Network Security

πŸ”₯ Firewall Rule Analyzer

Paste iptables or nftables rules to detect misconfigurations, dangerous policies, shadowed rules, and ordering issues. 100% client-side β€” your rules never leave the browser.

πŸ“˜ Common Firewall Misconfigurations

IssueRiskRecommendation
Default ACCEPT policyCriticalChange to DROP/REJECT; explicitly allow only needed traffic
Any-to-any rule (0.0.0.0/0 β†’ 0.0.0.0/0)CriticalReplace with specific source/destination CIDRs
Admin ports open to internet (22, 3389, 5900)HighRestrict to management IPs or use a VPN jump host
Database ports exposed (3306, 5432, 27017)HighAllow only from application tier subnets
Shadowed rules (rule never reached)MediumReorder rules; more specific rules must precede general ones
No logging rule before DROPLowAdd LOG target before final DROP to capture denied traffic