2 3 4 5 6 Next >
Category: Access Control » Firewall » Configuration
ASDIC is a system for advanced traffic analysis. It helps you to investigate the traffic in your network by parsing firewalls logs and/or sniffing the network. Detects anomalies, identifies patterns and presents graphical reports.
Firewall Builder is a GUI firewall configuration and management tool that supports iptables (netfilter), ipfilter, pf, ipfw, Cisco PIX (FWSM, ASA) and Cisco routers extended access lists. Both network administrators and hobbyists managing firewalls with policies more complex that is allowed by simple web based UI can simplify management tasks with the application. The program runs on Linux, FreeBSD, OpenBSD, Windows and Mac OS X and can manage both local and remote firewalls.
Solsoft ChangeManager is the only centralized, Intelligent Multivendor platform that streamlines the end to end Design and Generation of Network Security rules for Firewalls, Router, VPN, IPSs. ChangeManager acts as a central Network Security Rule repository. Its visual policy interface designs, generates, implements, tracks and audits your security rules for multi-vendor networks consisting of firewalls, routers, switches, VPNs and IPs. ChangeManager's Topology or Tabular interface streamlines the change management process during firewall migration and other complex security update configuration changes. Users can simply drag-and-drop a new service across their network and ChangeManager will translate this high level, business policy change request into device-level instructions providing a simple, scalable model that can represent the most complex policies. ChangeManagers Rules Engine automatically optimizes, orders, inserts, checks rules for conflicts and applies these generated security configurations on the network devices effected by the rule change. Thus providing true end-to-end security rule design and auditing capability. After the acquisition of Solsoft by Exaprotect, Solsoft Policy Server, Firewall Manager and NetFilterOne were integrated into the Exaprotect security product line as Solsoft ChangeManager. Exaprotect provides centralized Configuration Management, Log Management, and Event Monitoring and Correlation solutions for enterprises and service providers with large-scale, heterogeneous network infrastructures.
Prometheus borns as a tool for Mac OS X system firewall configuration (eredited from FreeBSD IPFW); it is wrote in Perl. It is really versatile and it has two ways of configuration: 1) Step by step configuration, for novice users (by a series of simple questions, it automatically configures firewall rules) 2) Manual configuration, for expert users (read rules directly from user input) Next releases, will include a independet rules library, to give a more complete list of rules to novice users, a firewall log parsing and search function, for system administrators and maybe a GUI.
ASDIC is a system for advanced traffic and log analysis. It helps you to determine what traffic there is in your network. You can look at ASDIC as a reverse firewall. Input unstructured traffic information and output a rule set. ASDIC can analyze logs from any firewall or router, or sniff the network by itself.
A port and vulnerability scanner. Audit what the internet can actually see running on your server. Use your report to harden your services against attack.
MDCrack is a free featureful password cracker designed to bruteforce several commonly used hash algorithms at a very aggressive speed rate. It can retrieve any password made of up to 8 characters (16 for PIX algorithms) and 55 characters when salted. In order to achieve the highest possible speed rate, this program uses several cores for each algorithm it supports. Each one of these cores provides a different level of optimization designed to best fit with a specific set of command line options. Whatever command line configuration is used, MDCrack will always arrange to use the best available core. To date, this program supports bruteforce attacks on MD2, MD4, MD5, NTLMv1 and PIX (enable and users) hashes, the list of algorithms is growing up. Multi threading allows for parallel cracking and load sharing between several CPUs and multiplies overall speed by the number of available processor(s). This yields to phenomenal performance even on old generation multi-CPUs systems. Several options offer fine tuning for the attack and allow to save and resume your session at a later time. This program has multiple uses in real life, while its primary goal is obviously to test the strength of hashed passwords, it can also be used as a raw benchmark tool for integer calculs. For any question you may have, please be sure to first read the Frequenty Ask Questions file (FAQ) provided in MDCrack ZIP file. I hope you will enjoy this program.
The Centron IPTables Firewall Gui is an object oriented, database driven, windows interface to linux IPtables firewall rules. Now with Snat, Dnat and Masq Functionality. Many other bug fixes. Fixed root passwd issue
The Centron IPTables Firewall Gui is an object oriented, database driven, windows interface to linux IPtables firewall rules. Now with NAT capabilities and secure SSH access to firewall.
The Centron IPTables Firewall Gui is an object oriented, database driven, windows interface to linux IPtables firewall rules. Now with Snat, Dnat and Masq Functionality. Many other bug fixes.
Browse by category