close
keyboard_arrow_left
Table of Contents
- play_arrow JSA Risk Manager
- play_arrow JSA Risk Manager configuration
- play_arrow Network Device Management
- play_arrow Network Device Management
- Device Discovery Process
- Discovering Devices in your Network
- Importing Multiple Devices from a CSV File
- Adding a Network Device to JSA Risk Manager
- Deleting a Device from JSA Risk Manager
- Finding Network Devices in the Device List
- Adding Device Information to the Topology
- Collecting Neighbor Data to Update the Topology
- Configuring the Discovery Schedule to Populate Device Information
- play_arrow Device Configuration Backup Jobs
- play_arrow Network Connections Overview
- play_arrow Network Connections Overview
- play_arrow Network Device Configuration and Monitoring
- play_arrow Network Device Configuration and Monitoring
- Searching Device Rules
- Filtering Device Rules by User or Group
- Comparing the Configuration of your Network Devices
- Adding or Deleting a Device in JSA Risk Manager
- Backing up a Device to get its Configuration Data
- Discovering Devices in your Network
- play_arrow Log Source Mapping in JSA
- play_arrow Protocol Configuration for Network Devices
- play_arrow Schedules for Discovery and Backup
- play_arrow Firewall Rule Event Counts of Check Point Devices
- play_arrow Network Topology
- play_arrow Network Topology
- play_arrow CIS Benchmark Scans
- play_arrow Network Simulations in JSA Risk Manager
- play_arrow Network Simulations in JSA Risk Manager
- Simulation Tests
- Creating a Simulation
- Duplicating a Simulation
- Manually Running a Simulation
- play_arrow Network Configuration Change Simulation
- Simulating an Attack on an SSH Protocol
- Viewing Simulation Results
- Approving Simulation Results
- Revoking a Simulation Approval
- Assigning Simulations to Group for Tracking
- play_arrow Topology models
- play_arrow Reports
- play_arrow Audit Log Data
list Table of Contents
keyboard_arrow_right
Test Questions to Find Rules in a Device
date_range
09-Aug-21
SUMMARY Devices and rules test questions are used to identify rules in a device that violate a defined policy that can introduce risk into the environment.
The device and rules test questions are described in the following table.
Test Name | Description |
---|---|
allow connections to the following networks | Filters device rules and connections to or from the configured networks. For example, if you configure the test to allow communications to a network, the test filters all rules and connections that allow connections to the configured network. |
allow connections to the following IP addresses | Filters device rules and connections to or from the configured IP addresses. For example, if you configure the test to allow communications to an IP address, the test filters all rules and connections that allow connections to the configured IP address. |
allow connections to the following asset building blocks | Filters device rules and connections to or from the configured asset building block. |
allow connections to the following reference sets | Filters device rules and connections to or from the configured reference sets. |
allow connections using the following destination ports and protocols | Filters device rules and connections to or from the configured ports and protocols |
allow connections using the following protocols | Filters device rules and connections to or from the configured protocols. |
allow connections to the Internet | Filters device rules and connections to and from the Internet. |
are one of the following devices | Filters all network devices to the configured devices. This test can filter based on devices that are or are not in the configured list. |
are one of the following reference sets | Filters device rule based on the reference sets that you specify. |
are one of the following networks | Filters device rules based on the networks that you specify. |
are using one of the following adapters | Filters device rules based on the adapters that you specify. |