devices. When finding
the devices in the path of the traffic for a group, AFA supports both NAT and Proxy ARP.
AFA predicts the devices in the path and then validates the prediction with the query
information. When the query information matches the path, the source and destination
values for all relevant devices in the path are updated. When only part of the traffic is
translated, the downstream devices are queried for both the pre- and post-NAT values.
This produces an accurate query, where no relevant traffic is ignored. If you want to run
a traffic simulation query, but you only know post-NAT values, you can look up the pre-
NAT values with which to run the query. For details, see Find NAT values.
AFA additionally provides the option to run a routing query to determine the devices in
the path, without policy simulation. Note that routing queries ignore NAT. For details,
see Run a routing query.
Do the following:
1. Verify your permissions. To run a successful query, you must have access to all
the firewalls that are relevant for your query results path. Queries will fail if the
query goes through a non-permitted device.
Users with permissions to view an entire group can run queries on the group. If
you do not have permission to view a group of devices, or the ALL_FIREWALLS
group, we recommend that you perform single-device queries on the devices you
have permissions to view. For more details, see Run traffic simulation queries on
groups.
Run a query on a device's View the device, and then continue with step
latest policy 2.
Run a query on an earlier View the device and click the Reports tab.
version of the device policy There, select the report for the time you want
to query, and continue with step 2.
4. To load a saved query, select the desired query in the Saved queries drop-down
list.
5. Specify the source and destination, by doing one or more of the following:
Enter an IP address, IP address range, CIDR, or host group name in the relevant
field (Source or Destination).
Do the following:
c. Click OK.
Note: You can run a query for the source/destination that you specify, or the
negation of the source/destination that you specify (all IPs other than the
source/destination that you specify).
6. To negate the source and/or destination that you specified, select the Negate
check box to the right of the desired field.
You can query multiple services by separating them with commas. For example:
"tcp/123, udp/9911".
Do the following:
b. You can filter the information displayed in the list, by doing one or more of
the following:
l To filter the information displayed in the list by service name, type the
desired service name in the Filter by Name field, and then click Filter.
d. Click Add.
8. (Optional) In the Query title field, type a name for the query.
The Details area displays the query results. The fields that appear for each rule
depends on the device brand. If AppViz is licensed, fields from AppViz appear,
indicating business information such as which rules are included as flows in which
applications.
If NAT is performed by the device, the NAT rules appear in tooltips in the map. For
Check Point and Cisco ASA devices which perform NAT, a table of applied NAT
rules appears below the map.
10. To open a FireFlow change request to allow the blocked traffic or block the
allowed traffic, do the following:
a. Click .
If the result of the query is Blocked, the change request will open the traffic. If
the result of the query is Allowed, the change request will block the traffic. If
the result of the query is Partially Allowed, you are prompted to chose
whether to allow or block traffic.
b. If the result of the query is Partially Allowed, select whether to block or allow
the traffic.
c. Click OK.
By default, the change request will use the default traffic change request
template (which is the Standard template, by default).
11. To export the query results to PDF, click in the top-right corner of the report. For
To export to CSV format, click in the top-right corner of the report. Follow your
AFA uses the graphic network map when querying groups; therefore, it is important to
ensure that the map is correct. For details, see AFA's graphic network map.
1. Verify your permissions. To run a successful query, you must have access to all
the firewalls that are relevant for your query results path. Queries will fail if the
Users with permissions to view an entire group can run queries on the group. If
you do not have permission to view a group of devices, or the ALL_FIREWALLS
group, we recommend that you perform single-device queries on the devices you
have permissions to view. For more details, see Run traffic simulation queries on
individual devices.
2. Do one of the following. For details, see View AFA group data.
4. To load a saved query, select the desired query in the Saved queries drop-down
list.
5. Specify the source and destination, by doing one or more of the following:
Enter an IP address, IP address range, CIDR, or host group name in the relevant
field (Source or Destination).
Do the following:
c. Click OK.
Note: You can run a query for the source/destination that you specify, or the
negation of the source/destination that you specify (all IPs other than the
source/destination that you specify).
6. To negate the source/destination that you specified, select the Negate check box
to the right of the desired field.
You can query multiple services by separating them with a comma. For example:
"tcp/123, udp/9911".
Do the following:
b. You can filter the information displayed in the list, by doing one of the
following:
l To filter the information displayed in the list by service name, type the
desired service name in the Filter by Name field, then click Filter.
d. Click Add.
