6. Workspaces, Reports & Dashboard
When first entering NP-View HTML or NP-Live, the user will be presented with the home page through which workspaces are available. Workspaces are used to organize devices into functional segments for analysis and visualization. Creating a workspace (+New) or selecting an existing workspace will open the Workspace canvas into which device configurations can be imported and organized. Tip: one or more device configurations can be dropped onto the workspaces page and a new workspace will be created and the files loaded into the workspace.
Workspace User Groups
Each user will be assigned by the administrator to one of three user groups, Administrator, Workspace Admin and Viewer. Administrator and Workspace Admin’s can create a view workspaces. To create a new workspace, the user will click “+New” and workspace name. After clicking the “Add” button, a new, empty workspace will be created where the user can begin importing configuration files. Workspaces are designed to allow the user to segment their network devices for easy reporting and visualization. Once a workspace is created, users can share the workspace with other users by name or user group, transfer ownership of a workspace to a different user or export the workspace. Viewers have no authoring capability and can only view workspaces that have been shared with them by Administrators or Workspace Admin’s.
Note: The share workspace has a known issue where users added to a user group post sharing of a workspace with the group will not be automatically added to the share. The resolution is to either add the user to the required workspaces or unshare and reshare the workspace with the group.
Note: If a workspace is shared with a user, the workspace cannot be transferred to the shared user. The workspace must first be unshared prior to attempting the transfer.
Administrators and Workspace Admin’s can export a workspace for backup and retention purposes. Using the share workspace features, the user an select to export the workspace. Once export is selected, a background task will be initiated to create a downloadable image. This process can take several minutes depending on the complexity of the workspace. Once processing is complete, the user can return to the share function screen and download the image. The user also ahs the ability to delete the image from the server.
Administrator and Workspace Admin’s can import a previously saved workspace or project file from NP-View Java. From the workspace screen, the user will create a new workspace. Once created, the user can drag and drop the backup image (or project file) to the workspace for processing. If the user loads a backup workspace into an existing workspace, the workspace contents will be replaced with the contents of the uploaded image. When a workspace or project file is imported, complete end-to-end processing of the data is required and may take several minutes for the topology to render. Tip: a saved workspace can be dropped onto the workspaces page. A new workspace will be created and the information loaded into the new workspace.
NP-Live and NP-View provide reports that present network information related to the open workspace. These reports are available to all users and can be accessed from the left menu.
This report provides a summary of all assets loaded into the workspace including Firewalls, Routers, and Switches. The information includes the following fields: Asset Name, Category, Criticality, IP Address, Date device was added, Date of last change, Description, Alias, Host name, Type and a user defined comment.
The types of devices currently supported in Asset Inventory are: Firewall, Router, Switch, Gateway and Host. If an IP address is displayed as 0.0.0.0 this device has an IP address assigned by DHCP and while the device was detected, an IP address could not be extracted.
Unmapped hosts are indicated by devices with an IP address in the “Name” column but no IP address in the “IP addresses” column.
This report provides a summary of all device rules loaded into the workspace. The information includes the following fields: Device, Access Control List, Description, Source, Destination, Service, Action, and Risk.
By clicking on +, additional details for each rule is presented including: User defined comment (justification), justification tag, paths for this rule, and the ability to search within the devices config file. Click on the X next to a comment to delete it.
To facilitate rapid rule population, the rule table can be exported to a .csv file by clicking the “Export” button on the upper left corner. Upon completing the comments, the file can be imported with the “Import” button. Note, only the comment field will be imported, other changes made to config file will be ignored.
Each comment will be tagged with the priority, author and time/date stamp as below:
|[OK]Rule Justification Comment 1 By alan- Jan 11 2021 03:36 pm|
Multiple comments for the same rule will be separated by the || (or) function
|[OK]Rule Justification Comment 1 By alan- Jan 11 2021 03:36 pm || [To Review]Rule Justification Comment 2 By alan- Jan 11 2021 04:36 pm|
To update a comment, update the blue text. Text added outside of this area or on a new line will be ignored. The updated comment will be appended to the comment list with a new date and time stamp.
To add a new comment, delete the existing comment and add a new comment. The new comment will be appended to the comment list with a new date and time stamp. Existing comments will not be modified.
Note: commas used within a comment will be replaced with periods to be properly parsed as a .csv file.
Object group table
Object groups classify users, devices, or protocols into “groups” and apply those groups to access control lists (ACLs) to create access control policies for those groups. This report provides a summary of network ACL object groups including: Host IP addresses, network address of group members, and nested object groups. The table includes: Group name, type, Device origin, Group content, and a user defined Comment (group justification). The parsing algorithms between NP-View Java and the NP-Live platform differ slightly in that default but unused groups displayed in NP-View have been filtered out in NP-Live.
This report provides a summary of network paths including : Source, Destination, Protocol, Service, Rule Sequence, and a user defined Comment (rule justification). The IP groups are lightly color highlighted allow for quick scanning of the table.
Compare path history
This interactive report provides a network path comparison between two points in time. Each time one or more configurations are manually or automatically added and are different from the previously imported file, a new “Version” is created. The user can select two versions to compare. the resulting table will display the changes between the two files.
All of the above tables (except Compare path history) can be searched, sorted by any column, switched to a list view, exported, and configured with alternate columns if required. These functions are available in the upper right corner of the table.
NP-Live provides a Dashboard that presents summary information related to the active workspace. The Dashboard is available to all users and can be accessed from the main menu on the top-left corner. The Dashboard contains the following widgets:
Topology Summary: Count of all Networks, Paths, Rules and Object Groups for the devices loaded into the workspace. This widget drills to the appropriate report (Path table, Rule table, Object group table).
Asset Summary: Count of all devices loaded into the workspace including: Firewall, Switch, Host, Gateway and Routers. This widget drills to the Asset Inventory report filtered by the device type selected.
Best Practices Summary: Summary of issues identified that do not follow industry best practices including: Unused Groups, Unjustified Rules, ACL w/o Deny, Unnamed Nodes. The Best Practices report can be launched from this widget.
Network Access Overview: Provides a summary of Paths and the associated services on those paths. This widget drills into the Path table for the service selected.
Change Tracking: Provides a summary of workspace changes for a specific day and has three components:
- Risks & Warnings shows a summary or workspace related Risks, Changes, Warnings, Errors, and Comments. The filter lets the user select to view by type, status and criticality.
- Path Summary shows the number of paths added or removed.
- File Upload shows a summary of the number of new files added and files removed from the workspace.
The calendar function allows the user to select day for which to view the change tracking information
Policies: Provides a summary of Active and Disabled Policies as well as Active and Disabled Requirements. This provides visibility into unmonitored devices and unused requirements.