Network Perception - background image

Introducing NP-View

Problem

Access policy implementation misconfiguration of firewalls or other local security mechanisms is a major source of security vulnerability. The complex interactions between distributed and layered policy implementation can lead to subtle errors and can mask problems.

Solution

NP-View performs a comprehensive network path analysis from firewall and router configurations to determine connectivity, and identify the deviation of implementation from security policies, standards, and best-practices.

Path analysis results shown in NP-View

Results of a complete path analysis visualized in the topology map automatically inferred from firewall and router rulesets.

IT Operations

  • Provide compliance officers with the information they need about your system

  • Solve practical problems, like identifying causes of connectivity problems in your system

IT Security

  • Dramatically streamline cyber security assessment process through comprehensive analysis of firewall configurations

  • Avoid the expense, uncertainty, and extensive labor involved in manual validation of system security and compliance with industry cyber security regulations.

Auditors & Consultants

  • Allows for complete, fast review of complex firewall and router configurations, giving users a way to visualize and quickly identify flows that are undesirable
  • Verifies all access points to the Electronic Security Perimeter (ESP), as per NERC standards CIP 005 R2 and CIP 005 R4.3
  • Provides verification of ESP documentation as per CIP 005 R1
  • Provides a means to review ports and services allowed to cross access points to the ESP, as per CIP 005 R2 and CIP 005 R4.3
  • Review security controls inside ESPs without directly accessing the ESPs; can be run offline and/or whenever a change is made to firewall configurations or flow policies
  • Generate consistent presentations of sensitive data across multiple utilities by using a standardizing tool

Network Perception - background image

Get started today

Download NP-View   List of supported devices

Technology

Network paths of interest are automatically discovered and visually highlighted.

Network paths of interest are automatically discovered and visually highlighted.

Designed to work offline, using firewall and router configuration files loaded into the tool by the user via the graphical front-end. NP-View uses the elements of connectivity information available in the configurations (such as CIDR descriptions of subnetworks facing interfaces, route statements, and VPN descriptions) as the basis for “growing” an inferred topology.

Provides complete graphical connectivity maps generated by NP-View from information parsed from the firewall configuration files. The views are filterable (to isolate specific subnetworks or traffic flows) and customizable. For example, critical networks can be moved around on the canvas such that they are better highlighted, making later analysis easier. End nodes can be color-coded so that the relative importance of a node can be easily seen. DNS or hosts file reverse-lookup can be used to label nodes appropriately. The connectivity maps may be saved as jpeg images.

Allows users to apply filters to the rule-sets. For example, you might filter to reveal only the traffic that results from rules with netmasks greater than /24, rules with “any” as the source or destination, rules with publicly routed IP addresses, or “deny by default” rules.

Outputs analysis results in a CSV- or XML-format results file. All fields from the analysis and annotations are exported to the CSV file, which can be further annotated and sorted in an external spreadsheet program, such as Microsoft’s Excel. The annotation feature allows operations and technical people to comment on the connectivity allowed at the critical access points, assisting in communication within the team and in creation of documentation.

Network Perception - background image

Receive updates about NP-View

* = required field