8. (Optional) In the Query title field, type a name for the query.
9. (Optional) To specify that query results should be grouped by policy, and only one
device should be displayed per policy, select the Group by Policy check box.
This option is only available if grouping query results by policy is enabled in the
system.
The list of devices and the graphic network map appear. In both the map and the
list, a colored box around each device indicates whether traffic is allowed (green),
blocked (red), or partially allowed through the device (yellow). Clicking on a
device in the list will shift the map's focus to that device.
ACI, the device and relevant IP address is always represented by a single icon.
For AWS and Azure, the individual internal elements (such as VPC / VNet
routers) may additionally appear in the map.
In the map, the sources are marked with a green flag , and destinations are
marked with a checkered flag . The path between each source and
destination is marked in blue. You can zoom in, zoom out, resize the graphic
network map to fit the screen, and pan the view. For details, see AFA's graphic
network map.
The map indicates if they perform NAT with a NAT icon. Hovering over NAT
devices displays the translation information for source and destination.
Additionally, a table of applied NAT rules is displayed. If NAT is performed
before traffic reaches a device, the results specify that the source and/or
destination was modified before reaching the device.
Note: If you ran the query from the Groups tab, the query result is also stored
and attached to the report. To view it later, go to the Policy page in the report. If
you specified a query title, then this title will be shown in the Policy page.
Otherwise a default title is selected.
11. To view the list of devices by Path, in the View By drop-down list, select Path.
The devices appear according to relevant traffic paths. Each device in the path
appears sequentially, from source to destination.
12. Right click on the map frame to see (depending upon the device type) the
following selections:
l Routing Information
l Connectivity Diagram
l Latest Report
13. To open a FireFlow change request to allow the blocked traffic or block the
allowed traffic, do the following:
a. Click .
If the result of the query is Blocked, the change request will open the traffic. If
the result of the query is Allowed, the change request will block the traffic. If
the result of the query is Partially Allowed, you are prompted to chose
whether to allow or block traffic.
b. If the result of the query is Partially Allowed, select whether to block or allow
the traffic.
c. Click OK.
By default, the change request will use the default traffic change request
template (which is the Standard template, by default).
14. To export the query results to PDF, click in the top-right corner of the report. For
To export to CSV format, click in the top-right corner of the report. Follow your
l View a list of rules in each device that allow or block the traffic type.
1. Do one of the following. For details, see View AFA matrix data.
3. To load a saved query, select the desired query in the Saved queries drop-down
list.
4. Specify the source and destination, by doing one or more of the following:
Note: You can run a query for the source/destination that you specify, or the
negation of the source/destination that you specify (all IPs other than the
source/destination that you specify).
3. Click OK.
5. To negate the source/destination that you specified, select the Negate check box
to the right of the desired field.
2. You can filter the information displayed in the list, by doing one of the
following:
4. Click Add.
l To specify a service that is not defined in AFA, in the Servicefield, type the
desired service's definition.
You can query multiple services by separating them with a comma. For
example: "tcp/123, udp/9911".
7. (Optional) In the Query title field, type a name for the query.
The Details area displays the query results. The fields that appear for each rule
depends on the device brand. If AppViz is licensed, fields from AppViz appear,
indicating business information such as which rules are included as flows in which
applications.
If NAT is performed by the device, the NAT rules appear in tooltips in the map. For
Check Point and Cisco ASA devices which perform NAT, a table of applied NAT
rules appears below the map.
Note: If you ran the query from the Matrices tab, the query result also is stored
and attached to the report. To view it later, go to the Policy page in the report. If
you specified a query title, then this title will be shown in the Policy page.
Otherwise a default title is selected.
9. To export the query results to PDF, click in the top-right corner of the report. For
To export to CSV format, click in the top-right corner of the report. Follow your
4. Click OK.
Note: The results of this search include all possible translations across all NAT rules
and configurations.
1. View the desired device. For details, see View AFA device data.
3. Click .
5. Using the IP address can be check boxes, indicate whether the IP address can be
a Pre-NAT value, Post-NAT value, or both.
6. Using the Discover NAT address in check boxes, indicate whether the IP address
can be a Source, Destination, or both.
7. Click Discover.
The results indicate the device name, the potential pre- and post-NAT values, and
whether the NAT is static or dynamic.
