Features

Firewall Management Features

Everything you need to automate, optimize, and secure your firewall change process. Built for security teams, approved by auditors.

πŸ”₯

Multi-Vendor Support

Manage Palo Alto, Fortinet, Check Point, Cisco ASA, OPNsense, and pfSense from one platform. Vendor-agnostic rule normalization.

πŸ€–

AI-Powered Optimization

Intelligent rule placement, conflict detection, shadow rule identification, and automated remediation suggestions using modern LLMs.

🎫

JIRA Integration

Bidirectional sync with JIRA and Taiga. Link firewall changes to tickets automatically. Track change requests in your existing workflow.

βœ…

Multi-Level Approvals

Configurable approval workflows based on priority. Security Engineer β†’ Change Manager β†’ Manager β†’ CISO. Auto-escalation on SLA breach.

πŸ“‹

Compliance Reporting

PCI-DSS, ISO 27001, GDPR-ready reports. Complete change history with who, what, when, and why. Audit-ready documentation on demand.

πŸ“Š

Complete Audit Trail

Immutable change log with full accountability. Track every modification, approval, and rejection with timestamps and justifications.

πŸ””

Webhook Notifications

Real-time alerts via Slack, Teams, and email. Interactive approval buttons in Slack. Adaptive Cards for Microsoft Teams.

⏰

Scheduled Changes

Define maintenance windows. Schedule rule deployments for off-peak hours. Automated execution with health checks and rollback.

πŸ”

Rule Analysis

Detect shadow rules, overlapping policies, redundant rules, and conflicts. Get actionable recommendations to clean up your rulebase.

πŸ”Œ

REST API

Full API access for custom integrations. Automate firewall changes from CI/CD pipelines, security tools, or custom scripts.

πŸ‘₯

Role-Based Access Control

Granular permissions for separation of duties. Define who can request, approve, and execute changes. Compliance-ready RBAC.

↩️

One-Click Rollback

Automated rollback on failures. Restore previous configurations instantly. Version control for all firewall rules.

πŸ›‘οΈ

Vulnerability Scanning

18 automated security checks across permissiveness, protocol risk, hygiene, and segmentation. Fleet-wide scanning with trend tracking and severity scoring.

πŸ”Ž

Threat Intelligence

Cross-reference firewall rules against AbuseIPDB, Emerging Threats, Feodo Tracker, and AlienVault OTX. Automated IOC matching with sighting records.

πŸ“‘

Policy Drift Detection

Baseline management with automated hourly checks. Detect unauthorized changes across 8 event types with 5 severity levels and 3 resolution workflows.

33 Firewall Vendors. One Platform.

FwChange supports 33 firewall vendors across 5 categories with purpose-built drivers for each platform β€” not generic SSH wrappers.

Enterprise On-Prem (18)

Palo Alto Networks

PAN-OS XML API

Fortinet FortiGate

FortiOS REST API

Check Point

R80+ Management API

Cisco ASA / FTD / Meraki / ACI

REST + RESTCONF APIs

Juniper SRX

Junos REST API

F5 BIG-IP

iControl REST

Sophos XG / XGS

REST API

SonicWall

SonicOS API

WatchGuard

Fireware REST API

Barracuda

REST API

Forcepoint

SMC API

Huawei USG

RESTCONF

Hillstone

REST API

Stormshield

REST API

pfSense

OPNsense-compatible

Cloud (6)

AWS

Security Groups + Network ACLs

Microsoft Azure

Network Security Groups

Google Cloud

VPC Firewall Rules

Oracle Cloud

Security Lists + NSGs

DigitalOcean

Cloud Firewalls API

Alibaba Cloud

Security Groups API

SASE / FWaaS (4)

Zscaler

ZIA REST API

Cato Networks

SASE API

Cloudflare

Magic Firewall API

Netskope

Cloud Firewall API

Open Source (3)

OPNsense

Full REST API

VyOS

REST API

MikroTik

RouterOS REST API

Virtualization (2)

VMware NSX

NSX-T Policy API

Nutanix Flow

Microsegmentation API

AI-Powered Rule Analysis

Modern LLM-powered analysis identifies issues humans miss. Get actionable recommendations to optimize your firewall rulebase.

  • βœ“ Shadow Rules: Rules that never match due to earlier rules
  • βœ“ Overlapping Policies: Rules with intersecting criteria
  • βœ“ Redundancy Detection: Duplicate or near-duplicate rules
  • βœ“ Conflict Detection: Same criteria, different actions
  • βœ“ Intelligent Placement: AI suggests optimal rule ordering

Native JIRA & Taiga Integration

Bidirectional sync keeps your firewall changes linked to your existing ticketing workflow.

  • βœ“ Create JIRA issues directly from FwChange
  • βœ“ Auto-link change requests to existing tickets
  • βœ“ Sync approval status back to JIRA
  • βœ“ Update ticket status when changes are implemented
  • βœ“ Custom field mapping for your JIRA workflow

Automated Vulnerability Scanning

FwChange runs 18 automated security checks against every firewall in your fleet, identifying policy weaknesses that manual reviews miss. Scans run per-firewall or fleet-wide with severity scoring and trend tracking.

Permissiveness (5 checks)

  • βœ“ Any-any rules allowing unrestricted traffic
  • βœ“ Any-source and any-destination rules
  • βœ“ Any-service rules allowing all ports
  • βœ“ Default-allow final rule (missing implicit deny)
  • βœ“ Overly broad CIDR ranges (/8, /16)

Protocol Risk (2 checks)

  • βœ“ Risky port exposure (RDP, SMB, Telnet, FTP)
  • βœ“ Insecure protocols (Telnet, FTP, HTTP, TFTP)

Hygiene (9 checks)

  • βœ“ Shadow rules, unused rules, expired rules
  • βœ“ Missing logging on allow rules
  • βœ“ Duplicate rules and disabled-but-present rules
  • βœ“ Long-lived temporary rules (>30 days)
  • βœ“ Rules without description or justification

Segmentation (2 checks)

  • βœ“ Bidirectional allows between zones
  • βœ“ Cross-zone violations (DMZ to internal)

Threat Intelligence & Drift Detection

Close the gap between threat intelligence and firewall operations. FwChange cross-references your firewall rules against live threat feeds and monitors for unauthorized configuration changes.

4 Threat Intelligence Feeds

  • βœ“ AbuseIPDB: IP reputation scoring from community reports
  • βœ“ Emerging Threats: Proofpoint ET compromised IP blocklist
  • βœ“ Feodo Tracker: Abuse.ch botnet C2 server indicators
  • βœ“ AlienVault OTX: Community threat intelligence pulses

Feeds sync on a scheduled cron job. When a firewall rule references an IP that matches a threat indicator, FwChange creates a sighting record and alerts your team.

Policy Drift Detection

  • βœ“ Baselines: Snapshot approved configurations
  • βœ“ 8 drift types: Rule added/removed/modified, object added/removed/modified, NAT changed, config changed
  • βœ“ 5 severity levels: Info, low, medium, high, critical
  • βœ“ 3 resolution workflows: Approve (update baseline), ignore, or revert
  • βœ“ Automated checks: Scheduled hourly drift detection via cron

FwChange vs Manual Process

TaskFwChangeManual
Change Request Submission2 minutes30 minutes (email/ticket)
Approval WorkflowAutomated routingManual forwarding
Rule Conflict CheckInstant AI analysis2-4 hours (manual review)
ImplementationOne-click pushCLI/GUI manual config
Audit TrailAutomaticManual documentation

Integrations That Work

🎫

JIRA

Bidirectional sync

πŸ“‹

Taiga

Full integration

πŸ’¬

Slack

Interactive buttons

πŸ“§

Microsoft Teams

Adaptive Cards

Built for Compliance

FwChange automates the documentation and audit trails required by major regulatory frameworks. Every firewall change is tracked, justified, and audit-ready from the moment it is requested through final implementation.

PCI-DSS 4.0

Full compliance with Requirements 1.1.1 through 1.2.8. Automated documentation of all firewall rule changes with business justification, approval records, and quarterly review scheduling.

Requirements 1.1.1, 1.2.1-1.2.8, 1.3.1-1.3.4

ISO 27001

Annex A.13 network security controls with complete change management documentation. Automated evidence collection for annual certification audits.

Annex A.8, A.12, A.13, A.14

NIS2 Directive

EU network security requirements with incident response documentation, supply chain risk assessments, and mandatory change control processes for critical infrastructure.

Articles 21, 23, 24

TISAX

Automotive industry information security assessment with documented network segmentation controls and change management for suppliers handling sensitive vehicle data.

VDA ISA Catalog, Module 1-3

KRITIS / BSI

German critical infrastructure requirements under the BSI Act. Documented firewall change processes with mandatory approval workflows and audit-ready reporting for BSI inspections.

BSI-KritisV, IT-Sicherheitsgesetz 2.0

SOX / VAIT / BAIT

Financial services compliance with separation of duties, four-eyes approval principle, and immutable audit trails required by banking and insurance regulators.

SOX Section 404, BaFin VAIT/BAIT

How Firewall Change Management Works

From change request to verified implementation in minutes, not days. FwChange replaces spreadsheets, email approvals, and manual CLI sessions with an automated, auditable workflow.

1

Request

Create a change request specifying source, destination, service, and action. FwChange identifies which firewalls are affected and pre-validates the rule against existing policies.

2

Analyze

AI-powered analysis checks for conflicts, shadows, and overlaps with existing rules. Compliance validation ensures the change meets your regulatory requirements before approval.

3

Approve

Multi-level approval routing based on change priority. Approvers receive Slack or Teams notifications with one-click approve or reject buttons. SLA tracking prevents bottlenecks.

4

Deploy

One-click push to production firewalls via native API. Automatic health checks verify the change worked. Instant rollback if something goes wrong. Full audit trail recorded.

