(Page 5 of 10)   < Prev  1 2 3 4 5 6 7 8 9 10  Next >

Category: System Security Management » Firewall

ekkoBSD Firewall
Added 2003-12-29
by Rick Collette
ekkoBSD Firewall is a full-featured operating system with security enhancements, a state tracking packet filter, and a NAT firewall. Its features include firewall traffic shaping, an FTP proxy, an authenticating gateway, a complete logging facility, easy management with the administration tool set, IP address pooling (common address redundancy), and a state log daemon.

Port Scan Attack Detector (psad)
Added 2003-12-29
by Michael Rash
Port Scan Attack Detector (psad) is a collection of three lightweight system daemons written in Perl and C that are designed to work with Linux iptables firewalling code to detect port scans and other suspect traffic. It features a set of highly configurable danger thresholds (with sensible defaults provided), verbose alert messages that include the source, destination, scanned port range, begin and end times, TCP flags and corresponding nmap options, email alerting, DShield reporting, and automatic blocking of offending IP addresses via dynamic configuration of iptables firewall rulesets. In addition, psad incorporates many of the TCP, UDP, and ICMP signatures included in Snort to detect highly suspect scans for various backdoor programs (e.g. EvilFTP, GirlFriend, SubSeven), DDoS tools (mstream, shaft), and advanced port scans (syn, fin, Xmas) which are easily leveraged against a machine via nmap. Psad also uses packet TTL, IP id, TOS, and TCP window sizes to passively fingerprint the remote operating system from which scans originate

CheckPoint FW1 VPN Tools (fw1vpntools)
Added 2003-12-29
by Steve Weinreich
fw1vpntools is a set of some nifty little helpers which can be used for monitoring and maintaining a VPN which is terminated with CheckPoint VPN-1 Firewalls.

Pacemaker
Added 2003-12-24
by David DeLauro
Pacemaker is a dynamic rate-limiting script that watches network traffic and determines which machines are probably abusing your network. Pacemaker catches things like Windows worm scans, port scans, P2P network traffic, and anything else that tries to go beyond the normal number of connections a standard machine should use. The machine needs to abuse the network for two minutes before pacemaker will mark the IP address to be rate-limited. A machine will stay marked for as many minutes as it has abused the network.

Smoothwall
Added 2003-12-17
by neuro
SmoothWall is a popular Internet Security software package (based on Linux) offering automated modem/advanced ISDN autoprobing, ethernet ADSL/cable, USB ADSL (Alcatel Speed Touch Home only in 1.x; additional support for USR, Fuji, ECI, etc in 2.x), and multiple ethernet card support within 5 minutes of install. Web managed and with full facilities normally only seen in expensive commercial offerings, it also offers SSH, DHCP, and full firewall logging and auditing functionality.

ClarkConnect Internet Gateway
Added 2003-12-05
by Peter Baldwin
ClarkConnect is a software package that transforms an old beat up PC into a smart, simple, and secure Internet gateway and server for your home or small office network. In addition to connection sharing, the software comes with a strong firewall, Apache, dynamic DNS utilities, and Samba filesharing. The software is based on Red Hat Linux.

High Performance Firewall
Added 2003-10-01
by Sebastien Petit
HPF is a firewall technology that is based on a compiled rules engine. It differs from other firewall engines in that the time spent on matching a rule is constant, and is not dependent on the number of rules in effect. This allows packets to be rejected or accepted in about 300 CPU cycles. HPF currently works under FreeBSD, but patches for other operating systems are planned.

FIAIF is an Intelligent Firewall
Added 2003-09-29
by Anders Fugmann
FIAIF is an Intelligent Firewall. It provides a highly customizable script for setting up an iptables-based firewall. Configuration is done through one configuration file for each network interface, to ease configuration. FIAIF supports masquerading, port forwarding, traffic shaping, and more.

Bifrost Firewall iptables GUI
Added 2003-07-15
by Martin Forest
Bifrost is a firewall management interface to iptables (iptables GUI). The system is inspired by Checkpoint, Cisco PIX, and Watchguard firewall management. With Bifrost you are able to work with incoming and outgoing traffic flows rather than focusing on interfaces. The system supports both IPSEC and High Availability. It is even possible to manage HA from the GUI. Bifrost has an advanced anti-spoofing function. There is also a very easy-to-use log watch function where you can apply filtering. Logging is controlled per rule. You can turn on/off logging for a rule on the fly, and there is built-in protection against log flooding. All firewall changes are made without interrupt already established connections. There is also support for traffic marking (mangle), very useful when you are working with QOS (bandwidth management) and advance routing such as policy-based routing. If you for some reason need something extra, it is possible to add your own commands.

NetBoz Firewall
Added 2003-05-20
by Alfredo Luco
NetBoz is a CD-ROM based firewall with a Web administration interface. It works over standard FreeBSD services, giving maximum flexibility, ease of use, and performance to corporate networks.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus