Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Exporting Sonicwall rule set to text file

Posted on 2010-11-08
5
Medium Priority
?
5,005 Views
Last Modified: 2013-12-06
Does anyone know of a way to export only the Sonicwall access rules to a text file?

I need this for an audit and compliance report.  I tried viewpoint and other firewall log analyzers but nothing will report on all active rules.

I need to show all active rules and open ports associated with each rule.

I am running a PRO 3060 with OS Enhanced
0
Comment
Question by:DigitechComputer
  • 2
  • 2
5 Comments
 
LVL 3

Accepted Solution

by:
Hofpad earned 2000 total points
ID: 34085650
The hard way:
The config-file from the sonicwall is mime-base64 coded. Decode it and extract the information you need.

The easy way:
Use the Autodoc Software from BOLL, which is able to do exactly the step above - and present ALL the informations out of the config file in a nice document/report: http://www.autodoc.com/
0
 
LVL 33

Expert Comment

by:digitap
ID: 34086929
you could have generated a TSR directly from the sonicwall which would have given you that information as well.
0
 

Author Comment

by:DigitechComputer
ID: 34087361
I tried using the TSR report in but it seems very time consuming to extract the information I need and generate a report from it.  Do you have any suggestions when extracting information from the TSR report?  
0
 

Author Comment

by:DigitechComputer
ID: 34087442
I was originally opening the TSR report in Notepad but when I open it in WordPad or Microsoft Word it's much easier to get the information I need.  Thank you
0
 
LVL 33

Expert Comment

by:digitap
ID: 34087633
Sorry...been away from my computer.  Yes, there is a lot of information there and can be a challenge to extract what you need.  Also, as you've found, notepad is not the best for viewing the TSR.

Glad it's working for you.
0

Featured Post

Lessons on Wi-Fi & Recommendations on KRACK

Simplicity and security can be a difficult  balance for any business to tackle. Join us on December 6th for a look at your company's biggest security gap. We will also address the most recent attack, "KRACK" and provide recommendations on how to secure your Wi-Fi network today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I recently had the displeasure of buying a new firewall at one of the buildings I play Sys Admin at. I had to get a better firewall than the cheap one that I had there since I was reconnecting the main office to the satellite office via point-to-poi…
Occasionally, we encounter connectivity issues that appear to be isolated to cable internet service.  The issues we typically encountered were reset errors within Internet Explorer when accessing web sites or continually dropped or failing VPN conne…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses
Course of the Month11 days, 21 hours left to enroll

916 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question