Deployment Options

FwChange runs where your firewalls are. Deploy on-premise for maximum security, or use our hosted SaaS for zero-maintenance operations.

On-Premise / Self-Hosted

Deploy FwChange inside your network using Docker. Your firewall credentials and configuration data never leave your infrastructure. Ideal for regulated industries, air-gapped environments, and organizations with strict data sovereignty requirements.

  • βœ“ Docker Compose deployment in under 1 hour
  • βœ“ PostgreSQL + Redis included
  • βœ“ No external dependencies required
  • βœ“ Works in air-gapped environments
  • βœ“ You control all encryption keys

Cloud SaaS

Managed hosting on European infrastructure with automatic updates, backups, and scaling. Connect to your firewalls via secure API tunnels. Zero infrastructure management required from your team.

  • βœ“ EU-hosted (Hetzner, Germany)
  • βœ“ Automatic updates and patches
  • βœ“ Daily encrypted backups
  • βœ“ 99.9% uptime SLA
  • βœ“ GDPR compliant by design

Built for Security Teams

Whether you manage 5 firewalls or 100, FwChange adapts to your team structure and compliance requirements.

MSSPs & Service Providers

Manage firewall changes across multiple clients from a single platform. Tenant isolation ensures each client's data remains separate. API-first design integrates with your existing PSA and ticketing tools.

β€œWe reduced our average change implementation time from 4 hours to 15 minutes across 40 client firewalls.”

Financial Services

Meet PCI-DSS, BAIT, and VAIT requirements with automated documentation. Four-eyes principle enforcement and separation of duties built into the approval workflow. Every change is audit-ready from day one.

β€œOur PCI-DSS auditors were impressed by the change documentation quality. First time we passed without findings.”

Critical Infrastructure

KRITIS-compliant firewall change management with mandatory approval workflows, incident documentation, and BSI-ready reporting. On-premise deployment for maximum security in sensitive environments.

β€œThe on-premise deployment was a requirement for us. FwChange was production-ready in a single afternoon.”

Frequently Asked Questions

How long does it take to deploy FwChange?

Most teams have FwChange running in production within a single day. The Docker-based deployment requires minimal configuration β€” connect your database, set your encryption key, and add your first firewall. No professional services engagement or multi-week implementation project required.

Is my firewall data secure?

Yes. Firewall credentials are encrypted at rest using AES-256-GCM. When deployed on-premise, your data never leaves your network. FwChange does not phone home, collect telemetry, or require internet access to function. You control all encryption keys.

Can FwChange actually push changes to my firewalls?

Yes. FwChange connects to your firewalls via their native APIs (PAN-OS XML API, FortiOS REST API, Check Point R80+ Web API, Cisco ASA REST API, OPNsense REST API). After approval, changes are pushed directly to the device. Health checks verify the change was applied correctly, and automatic rollback is available if issues are detected.

What makes FwChange different from Tufin or AlgoSec?

FwChange is built for SMBs and mid-market teams that need 80% of enterprise functionality at 10% of the cost. No six-figure implementation project, no 6-month deployment timeline, no mandatory professional services. Deploy in a day, pay per firewall, cancel anytime. Plus, FwChange includes AI-powered rule analysis that legacy tools don't offer.

Do I need to replace my existing JIRA workflow?

No. FwChange integrates with your existing JIRA or Taiga projects. Firewall change requests can be created from JIRA tickets, and approval status syncs bidirectionally. Your team continues working in the tools they already know.

What compliance frameworks does FwChange support?

FwChange provides audit-ready documentation for PCI-DSS 4.0, ISO 27001, NIS2, TISAX, KRITIS/BSI, VAIT, BAIT, and SOX. Every change is tracked with who requested it, who approved it, when it was implemented, and the business justification β€” exactly what auditors need.

What does vulnerability scanning detect?

FwChange runs 18 automated vulnerability checks across 4 categories: permissiveness (any-any rules, overly broad CIDR, default-allow), protocol risk (risky port exposure, insecure protocols), hygiene (shadow rules, unused rules, expired rules, missing logging, duplicates), and segmentation (bidirectional allows, cross-zone violations). Scans run per-firewall or fleet-wide with trend tracking over time.

How does threat intelligence integration work?

FwChange cross-references your firewall rules against 4 threat intelligence feeds: AbuseIPDB (IP reputation), Emerging Threats (compromised IPs), Feodo Tracker (botnet C2 servers), and AlienVault OTX (community indicators). When a rule references a known-bad IP, FwChange creates a sighting record and alerts your team.

What is policy drift detection?

Policy drift detection monitors your firewalls for unauthorized changes by comparing current configuration against an approved baseline. It detects 8 event types (rules and objects added/removed/modified, NAT changes, config changes), classifies severity (info through critical), and offers 3 resolution workflows: approve and update baseline, ignore, or revert.

See FwChange Features in Action

Request a personalized demo to see how FwChange can streamline your firewall change process.

Try Free Scanner