Proper operation and security of a network relies on the configuration of switches and routers, which, in their turn, have configuration files of their own.
No wonder, there may be such a huge load of those files that manual analysis becomes a real challenge. That is why we are going to present a tool that facilitates and simplifies the process. The tool is intended to analyze configuration files of network devices and, consequently, to discover weaknesses and unsafe settings.