Note: Traffic simulation queries include policy simulation and take NAT into account.
Consequently, they produce a more accurate path when NAT is involved (especially
for a group of devices). For details, see Run traffic simulation queries.
1. View the graphic network map. For details, see AFA's graphic network map.
The results appear in a new window. The path of the traffic is highlighted in blue
on the graphic network map. When hovering over the route, all devices in the path
display a tooltip that states "Traffic is routed through this device".
AFA dashboards
This section explains how to view dashboards in AFA and how to use the AlgoSec
Reporting Tool.
AFA dashboards provide the ability to quickly and easily view a summary of risks,
compliance, optimizations, and/or changes for all devices.
Note: This chart will have no data for devices which have
monitoring turned off.
Note: This chart will have no data for devices which have
monitoring turned off.
Note: This chart will have no data for devices which have
monitoring turned off.
Do the following:
The Dashboards menu expands, displaying all dashboards defined. For example:
l Red dashboards indicate that the last report generation had failed.
ART enables you to visualize ASMS data about devices, change requests, and AppViz
applications, in a variety of charts, tables, and dashboards.
Note: ART is powered by Kibana version 5.6.16. For more details, see the Kibana
resources and documentation.
Enable To enable ART for your ASMS system, you must have the ART_
ART Operation_Status parameter set to on in the AFA Administration area.
operations ART starts collecting data only from the date at which this parameter
value is defined.
User ART is available only to users who are configured for access. Non-
access to admin users who have access to ART will only see data relevant to their
ART data allowed firewalls.
Then, above the list of default AFA dashboards, click the AlgoSec Reporting Tool
link.
select a dashboard or create a new one, click the AlgoSec Reporting Tool link.
In FireFlow, click CHARTS/DASHBOARDS in the main menu on the left. Then, below
the options to select a dashboard or create a new one, click the AlgoSec Reporting
Tool link.
In AppViz, use the main menu on the left to navigate to the HOME, APPLICATIONS,
NETWORK OBJECTS, or SERVICE OBJECTS areas. Click the AlgoSec
Once in ART, do the following to view data and create charts and dashboards.
l Discover data
l Visualize data
Tip: At the bottom-left, click Collapse to collapse the ART main menu. This
provides you with more space to create and manage your data displays. Click the
Discover data
In ART, click Discover to browse ASMS data and create search queries to use in graphs
and charts. ART provides a few saved search queries out of the box, and also enables
to you create custom searches and filters.
Save your search queries, export them, or share links with others.
Tip: Alternately, start by creating graphs and then add your data. For details, see
Visualize a specific field and Visualize data.
Do the following:
2. At the top-left, click the dropdown to select the type of data you want to view.
Tip: Alternately, start with a saved search. Either click Open at the top of the
page, or click Management > Saved Objects > Searches.
If you need to, search for the name of your saved search. Click a name to load
the saved search.
3. Determine the field data displayed by adding field names to the list of Selected
l In the Available Fields area, hover over the field heading and click Add to
add it to the selected fields.
l To remove a field from this list, hover over the field heading in the Selected
Fields area and click Remove.
4. Filter the values of the fields displayed to further filter the data shown.
Do the following:
a. Above the data type dropdown, click Add a Filter . For example:
b. In the Add filter dialog, enter a field name, operator, and value.
Note: When selecting the is or is not operator, values must match actual
values exactly, and are case-sensitive.
To display a list of actual field values, click a field value header. A bar
graph expands to display the sum of each value for the field.
The field and value is added to the filter list above the data type dropdown and
field lists.
For example:
Once a field is added to the filter, hover over the field in the filter to display further
options.
Tip: At the far right, click Actions q to display these same actions for all filters
defined.
ART provides the following advanced filter editing features for experienced
Kibana or Elastisearch users.
l In the search bar at the top of the screen, enter a query syntax manually to
define the field names and values for your filter.
Click Show Latest to automatically add the Current:true field and filter out
all historical data from the data displayed.
For more details about query syntax, click the Uses lucene query syntax link
at the right of the search box.
l In the Edit filter dialog, click Edit Query DSL to manually update or copy in
an Elastisearch Query DSL to use for this field value definition.
5. At the top of the page, click any of the following to manage the filtered data:
New Discard all of your changes and start a new filter from scratch.
Save Save your filter so that you or other users can return to it later on.
