Documents
Firewall Audit Tool — Feature Universe
Firewall Audit Tool — Feature Universe
Type
External
Status
Published
Created
Apr 19, 2026
Updated
Apr 19, 2026
Source
View

Purpose: Every feature that exists across competitors in this space, organized by category. Use this to decide what opnDossier should (and shouldn't) be.
Compiled: March 17, 2026
Sources: Titania Nipper, Tufin, AlgoSec, FireMon, nipper-ng, pfFocus, pfopn-convert, and community research.


How to Read This#

Each feature is listed with which tier offers it.
Tier 1 = Enterprise platforms (Tufin, AlgoSec, FireMon) — $50K–$500K+/year
Tier 2 = Nipper (Titania) — $1,900–$3,800/year
Tier 3 = Free/OSS (nipper-ng, pfFocus, ad-hoc scripts)
opnD = opnDossier current or planned


1. Configuration Parsing & Ingestion#

Getting the config data in and making sense of it.

FeatureTier 1Tier 2Tier 3opnDNotes
Parse config from file (offline)SomeYesYesYesCore capability
Pull config directly from live deviceYesNoNoNoEnterprise feature
Multi-vendor support (Cisco, Palo Alto, etc.)Yes (120+)Yes (20+)PartialNoNipper's bread and butter
OPNsense config.xml parsingNoNoNoYesUnique differentiator
pfSense config.xml parsingNoNoNoPlannedNobody else does this
Batch/bulk config ingestionYesYesNoNoPro/Enterprise for MSPs
Config history / version trackingYesResilienceNoNo"What changed?" audits
Continuous config monitoringYesResilienceNoNoEnterprise-only
Cloud security group parsingYesNoNoNoOut of scope
Normalize to common data modelYesInternalNoPlannedCommonDevice model

2. Security Audit & Vulnerability Detection#

Finding problems in the config.

FeatureTier 1Tier 2Tier 3opnDNotes
Misconfiguration detectionYesYesBasicPartialCore value prop
Vendor hardening guide checksYesYesNoNoVendor-specific
Default/weak credential detectionYesYesPartialNoBasic security check
Unused/orphaned rule detectionYesYesNoNoRule cleanup
Shadowed/hidden rule detectionYesBasicNoPlanned (#202)Hard to spot manually
Overly permissive rules (any/any)YesYesBasicNoCommon misconfiguration
Redundant rule detectionYesBasicNoNoDuplicate rules
Risk scoring / severity ratingYesYes (CVSS)NoNoPrioritization
Vulnerability correlation (CVE)SomePartialNoNoMatch against CVEs
Attack surface analysisYesNoNoNoEnterprise-only
Configuration drift detectionYesResilienceNoPlanned (#201)Change detection

3. Compliance & Regulatory Frameworks#

Mapping configs against standards.

FeatureTier 1Tier 2Tier 3opnDNotes
CIS BenchmarksYesYesNoPlanned (#150)Next big feature
DISA STIGsYesYesNoPlanned (Pro)Military/government
NIST 800-53YesYesNoNoFederal controls
NIST 800-171 / CMMCYesYesNoNoDefense supply chain
PCI-DSSYesYesNoPlanned (#204)Wide applicability
HIPAAYesSomeNoNoHealthcare
Custom compliance policiesYesNoNoPlanned (#205)Org-specific rules
Pass/fail evidence per controlYesYesNoNoAudit evidence
Compliance score / dashboardYesYesNoNoPercentage compliant

4. Reporting & Output#

How findings get communicated.

FeatureTier 1Tier 2Tier 3opnDNotes
Human-readable config summaryYesYespfFocusYesPlain English output
Security audit reportYesYesBasicPartialCore deliverable
PDF exportYesYesNoPlanned (#207)Client reports
HTML exportYesYesnipper-ngYesInteractive
JSON / machine-readableSomeNoNoYesAutomation
SARIF export (CI/CD)NoNoNoPlanned (#209)Differentiator
White-label / custom brandingYesYesNoNoPen tester need
Remediation guidanceYesYesNoPlanned (#206)How to fix findings
Risk-prioritized findingsYesYesNoNoMost critical first

5. Network Topology & Visualization#

FeatureTier 1Tier 2Tier 3opnDNotes
Network topology mapYesNoNoPlanned (Later)Visual device map
Traffic flow simulationYesNoNoNo"What if" analysis
Path analysisYesNoNoNoSource to destination
Zone segmentation modelingYesNoNoNoZone-based view
Multi-device correlationYesNoNoNoCross-device analysis

6. Policy Management & Automation#

Almost exclusively enterprise. Not our market.

FeatureTier 1Tier 2Tier 3opnDNotes
Rule lifecycle managementYesNoNoNoEnterprise
Change request workflowYesNoNoNoEnterprise
Pre-change risk analysisYesNoNoNoEnterprise
Rule cleanup recommendationsYesBasicNoNoUseful
Change provisioning (push)YesNoNoNoEnterprise
ITSM integrationYesNoNoNoEnterprise

7. Config Conversion & Migration#

Nobody does this well. Our whitespace opportunity.

FeatureTier 1Tier 2Tier 3opnDNotes
pfSense → OPNsense conversionNoNoPartial (broken)Planned461 upvotes on Reddit
OPNsense → pfSense conversionNoNoNoPlannedBidirectional
Cross-vendor migrationNoNoNoNoVery hard
Migration validation / pre-checkNoNoPartialPlannedSafety check

8. Deployment & Operations#

FeatureTier 1Tier 2Tier 3opnDNotes
Desktop app (local)NoYesCLICLILocal install
GUI (desktop)WebYesNoPlanned (Wails)Later
CLI interfaceNoNoYesYesPrimary interface
Air-gap / offlineSomeYesYesYesCritical for security
License key (offline)N/AYesFreePlannedMonetization

The Decision Matrix#

CategoryCore (must have for Pro)Stretch (maybe later)Not Us (leave to enterprise)
ParsingOPNsense, pfSense, offlineCisco ASA, FortinetLive polling, cloud groups
Security AuditMisconfig, unused rules, shadowed rulesRisk scoring, CVE matchingAttack surface, network-context
ComplianceCIS, STIGs, PCI-DSS, custom rulesNIST 800-171/CMMCSOX, NERC CIP, continuous
ReportingPDF, HTML, JSON, SARIF, remediationWhite-label, executive summarySIEM export, dashboards
TopologyBasic single-config topologyMulti-device, traffic sim
ConversionpfSense ↔ OPNsenseCisco → pfSense/OPNsenseGeneric cross-vendor
DeploymentCLI, offline, license keyDesktop GUI (Wails)Web server, multi-user, SSO

The Bottom Line#

opnDossier is Nipper for the open-source firewall world — with things Nipper doesn't do (config conversion, SARIF export, open-source transparency).
The 5–8 features that make someone pay $20/month instead of reading XML by hand:

  1. Parse OPNsense + pfSense configs into readable output (mostly done)
  2. CIS Benchmark compliance checks (the reason people buy Nipper)
  3. Risk-prioritized findings with remediation guidance
  4. PDF reports (the deliverable pen testers hand to clients)
  5. pfSense ↔ OPNsense config conversion (unique, validated demand)
  6. STIG compliance checks (government/military market)
  7. White-label reports (pen testers want their logo)
  8. Offline license key (monetization mechanism)