Nipper-ng Package Description
Nipper-ng is the next generation of nippper, and will always remain free and open source. This software will be used to make observations about the security configurations of many different device types such as routers, firewalls, and switches of a network infrastructure. This is a fork from nipper 0.11.10 release of the GNUv3 GPL code.
- Author: Ian Ventura-Whiting (Fizz)
- License: GPLv3
Tools included in the nipper-ng package
nipper – Device security configuration review tool
_ __ (_)_ __ _ __ ___ _ __ / ->/|
| '_ \| | '_ \| '_ \ / _ \ '__| /<-_/ |
| | | | | |_) | |_) | __/ | | | /
|_| |_|_| .__/| .__/ \___|_| |___|/
Copyright (C) 2006-2008 Ian Ventura-Whiting
Nipper is a Network Infrastructure Configuration Parser. Nipper takes
a network infrastructure device configuration, processes the file and
details security-related issues with detailed recommendations. Nipper
was previous known as CiscoParse.
By default, input is retrieved from stdin and is output (in HTML format)
Specifies a device configuration file to process. For CheckPoint
Firewall-1 configurations, the input should be the conf directory.
--output=<file> | --report=<file>
Specified an output file for the report.
Want to output the network filtering configuration to a CSV file?.
Displays the program version.
The example below will process a Cisco IOS-based router
configuration file called ios.conf and output the report to a file
nipper --ios-router --input=ios.conf --output=report.html
For additional help:
Show the online help or show the additional help on the topic
specified. The help topics are; GENERAL, DEVICES, DEVICES-ADV,
SNMP, REPORT, REPORT-ADV, REPORT-SECT, REPORT-HTML, REPORT-LATEX,
AUDIT-ACL, AUDIT-PASS, AUDIT-ADV or CONFIG-FILE.