License: Free to try
Downloads: 1
Op. System: Windows 2003/XP/2000
Last updated: 2009-08-04
File size: 64.23 MB
Publisher: Athenasecurity

Publisher description for FirePAC

FirePAC program icon

Athena FirePAC provides a comprehensive Analysis of your firewall configurations that includes extensive checks for security risks in the firewall policy, identifies problem rules in the configuration, determines overlapping and conflicting rules, and summarizes the services allowed by the policy. Using the configuration file for input, FirePAC generates reports based on packet filtering ACLs, NATs, and routing tables. It Details the exact configuration rules that implement any specific policy so that zeroing in on the root cause of problems is clear and straightforward. You can also see the effects of rule changes on policy, compare an old policy with a new policy, or model how a proposed rule change will change the policy. Security Policy Checks Using the configuration file for input, FirePAC runs over 120 security policy checks to show how packet filtering ACLs, NATs, and routing tables are interacting together to affect your firewall's behavior. The checks identify policies in your firewall configuration that allow risky services from one security zone to another through the firewall. The detailed findings from these checks identify the specific rules in the configuration that implement these policies. These checks are derived from guidelines and recommendations from industry sources such as NSA, NIST, SANS Institute, Neohapsis, ISACA and ITIL. It serves as an audit Checklist for identifying security exposures in the firewall and allows network engineers to make clear policy decisions with regard to the semantics, rather than just the syntax, of the firewall. Culprit Rules Culprit rules are rules in the configuration that cause the largest number of specific security policy checks to FAIL. This makes it simple to harden the firewall against security exposures by pinpointing the most egregious rules in the rulebase. Problemantic rules are clearly identified and can be fixed without creating new, unintended exposures.

Add your review

User reviews