From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Manage rules with Firewall Builder

Manage rules with Firewall Builder

From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Start my 1-month free trial

Manage rules with Firewall Builder

- [Instructor] It's not unusual in modern networks for firewalls to accumulate vast numbers of rules, and being able to have a way to document and manage these rules is important for network and security administrators. Firewall Builder makes it easier to manage firewall rules. It doesn't change the way in which the firewall operates, but it does provide a simple way of expressing rules to make it much easier to understand them. It supports a range of Linux and Cisco firewall platforms and provides a validation function to check for invalid rules, and issues such as rule shadowing, where a rule will never be executed due to a prior rule. Part of the pen tester's role is to check firewall rule sets and determine whether they provide open pathways to a target network. Even if the firewall isn't currently being managed using Firewall Builder existing rule sets can be imported to allow validation and review more effectively than at the command line. Firewall Builder can be downloaded from…

Contents