Click Open to view a list of saved searches.
Tip: Full link URLs may be long. Click Copy to copy the full URL
to the clipboard, or Short URL to display a shorter URL that's
easier to share.
Date Define the date range for the data displayed. For details, see Change
selector date ranges.
Continue with creating graphs and dashboards. For details, see Visualize a specific
field, Visualize data, and Create or edit dashboards.
Do the following:
1. Hover over any filter name in the Selected or Available Fields list to display a bar
chart of the values for that field.
For example:
Visualize data
In ART, click Visualize to start by creating or loading graphs and charts and then adding
or modifying the data used.
Export, share, or embed your visualizations in other locations, or add them to ART
dashboards. For more details, see Create or edit dashboards.
Tip: Alternately, start by browsing data and then use that data to create graphs. For
details, see Discover data.
Do the following:
Tip: Alternately, click Visualize from a specific field dropdown in the Discover
area. For more details, see Visualize a specific field.
l Click the name of a saved search to display a chart based on that data.
l Click
b. Select a saved search to use as the data set, or select an index to create a
new search. For more details, see Discover data.
3. Once your chart is displayed, define the data metrics and other options for your
chart. Click to apply your changes.
Available options depend on the type of chart you're working with. For example:
4. Above the chart display, define a filter to further filter the data shown.
Do the following:
b. In the Add filter dialog, enter a field name, operator, and value.
Note: When selecting the is or is not operator, values must match actual
values exactly, and are case-sensitive.
The field and value is added to the filter list above the data type dropdown and
field lists.
For example:
Once a field is added to the filter, hover over the field in the filter to display further
options.
Tip: At the far right, click Actions q to display these same actions for all filters
defined.
ART provides the following advanced filter editing features for experienced
Kibana or Elastisearch users.
l In the search bar at the top of the screen, enter a query syntax manually to
define the field names and values for your filter.
Click Show Latest to automatically add the Current:true field and filter out
all historical data from the data displayed.
For more details about query syntax, click the Uses lucene query syntax link
at the right of the search box.
l In the Edit filter dialog, click Edit Query DSL to manually update or copy in
an Elastisearch Query DSL to use for this field value definition.
5. At the top of the page, click any of the following to manage the chart you created:
Save Save your chart so that you or other users can return to it later on.
Tip: Full link URLs may be long. Click Copy to copy the full URL
to the clipboard, or Short URL to display a shorter URL that's
easier to share.
Refresh Refresh the chart currently displayed with updated data from AFA,
FireFlow, or AppViz.
Date Define the date range for the data displayed. For details, see Change
selector date ranges.
Continue by creating dashboards that include your charts. For details, see Visualize a
specific field, Visualize data, and Create or edit dashboards.
The following filter fields are available for AppViz application data in the Discover and
Visualize areas. For more details, see Discover data and Visualize data
Field Description
Field Description
The following filter fields are available for FireFlow change request data in the Discover
and Visualize areas. For more details, see Discover data and Visualize data.
Field Description
InStatusSince The date from which a change request has been in its current
status.
Field Description
The following filter fields are available for AFA device data in the Discover and
Visualize areas. For more details, see Discover data and Visualize data
Field Description
Field Description
Field Description
Do the following:
1. Click Dashboard from the main menu on the left. ART displays a list of saved
dashboards.
Search for the dashboard you want to view, or click Create new dashboard to
Add new If you are creating a new dashboard from scratch, click Add to add
dashboard saved graphs and charts to your dashboard.
Click a visualization name to add it to the dashboard draft below.
Scroll down to view your dashboard graphs and charts.
Edit saved If you are editing a saved dashboard, click Edit at the top of the
dashboard page to modify the graphs and charts on the selected dashboard.
3. Each dashboard widget has the following options shown at the top right:
l . Open the selected chart or graph in the Visualize area for editing. For
details, see Visualize data.
To resize a widget, hover over the widget and use the corner icon shown at the
bottom right to drag the widget edges to the new size.
Table Display the widget data in table form, or export the data.
l Below the table, click Raw or Formatted to export your data.
l From the Page Size drop down, select an option to determine
the number of table rows to display.
4. When you're done customizing your dashboard, click Save and enter a name and
description for your dashboard.
Tip: Optionally, select Store time with dashboard to update the global date
range to the date range currently selected, when you edited the dashboard.
Click Cancel at the top of the page to exit the editing mode and discard your
changes.
