Advanced Policy Firewall (APF) is an iptables(netfilter) based firewall system designed around the essential needs of today’s Linux servers. The configuration is designed to be very informative and easy to follow. The management on a day-to-day basis is conducted from the command line with the ‘apf’ command, which includes detailed usage information on all the features.
The technical side of APF is such that it utilizes the latest stable features from the iptables (netfilter) project to provide a very robust and powerful firewall. The filtering performed by APF is three fold:
1) Static rule based policies (not to be confused with a “static firewall”)
2) Connection based stateful policies
3) Sanity based policies
The first, static rule based policies, is the most traditional method of firewalling. This is when the firewall has an unchanging set of instructions (rules) on how traffic should be handled in certain conditions. An example of a static rule based policy would be when you allow/deny an address access to the server with the trust system or open a new port with conf.apf. So the short of it is rules that infrequently or never change while the firewall is running.
The second, connection based stateful policies, is a means to distinguish legitimate packets for different types of connections. Only packets matching a known connection will be allowed by the firewall; others will be rejected. An example of this would be FTP data transfers, in an older era of firewalling you would have to define a complex set of static policies to allow FTA data transfers to flow without a problem. That is not so with stateful policies, the firewall can see that an address has established a connection to port 21 then “relate” that address to the data transfer portion of the connection and dynamically alter the firewall to allow the traffic.
... and much much more. See site for further details. ...
HeatShield is a network firewall management service for Linux servers. A firewall configured by HeatShield prevents unauthorized access to services running on your servers, such as SSH and MySQL. Using HeatShield, you can easily restrict access to these services so that only IP addresses you trust are allowed to communicate......
Netfilter software comprises iptables, ipset, conntrack-tools, libnetfilter and more. It is the core of Linux firewalls and NAT. It consists of a set of hooks inside the Linux kernel and a number of utilities to manage callback functions.......
The Shoreline Firewall, more commonly known as “Shorewall”, is high-level tool for configuring Netfilter. You describe your firewall/gateway requirements using entries in a set of configuration files. Shorewall reads those configuration files and with the help of the iptables, iptables-restore, ip and tc utilities, Shorewall configures Netfilter and the Linux......
IPQ BDB filtering is done by a user space netfilter daemon that issues verdicts after looking up the IP address in a Berkeley DB. The fuzzy blocking model, freely inspired by STOCKADE, is designed to block non-distributed dictionary attacks and mitigate spam.......
iptablesbuild is effectively a configuration manager for iptables. It is intended to manage iptables configurations in a centralized location for multiple systems.......
This suite of scripts provides:Straight-forward SPI iptables firewall scriptDaemon process that checks for login authentication failures for:Courier imap, Dovecot, uw-imap, KerioopenSSHcPanel, WHM, Webmail (cPanel servers only)Pure-ftpd, vsftpd, ProftpdPassword protected web pages (htpasswd)Mod_security failures (v1 and v2)Suhosin failuresExim SMTP AUTHCustom login failures with separate log file and regular expression matchingPOP3/IMAP......
Comodo Firewall Pro - Secure your system against internal attacks such as Trojan viruses / malicious software and external attacks by hackers. Safeguard your personal data through a simple user friendly single click interface offering full immunity to attack. Comodo Firewall Pro helps you connect in a secure way to......
This new solution from Kaspersky Lab combines antivirus protection with a personal firewall and an anti-spam filter. Kaspersky Internet Security keeps your PC free from malicious code, adware, spyware, hacker attacks, dialers, spam and network fraud.......
VoodooShield uses a proprietary proactive whitelist snapshot approach to virus and malware protection. VoodooShield is a patented toggling Desktop Shield Gadget / Computer Lock that automatically toggles to ON and locks your computer when you start a web app. There is never a good reason to let new, non-whitelisted executable......
WIPFW is a MS Windows operable version of IPFW for FreeBSD OS. You can use the same functionality and configure it as only you work with IPFW.......
Windows Firewall Control is a nifty little application which extends the functionality of the Windows Firewall and provides quick access to the most frequent options of Windows Firewall. It runs in the system tray and shows notifications on outgoing blocked connections. This is the best tool to manage the native......
Bot Revolt, security you can see. Cyber security that works!Key features of Bot Revolt are: * Malware connection blocking – blocks and prevents malicious connections * Real time protection – monitors internet connections all the time * Prevents access to malware, spyware, scam and spam attack sites * Notifications –......
ferm is a tool to maintain complex firewalls, without having the trouble to rewrite the complex rules over and over again. ferm allows the entire firewall rule set to be stored in a separate file, and to be loaded with one command. The firewall configuration resembles structured programming-like language, which......
Comodo Internet Security is a free, very voluminous and multi-layered security application that keeps hackers out and personal information in.If you prefer a smaller solution with Antivirus Protection only see COMODO Antivirus . Built from the ground upwards with your security in mind, CIS offers 360° protection by combining......
Guarddog is a firewall configuration utility for Linux systems. Guarddog is aimed at two groups of users. Novice to intermediate users who are not experts in TCP/IP networking and security, and those users who don't want the hastle of dealing with cryptic shell scripts and ipchains/iptables parameters.......
About | Terms |
About UsContact Us | TpSort ScorePrivacy PoliceDMCA Policy |
© 2015-2016 www.tpsort.com, Inc