u/Cool_Marketing9466

▲ 2 r/it

Information Assurance and Security

Can anyone help or advise us on what our professor might expect?

Our professor assigned us to create a firewall review system. He specifically said not endpoint security (so not a firewall scanner for a device), but something more similar to Cisco or Juniper systems.

The problem is that after researching, I still can’t fully grasp how those systems work as firewall review systems or what exactly we are supposed to create. So far, we’ve made a scanner for CSV files containing firewall policies/rules (ports, IPs, destinations, actions, etc.), but it still feels incomplete or like we’re heading in the wrong direction.

Are we supposed to build a firewall policy analyzer/auditing tool instead of an actual firewall? Any advice or examples would really help.

reddit.com
u/Cool_Marketing9466 — 1 day ago

Information Assurance and Security Project

Can anyone help or advise us on what our professor might expect?

Our professor assigned us to create a firewall review system. He specifically said not endpoint security (so not a firewall scanner for a device), but something more similar to Cisco or Juniper systems.

The problem is that after researching, I still can’t fully grasp how those systems work as firewall review systems or what exactly we are supposed to create. So far, we’ve made a scanner for CSV files containing firewall policies/rules (ports, IPs, destinations, actions, etc.), but it still feels incomplete or like we’re heading in the wrong direction.

Are we supposed to build a firewall policy analyzer/auditing tool instead of an actual firewall? Any advice or examples would really help.

reddit.com
u/Cool_Marketing9466 — 4 days ago