this video will describe how to onboard
new firewall devices using the ELMO
second key is this is a homegrown
application that you've seen written in
java but it could be just as easily
integrated in your service now or remedy
let's go look at how we can onboard
devices the first piece that we'll need
is an authorized user for the Elvis X
system so here's an authorized user
appropriate password in the algo second
team and then we'll go to the onboarding
new devices screen so this is the first
layer of information that's needed we
need a device name to put it in the
address of an IP address to communicate
and then the different device types in
our particular example we'll be using
the Cisco picks so here I've added the
admin user for the Cisco fixed and
device password as well as with Cisco
you need to have an enable password and
before I click the add new to device
what we'll do is we'll show you the
screen as it looks
inside of the algo second solution as
you can see here in the firewall term
what we have a two devices the Nexus two
in the pick stem so now let's go add
another picks device so let's jump back
to our application and we're filling the
appropriate information here so the
device name will be a sa one this would
be the device IP address we also have
the device type in Cisco X username the
password and also the enable password
let's click on add new device and you
can see that it was successfully out of
here if I now go and refresh the screen
within the al razaaq solution you'll see
that the device has been added so now I
have my a sa one device located within
the alias of position now what we want
to do is we want to do a whole analysis
of this device so that we can see the
details of the information that could be
changed once it's been onboard so we're
going to analyze the device and what's
going to happen behind the scenes my
analysis is started as you can see here
the analysis is started
once the analysis is complete then you
get a wealth of information regarding
how the final wall is configured so for
example with Ras a one device if I look
at the device statistics you can see
that they have rules without logging
covering rules duplicate objects and so
forth rules tend rules with a comment
and an overall security-related of your
device in addition to that I can also
look at the device risks and get
compliance reports so in this particular
case a good NIST statistics of 65 for my
PCI is a rating of all 72 it's very
similar to all of the reports that you
have within the outer side solution as
well and here's an example of the PCI
report that's consolidated after the
analysis was complete on the fixed
device because a lot more informations
you can do at the analysis and many
times where our customers do is the open
up a portal and so not you can get in
executable they call a traffic
simulation query so sometimes you don't
want to have all the users accessing the
outlet solution and in this case you
want to expose some level of information
to them so what we here what we'll do is
we'll identify here's the source IP and
the destination IP so I'm a networking
engineer trying to troubleshoot a
problem figuring out if the solution
through the network allows me to get SSH
sessions between these two devices I
click execute the traffic simulation
query then it will go off to the ELMO
set solution identify if that path is
actually routed in the network and if so
what are the devices that are actually
blocking on the path so in this case I
see that my pics 10 device is blocking
it but it's allowed from my Nexus 2
device in addition in your portal if you
wanted to you could also link this
traffic to the algal sex solution so now
if I open up another window this query
result is actually saved in what you see
here is the details of that corner and
with the full network pal
so now you can trace the full network
path from the source of 10.10 1.1 over
here with the green flag through the
devices all the way through the network
can also see that the Nexus 2 device is
allowing that traffic and finally get
into your destination network so this is
just a short summary of some of the
capabilities within the api's that are
exposed within the algo side solution
thank you for your time