Note: New custom dashboards created are added to the end of the list of saved
dashboards. To find yours, either scroll down the list completely, or enter the
dashboard name in the search field.
Dashboard options
Use the following additional options at the top of the page to manage your dashboard:
Tip: Full link URLs may be long. Click Copy to copy the full URL to the
clipboard, or Short URL to display a shorter URL that's easier to share.
Export to Click to save a PDF with the dashboard data currently displayed.
PDF
Mail Click to jump in to the AFA Administration area and schedule email
Schedule updates for the displayed dashboard.
Date Define the date range for the data displayed. For details, see Change
selector date ranges.
l Use the < > arrows to move back and forth between incremental date ranges.
l Click the selected date range, shown in the center of the < > arrows, to select a
more complex date range.
The Time Range area expands, providing you with a series of options of the
following types:
Quick Provides quick options, like Today, Previous month, Last 24 hours,
or Last 2 years.
Relative Enables you to define date ranges from a specified time ago or from
now, to another specified time ago or from now.
Click Go to update the data displayed based on your date range selections.
For example:
Warning: The Management area also enables you to configure the Kibana Index
and Advanced Settings that control ART functionality.
We recommend keeping the default Index and Advanced Settings to ensure that
ART continues to work as expected. For more details, see the Kibana
documentation.
Do the following:
1. From the main menu, click Management, and then click Saved objects.
l Searches. Manage saved searches. For more details, see Discover data.
l Visualizations. Manage saved graphs and charts. For more details, see
Visualize data.
Find your Browse the list or enter a name in the search field to locate your
object object.
Edit object Click an object name in the list to make changes, such as to the
settings object title.
This option also enables you manage advanced settings, such as
supporting JSON code.
We recommend making advanced changes like these only if you
are an advanced Kibana user.
Open Hover over the object name, and click the eye icon to open it
object in Discover, Visualize, or Dashboard areas.
ART
Delete Select one or more objects in the list, and click Delete to
objects delete the selected items.
In the warning dialog that appears, click Delete ... to confirm the
deletion.
Export
Select one or more objects in the list and click Export to save
JSON
details the relevant JSON data locally.
To export JSON data for all objects, click Export Everything at the
top of the page.
Import Create ART objects by importing a JSON file. At the top of the
objects page, click Import and select a JSON file to import.
Troubleshoot ART
If you run into issues when using the AlgoSec Reporting tool, you may want to check the
relevant log files.
ART-related logs are created for the Elastic, Kibana, and Logstash services in the
/var/log directory on the AFA machine.
Managing Analyses
This section describes how to manage analyses (the process of report generation). The
information applies equally to manually initiated analyses and scheduled analyses.
Overview
If an analysis is currently in progress, appears at the top of the
workspace when viewing the device/group/matrix. AFA provides the ability to manage
active analyses by doing the following:
l View the progress of a currently running analysis. For details, see Viewing the
Progress of an Active Analysis.
If the last analysis failed, appears at the top of the workspace. When an
analysis fails, AFA provides failure logs. For details, see Viewing Analysis Failure Logs.
If the last analysis succeeded, appears at the top of the workspace. When
an analysis succeeds, AFA provides support logs. For details, see Viewing Support
Files and AFA reports.
Additionally, you can view a list of all recent analyses. For details, see Viewing the
Status of All Recent Analyses.
1. View the desired device. For details, see View AFA device data
2. Click .
3. To view details of the analysis's status, click the View Status link.
The Analysis Status page appears, displaying a list of the most recent analysis
jobs.
For details about the fields in the table, see Analysis Status Fields (see Analysis
Status Fields).
Once the analysis is complete, you can use the generated report. For details, see
AFA reports.
This
column... Displays...
This
column... Displays...
Stage The status of the analysis. This can be any of the following:
l Collecting data. Data is being collected from the device(s).
l Processing. The analysis is currently running.
l Queued (no. X). The analysis is queued to run on a slave machine.
l Complete. The analysis completed successfully.
l Aborted. The analysis was aborted.
l Failed. The analysis failed.
Progress For a currently running analysis, this column displays a progress bar and
the percentage of the analysis job that has been completed.
For a completed analysis, this column displays Done and the name of the
report generated. You can click on the report name to view the report.
Aborting Analyses
If desired, you can stop an analysis that is currently running. This task can only be
performed by administrators.
