Policy Optimization - Rule Management Reports


Policy Optimization

The Policy Optimization sub-section in Firewall Analyzer provides a view of all the Firewall policy optimization reports. This section can be accessed from the Policy Optimization link under the path Reports > Rule Management.

The Policy Optimization reports sub-section consists the following tabs:

  1. Policy Anomalies
  2. Rule Suggestion
  3. Policy Fine Tuning
  4. Objects Usage
  5. Duplicate Objects

Refer the Rule Management Report Support page, for the list of firewall devices.

Policy Anomalies

Firewall Analyzer offers an exhaustive set of Firewall policy anomaly reports in the policy optimization section. In the policy optimization sub-section, you get a variety of policy anomaly reports, which will aid you to optimize the performance of firewall policies. The Rule Management anomaly reports are, Correlation, Generalization, Grouping, Redundancy, and Shadow. The reports will be displayed in the graphical and tabular format. Refer the Policy Anomalies help page.

 

Rule Suggestion

Firewall Analyzer learns from the actual traffic to find out overly permissive rules. It suggests changes to fine-tune the rules. Refer the Firewall Rule Suggestion help page

 

Policy Fine-tuning

Firewall Analyzer uses the actual traffic to find out the allowed firewall rules. It suggests changes to fine-tune the rules. Refer the Policy Fine-tuning help page.

 

Object Usage

Firewall Analyzer use the actual traffic to generate 'Object Usage' report. It provides an overview of Network and Service objects used by the firewall. Refer the Object Usage help page.

 

Duplicate Objects

Firewall Analyzer generates 'Duplicate Objects Report'. It helps to find out Network and Service objects having same set of IP address/service but different object names. Refer the Duplicate Object help page.

 

 

Featured links

 

Back to Top