
ManageEngine Firewall Analyzer :: User Guide
3
Zoho Corp.
Mapping User Name vs IP Address using DHCP/Proxy Logs ........................................ 151
Importing Log Files ........................................................................................................ 156
Viewing Device Details .................................................................................................. 160
Archiving Log Files ........................................................................................................ 161
Configuring to Fetch Firewall Configuration and Unused Rules ..................................... 164
Diagnose Firewall Connections ...................................................................................... 175
Scheduling Reports ....................................................................................................... 177
Working Hour Configuration ........................................................................................... 179
Report View Customization ............................................................................................ 180
Rebranding Firewall Analyzer Web Client ...................................................................... 181
ADMIN SETTINGS................................................................................................. 183
Managing Protocol Groups ............................................................................................ 183
Setting up Intranets ........................................................................................................ 186
Adding Different Users ................................................................................................... 187
Setting up the Mail Server .............................................................................................. 192
External Authentication Settings .................................................................................... 193
RADIUS Server Configuration Settings .......................................................................... 195
Setting up the Mail Server .............................................................................................. 197
Configuring Firewall Availability Alerts ........................................................................... 198
Viewing Server Diagnostics ........................................................................................... 200
Accessing the Database ................................................................................................ 201
License Management - Manage/Unmanage Devices ..................................................... 202
SMS Settings ................................................................................................................. 204
Changing Account Settings ............................................................................................ 206
CONFIGURING FIREWALLS ................................................................................ 207
Configuring Check Point Firewalls ................................................................................. 208
Configuring NetScreen Firewall ..................................................................................... 213
Configuring Cisco Devices - PIX/ASA/FWSM/VPN Concentrator ................................... 216
Configuring Microsoft ISA Server ................................................................................... 227
Configuring CyberGuard ................................................................................................ 229
Configuring Cyberoam ................................................................................................... 230
Configuring Fortinet Firewalls ........................................................................................ 232
Configuring WatchGuard Firebox ................................................................................... 236
Configuring Snort ........................................................................................................... 238
Configuring Secure Computing Sidewinder .................................................................... 239
Commentaires sur ces manuels