Opinnate

                                                                                                                                                                                                                                              Blog  Support

OPINNATE 3.2.0 RELEASE NOTES

Welcome 3.2 release of Opinnate Network Security Policy Manager. This software is designed to make network security policy management to be done effectively and easily. In this document you will find what Opinnate NSPM is, what key features, new features and known issues are.

Opinnate NSPM is a network security policy management solution that tackles firewall rule analysis, hardening, reporting and automation needs in an easy manner. Opinnate makes policy management in different editions. The editions are Lite, Standard and Enterprise. Lite edition is for firewall rule analysis; Standard edition also includes optimization features and finally Enterprise edition has all the features including automation.

The product is licensed in subscription model and licensed based on the number of firewalls used and package level.

Key Features

Analysis of policies on firewalls: Firewall rule analysis of all firewalls on several different conditions. Some of the items for this analysis includes:

  • Viewing all policies from a single console
  • Viewing al IP objects
  • Rule or path existence control
  • Finding out unused rules
  • Finding out expired rules
  • Finding out disabled rules
  • Finding out shadowed rules
  • Finding out permissive rules
  • Finding out rules not compliant to corporate policy

Rule hardening by cleaning and disabling of rules:  This is also called optimization of rules. These are some of the items that is done for optimization:

  • Disabling unused rules
  • Disabling expired rules
  • Cleaning disabled rules
  • Disabling shadowed rules
  • Disabling duplicated rules
  • Removing duplicate objects

Making policy changes automatically: Automation of rule creation activity is an important aspect and need for policy management. These are some of the items that is done by this automation:

  • IPS or logging profile activation on a rule
  • User Based Rule Creation
  • IP Access Cloning
  • Object name/IP change
  • Rule update/disable/enable
  • Comment update on rules
  • IP address decommissioning
  • Group-based policy change

Keeping firewalls compliant to standards: Firewalls are one of the most important control points for several regulations and standards. Firewalls must be kept compliant with these standards. Here are a couple of things that is handled for this task:

  • Making risk assessment on firewalls
  • ISO27001 audit control
  • PCI audit control
  • NIST audit control

Effective management: Making policy management in an effective way requires management effectiveness. These are some of the items that are made for this management easiness and effectiveness:

  • Having virtualized multi-tenancy features
  • Corporate policy management/view/usage
  • Rule/object usage monitoring
  • Alerting on new problematic rule creation
  • Finding out firewall changes
  • Having executive dashboards
  • Firewall specific network topology view

Known Issues and Limitations

Integration vendors: Opinnate has integration with the leading firewall vendors. Palo Alto, Fortinet, Check Point, Cisco and Sophos.

Log collection: All syslog data is collected but not stored into our system. We store just the needed ones for monitoring.

Unused Rules: Unused rules are found based on the Last Used data we collect from firewalls. If there is an issue with this data generation unused rules cannot be identified. A ticket should be opened to the related firewall vendors if this is the case.

Clear text protocol usage on reporting: Clear-text protocol usage for admin access identification cannot be made for Check Point firewalls.

Getting Started

This product is suggested to be used on a server with the mentioned Operating System and version:

  • Ubuntu v18 or higher
  • Docker Engine installed
  • Docker compose installed

Installation Steps

This is the summary of installation steps for v3.2. Detailed installation steps can be found on installation guide document.

  1. Docker Engine Installation: Docker engine is to be installed on the system if not installed.
  2. Docker Compose Installation: Docker compose is to be installed if not installed.
  3. Downloading files: A zip file containing all docker image files, compose file and installation script file.
  4. Running script: Using the script file installation of the system.

Upgrade Process

These are the steps to upgrade for the customers that use 3.1.x release of Opinnate.

  1. Opinnate will provide v3.2.1 Upgrade File(s)
    1. Connect Opinnate Web UI via browser with HTTPS protocol
    1. Go to “System Configuration à Upgrade” menu item on the left menu bar
    1. Select the upgrade zip file and click upgrade
    1. Then cloud/upload icon will appear on right/up corner and click on it
    1. The system will log you out after each upgrade process
    1. While upgrading, services will restart, Services can be controlled with “watch docker ps” from cli

Updates and Changes

These are the new features added in 3.2.1 version.

  1. Sophos XG Firewall, Check Point Quantum Spark Firewall and Juniper(Jun-os) Switch & Router added
  2. Global Dashboard and Virtual Area Dasboard user-based customization and Widget selection options added
  3. Active Users be disconnected from “Admin Users” by “Super Admin”
  4. LDAPS Authentication feature added
  5. Rule Card Field options increased from 12 to 16 in Rule Viewer
  6. New Field Name options added in Rule Viewer
  7. From, To and Schedule edit options added in Update Rule
  8. Filter options added in Objects Viewer and Group Objects Viewer
  9. PDF and Excel Export options added in Objects Viewer and Group Viewer
  10. Compliance & Reporting Dashboard added in left menu bar
  11. New Subjects added in Reports:
    1. Address Objects Mismatch with The Access Rule
    1. Objects Containing 0.0.0.0/0
    1. Rule Consolidation
    1. Unused Objects
    1. Unused Objects Group
  12. Schedule Tasks feature added in Optimization for Optimization Tasks
  13. Rule Consolidation feature added in Optimization, Consolidation can be applied in new rule or in the top rule
  14. For missing path analysis condition, “Transform Task Type” option added “Add New Rule” to “Add New Rule Path Free”
  15. Auto Interface Find feature in Add New Rule Path Free – Select Device
  16. NAT options added in Add New Rule Path Free for Fortigate and FortiManager
  17. Installation option added in Devices for Firewall Manager Systems
  18. “Status of Device Connection” alert option added in Alert&Notification Settings
  19. Import & Export Network Roles feature added in Corporate Policy – Network Roles
  20. Negate options added in Network Roles
  21. Selective service based allow or deny option added in Security Policy for Advanced Option
  22. Rule Lock/Unlock feature added in Rule Viewer at super-user level

Resolved Issues

Bug IDIssue Details
N-31301System Backup: Exporting Backup from System Backup
N-31302Debugging: Exporting Debug File from Debugging
N-31501Auto Renew Configurations: +03 Time Zone difference in Auto Renew Configurations of execution time
N-31502Alert Composer: Alert Notification Report error
P-31501Real Time Configuration Alert: Duplicate notification fixed for cluster Fortigate Firewalls
P-31502Shadow Analysis: FQDN Object Analysis missing in Shadow Analysis
P-31503Remove Duplicate Objects: For Panorama Objects Location missing analyze
P-31504Decommission: For Check Point Decommission analyze error
  

Support

If you encounter any issues while using Opinnate NSPM, please contact our support team at [email protected].

Thank you for choosing Opinnate! We hope you enjoy using it.

Powered by BetterDocs