- Liderar en la era de los algoritmos: un desafío para el CIO actual
- Understanding how data fabric enhances data security and governance
- Yet another European government is ditching Microsoft for Linux - here's why
- Brace Yourselves: The Game-Changing Impact of India's DPDP Act, 2023
- 인터뷰 | “방화벽 그 이상, 변화 빠르게 담아내는 설계가 중요” 최지희 시스코코리아 대표가 말하는 AI 시대 보안
IP Fabric weaves advanced firewall discovery into network assurance platform

Bykov noted transparent firewalls have largely appeared to be invisible to all of the other systems. This invisibility creates substantial challenges for network management. “We needed to update our model to support something that isn’t inherently visible from the troubleshooting perspective,” he said.
The technical approach to solving this challenge leverages IP Fabric’s networking expertise. When asked how they detect devices that are purposely designed to be stealthy, Bykov said that it’s his team’s experience as network practitioners that makes the difference. That and the fact that the firewall, whether it’s transparent or not, still shows up somewhere in a network ARP (address resolution protocol) table.
During the discovery process, IP Fabric connects to all infrastructure devices using SSH and API credentials to collect configuration and operational data from firewalls. This includes interface states, bridge-group, membership, access control lists (ACLs) and inspection rules. Drawing on this data, IP Fabric analyzes bridge group configurations, as well as all interfaces assigned to the same bridge group, to identify interfaces that pass traffic transparently.