1. Open the Analysis Status page. For details, see Viewing the Status of All Recent
Analyses.
The Analysis Status page appears with a table of recent analyses, including all
active analyses.
3. Click OK.
1. View the desired device. For details, see View AFA device data.
2. Click .
1. View the desired device. For details, see View AFA device data.
2. Click , , or .
For information on the fields, see Analysis Status Fields (see Analysis Status
Fields).
To view the most recent changes or changes for a specific period of time, see Viewing
Real-Time Monitoring Results.
To configure users to receive e-mail notifications when changes are detected, see the
AlgoSec Firewall Analyzer Administration Guide, Configuring Event-Triggered
Notifications.
To activate real time monitoring, see the AlgoSec Firewall Analyzer Administration
Guide, Configuring Real-Time Monitoring.
This section explains real-time monitoring results, and how to view the results.
l List of recent changes (from the last 30 days, by default). For details, see Viewing
List of Recent Changes.
l Summary of changes over a specific period of time. For details, see Viewing
Summaries of Changes for a Specified Period of Time.
1. View the desired device, group, or matrix. For details, see View AFA device data,
View AFA group data, and View AFA matrix data.
The Changes tab appears, displaying a list of recent changes for the selected
device, group, or matrix.
a. To filter by date, click the field displaying the date range, and select a time
period in the calendar which appears. You can select a beginning and end
date, or you can select one of the relative options, such as This month.
b. To filter by device, in the Device field, type the name of the desired device.
This field is not relevant for individual devices.
d. Press Enter.
The Changes Summary Report for the desired instance opens in a new tab.
Date and Time The date and time at which the change occurred.
1. View the desired device, group, or matrix. For details, see View AFA device data,
View AFA group data, and View AFA matrix data.
The Changes tab appears, displaying a list of recent changes for the selected
device, group, or matrix.
A calendar appears.
l Select a start date, select and an end date, and then click Apply.
l Select one of the relative time frame options, such as Last 7 Days or This
month.
6. To export the summary to PDF format, click . For more details, see Export
Monitored Content
The change monitoring support for each device brand varies:
l All monitoring devices are monitored for any changes to the full configuration of
the device.
l All devices which support full analyses / report generation are monitored for
changes to the following:
l Policy rules
l Device topology
l Audit logs
l For Check Point devices, the following items are additionally monitored:
l User groups
l Users
l VPN communities
l Global properties
l NAT rules
l For cloud devices (such as Amazon Web Services and Microsoft Azure), the
following specific items are monitored:
l Additional/removal of instances/ALBs/VMs
For more information about the different tiers in the device tree for cloud devices, see
Device data for cloud devices.
l Define Trusted Traffic ("white rules") to treat any type of traffic as non-threatening.
Match a Risk Profile to Your Topology: Watch to learn about applying risk profiles
l Mark the DMZs. You can identify and monitor incoming and outgoing traffic
related to the designated DMZs.
l Define external zones. In some cases there is no default route. Using the
Customize Topology feature enables you to identify the external zone of the
network.
You can customize trusted traffic from the AFA Web interface or from a device report.
For details, see Customize trusted traffic.
Customize the device's topology via View the desired device, either from the
the device page Overview or Report tabs.
For details, see View a specific device.
4. Click Topology.
Note: If you do not have the necessary permissions for customizing topology, this
button is disabled.
This page includes a connectivity diagram that shows the network configuration,
with color coding designating external (red), internal (blue) or DMZ (orange)
zones.
The table on the right lists all of the zones in the device.
b. In the zone's row, in the Type column, select the zone's type.
c. Click Apply.
b. In the zone's row, in the Logical name column, type a logical name for the
zone.
In any future reports you generate for this device, the zone will be
represented by the logical name entered.
c. Click Apply.
8. Once you are satisfied with the topology you set, click OK.
The new topology will be the default setting of the device and all future reports will
be analyzed according to this topology.
A message appears recommending that you run a new analysis for changes to
take effect.
9. Click OK.
1. View the desired matrix. For more details, see View AFA matrix data.
Note: You can perform this procedure in either the Overview or Reports tab.
2. Click Topology.
Note: If you do not have the necessary permissions for customizing the
topology, this button is disabled.
This page includes a connectivity diagram that shows the matrix's multi-tiered
topology, with color coding designating external (red), internal (blue) or DMZ
(orange) zones.
