Your Name Here

Do you manage firewalls and other network devices? Does it sometimes seem that swimming the Great Barrier Reef would be safer? Well, hop out of that shark cage. SolarWinds has the solution that will make you say, "This is so easy, I must be dreaming." Well, it is, and you're not. So, before you put on that Speedo, check out Firewall Security Manager.


PCI DSS and Rule Changes

In Firewall Security Manager (FSM), you can apply rule and traffic flow analysis to check and report on firewall compliance with the Payment Card Industry Data Security Standards (PCI DSS) requirements. FSM reports show which PCI DSS control items failed the audit, and the rules that caused the failure.

After your audit, you can track all the rule changes. Business justification for the change can be recorded and displayed in your reports. You can even use rule change history in Rule Documentation reports to track down who changed the rule that borked your audit, then go take their Skittles.

Debug Traffic Flow enables you to investigate problems in firewall configurations that involve packet flow through a device. You can identify policies, security rules, NAT rules, routes, and implied rules that affect a packet as it zips through a firewall. FSM gives you the tools to explore and debug traffic flows between /24 subnets with up to five services.

Traveling Packets

Would you like to see how packets travel through Layer 3 devices? Packet Tracer identifies all routable paths from the source to the destination, including effects of ACLs, NATs, and routes along each path. You can check if a packet will reach the destination, while you enjoy your confiscated Skittles, and even check which devices and rules within the devices are allowing or blocking the packet.

Sometimes it would be great to have the capability to validate a migration from one firewall type to another. FSM compares their traffic flows and generates a validation report that shows specific differences in policy between two compared devices. For Cisco to Check Point firewalls, use the FSM step-by-step migration wizard.

Standard Naming

Don't you wish you had standardized object naming conventions across an entire set of devices? Sure you do. With FSM you can identify objects that have the same name but different definitions, or objects that have different names but the same definition. Automate finding and eliminating object definition conflicts across multiple firewalls. You can split object definitions into two or more separate definitions, combine object definitions, and apply other object restructuring changes. FSM generates scripts and uses the scripts to modify the existing configuration to use the new standard object definitions.

Wait, that's not all. Watch this blog for information on how to run FSM reports from Network Configuration Manager.

Thwack - Symbolize TM, R, and C