User guide
ManageEngine Firewall Analyzer :: User Guide 
3 
Zoho Corp. 
Mapping User Name vs IP Address using DHCP/Proxy Logs ........................................ 151 
Importing Log Files ........................................................................................................ 156 
Viewing Device Details .................................................................................................. 160 
Archiving Log Files ........................................................................................................ 161 
Configuring to Fetch Firewall Configuration and Unused Rules ..................................... 164 
Diagnose Firewall Connections ...................................................................................... 175 
Scheduling Reports ....................................................................................................... 177 
Working Hour Configuration ........................................................................................... 179 
Report View Customization ............................................................................................ 180 
Rebranding Firewall Analyzer Web Client ...................................................................... 181 
ADMIN SETTINGS................................................................................................. 183 
Managing Protocol Groups ............................................................................................ 183 
Setting up Intranets ........................................................................................................ 186 
Adding Different Users ................................................................................................... 187 
Setting up the Mail Server .............................................................................................. 192 
External Authentication Settings .................................................................................... 193 
RADIUS Server Configuration Settings .......................................................................... 195 
Setting up the Mail Server .............................................................................................. 197 
Configuring Firewall Availability Alerts ........................................................................... 198 
Viewing Server Diagnostics ........................................................................................... 200 
Accessing the Database ................................................................................................ 201 
License Management - Manage/Unmanage Devices ..................................................... 202 
SMS Settings ................................................................................................................. 204 
Changing Account Settings ............................................................................................ 206 
CONFIGURING FIREWALLS ................................................................................ 207 
Configuring Check Point Firewalls ................................................................................. 208 
Configuring NetScreen Firewall ..................................................................................... 213 
Configuring Cisco Devices - PIX/ASA/FWSM/VPN Concentrator ................................... 216 
Configuring Microsoft ISA Server ................................................................................... 227 
Configuring CyberGuard ................................................................................................ 229 
Configuring Cyberoam ................................................................................................... 230 
Configuring Fortinet Firewalls ........................................................................................ 232 
Configuring WatchGuard Firebox ................................................................................... 236 
Configuring Snort ........................................................................................................... 238 
Configuring Secure Computing Sidewinder .................................................................... 239 