The table on the right lists all of the zones in the matrix, their types, and the
devices to which they are connected.
b. In the zone's row, in the Type column, select the zone's type.
c. Click Apply.
In any future reports you generate for this matrix, the zone will be
represented by the name entered.
c. Click Apply.
5. To view a list of IP addresses in a specific zone, in the table's Zone column, click
on the zone's name.
d. To remove an IP address from the list, select the IP address and click
Remove.
e. Click OK.
f. Click OK.
c. Specify which devices this zone is connected to, by selecting the devices in
the Firewalls pane in the Edit connectivity area, and clicking Add.
d. To remove a device from the list of devices that the zone is connected to,
select the device in the Connected to box, and click Remove.
e. Click OK.
f. Click OK.
8. Once you are satisfied with the topology you set, click OK.
The new topology will be the default setting of the matrix and all future reports will
be analyzed according to this topology.
A message appears recommending that you run a new analysis for changes to
take effect.
9. Click OK.
l To customize the device's trusted traffic via the device page, view the
desired device. For details, see View a specific device.
Note: You can perform this procedure in either the Overview or Reports
tab.
1. View the ALL_FIREWALLS group. For details, see Viewing the ALL_
FIREWALLS Group.
l To work with traffic that is trusted for all devices, click Global Trusted Traffic.
l To work with traffic that is trusted for a specific group, click Group Trusted
Traffic, then select the desired group from the drop-down list.
l To work with traffic that is trusted for the current device only, click Device-
specific Trusted Traffic.
The desired type of trusted traffic appears in a table at the bottom of the page.
Note: All changes to trusted traffic will affect the selected type of trusted traffic
only.
l To edit existing traffic, select the trusted traffic in the table and click
Edit.
b. In the Specify Trusted Traffic for Firewall area, do one of the following:
l To specify that the host group you selected should remain trusted even
if the device administrator changes the IP addresses defined by it, click
Trust future changes to the hostgroups.
l To specify that AFA should make a copy of the current definition, and
only the IP addresses listed in it should be trusted, click Only trust the
current IP addresses.
c. Select the source, destination, and service of the traffic that should be
trusted.
d. To specify an expiration date for the trusted traffic, select the Expiration Date
check box and specify the desired date.
f. Click OK.
The Global Trusted Traffic page re-appears with the new traffic listed.
5. To delete trusted traffic, select the desired traffic in the table and click Delete.
b. In the Risky Rule drop-down list, select the desired risky rule.
l To specify that the host group you selected should remain trusted,
even if the device administrator changes the IP addresses defined by
it, click Trust future changes to the hostgroup.
l To specify that AFA should make a copy of the current definition, and
only the IP addresses listed in it should be trusted, click Only trust the
current IP addresses.
d. To specify an expiration date for the trusted traffic, select the Expiration Date
check box and specify the desired date.
f. Click OK.
The Global Trusted Traffic page reappears with the new traffic listed.
7. Click OK.
A message appears recommending that you run a new analysis for changes to
take effect.
8. Click OK.
Note: Customizing a risky rule from a device report is only available when viewing
the report in the AFA Web interface, and not when viewing the downloaded report on
your computer.
1. View a report for the desired device. For details, see View device reports.
3. In the Findings table, click Trust Rule next to the desired risky rule.
The desired rule is selected in the Risky Rule drop-down list, and the relevant
traffic appears in a table at the bottom of the page.
l To specify that the rule traffic should be trusted for all devices, click Global
Trusted Traffic.
l To specify that the rule traffic should be trusted for a specific group, click
Group Trusted Traffic, then select the desired group from the drop-down list.
l To specify that the rule traffic should be trusted for the current device only,
click Device-specific Trusted Traffic.
l To specify that the host group you selected should remain trusted even if the
device administrator changes the IP addresses defined by it, click Trust
future changes.
l To specify that AFA should make a copy of the current definition, and only
the IP addresses listed in it should be trusted, click Only trust the current IP
addresses.
6. To specify an expiration date for the trusted traffic, select the Expiration Date
check box. Specify the desired date.
8. Click OK.
9. Click OK.
A message appears recommending that you run a new analysis for changes to
take effect.
Send us feedback
Let us know how we can improve your experience with the User Guide.
Email us at: [email protected]
Note: For more details not included in this guide, see the online ASMS Tech Docs.