Firewall Audit and Management for SonicWall Firewalls

Audits: the key to greater security & compliance

Do you use SonicWall Firewalls?

Can you answer the following questions spontaneously without time-consuming searching?

    • Which users have which access rights?
    • Are all Security Services licensed and active?
    • Are temporary rules still active that were originally created for testing?
    • Is the system protected against outages?
    • What happens if the firewall or the internet connection fails?
    • Are there temporary NAT Policies and Access Rules that are no longer needed?

Firewall Toolbox gives you quick, precise answers and greatly simplifies firewall audits. This saves you time and improves the efficiency of your security reviews.

Why audit firewalls?

Audits address the following topics:

    • Compliance with regulations (NIS-2, GDPR)
    • Regular adaptation to evolving threats
    • Identifying security vulnerabilities
    • Performance optimization
    • Protection against internal threats

How it works

Firewall Toolbox requires two core files:

  • the SonicWall System Export (EXP)
  • the SonicWall Technical Support Report (TSR)

These files can be downloaded from the Firewall manually or automatically via API.

A user-friendly wizard guides you through the data submission process. Once the information has been collected, it is processed and uploaded in structured form into an SQL database for analysis.

The tool then generates a wide range of reports that give the auditor easy access to the most important information about the firewall’s current state.

The appearance of the reports can be customized by setting your own logo and the color scheme of the headings.

Currently, two main modules are implemented: Security Audit and Configuration Audit. As welll there are first functions of the modules Documentation and Troubleshooting implemented.

Reports

There are two main report categories, each containing a variety of sub-reports:

Security Audit

  • Firewall rules / NAT policies that have never been used
  • Disabled rules
  • Rules with no traffic over a defined period
  • VPN – Crypto check (weak ciphers, etc.)
  • Users in administrative groups
  • External user authentication
  • VPN access rights
  • Firewall audit settings and data

Configuration Audit

  • Firmware status / updates available
  • History (upgrades / uploaded settings)
  • Security Services Status & expiry
  • Security Services per Zone
  • High availability status / settings
  • WAN failover status / usage
  • Firmware History (upgrades / uploaded settings)
  • Firmware status / updates available

System CleanUp & Maintenance

When API access is enabled, Firewall Toolbox streamlines your firewall management by automatically identifying and safely removing outdated rules and NAT policies. A full backup of your settings is created before each action, allowing you to restore the entire configuration or recover individual objects at any time.

During API access, many objects — such as Rules, NAT Policies, VPN Tunnels, Address Objects, Groups, and Schedules — are exported in an editable and re-uploadable format, making it easy to build a clean, optimized configuration from scratch with a tool like Postman.

Documentation

The primary goal of the initial versions of Firewall Toolbox is to provide powerful auditing capabilities. Many of the generated reports, however, can already be used for documentation purposes.

In the current release, the Toolbox also includes the first documentation-related functions, such as listing all NAT policies and firewall rules, laying the groundwork for comprehensive configuration documentation in future updates.