Do you use SonicWall Firewalls?
Can you answer the following questions spontaneously without time-consuming searching?
Firewall Toolbox gives you quick, precise answers and greatly simplifies firewall audits. This saves you time and improves the efficiency of your security reviews.
Audits address the following topics:
Firewall Toolbox requires two core files:
These files can be downloaded from the Firewall manually or automatically via API.
A user-friendly wizard guides you through the data submission process. Once the information has been collected, it is processed and uploaded in structured form into an SQL database for analysis.
The tool then generates a wide range of reports that give the auditor easy access to the most important information about the firewall’s current state.
The appearance of the reports can be customized by setting your own logo and the color scheme of the headings.
Currently, two main modules are implemented: Security Audit and Configuration Audit. As welll there are first functions of the modules Documentation and Troubleshooting implemented.
There are two main report categories, each containing a variety of sub-reports:
When API access is enabled, Firewall Toolbox streamlines your firewall management by automatically identifying and safely removing outdated rules and NAT policies. A full backup of your settings is created before each action, allowing you to restore the entire configuration or recover individual objects at any time.
During API access, many objects — such as Rules, NAT Policies, VPN Tunnels, Address Objects, Groups, and Schedules — are exported in an editable and re-uploadable format, making it easy to build a clean, optimized configuration from scratch with a tool like Postman.
The primary goal of the initial versions of Firewall Toolbox is to provide powerful auditing capabilities. Many of the generated reports, however, can already be used for documentation purposes.
In the current release, the Toolbox also includes the first documentation-related functions, such as listing all NAT policies and firewall rules, laying the groundwork for comprehensive configuration documentation in future updates.