Sphirewall is a user-centric analytical network firewall/router. Out-of-the box, it provides user authentication coupled with powerful analytics which provide you with complete control over your network and users. With Sphirewall, you can manage and understand what is happening on your network with features such as qos, bandwidth quotas, user authentication, and much more. Not built on iptables, it is able to do things which other Open Source firewalls can't. Its very flexible, and with its open JSON API, can easily be plugged into any existing environment.
Ipt_fw is a firewall for Linux based on iptables. It is designed for client systems. Ipt_fw outputs a shell script containing iptables commands, so inspection of the settings it creates is easy. The configuration files are made in LibreOffice（OpenOffice）Calc. Making of the firewall and a machine using the firewall are separated. It allows you to set the user level and features detailed logging, IP address blacklist management, and iptables integrity.
Altimate Firewall is a small and easy-to-use firewall, based on a hardened Gentoo system. It has an intuitive and easy-to-use Web interface. The Altimate Firewall uses Shorewall (LAN, WAN, DMZ), OpenVPN, PPTPD, IPSEC, and many more. It includes Avira WebGate and MailGate for safer browsing and for securing your email messages. The network settings can be easily managed by a non-professional.
ClearOS is an integrated network server gateway solution for small and distributed organizations. The software provides all the necessary server tools to run an organization including email, anti-virus, anti-spam, file sharing, groupware, VPN, firewall, intrusion detection/prevention, content filtering, bandwidth management, multi-WAN, and more. You can think of it as a next generation small business server. Through the intuitive Web-based management console, an administrator can configure the server software along with integrated cloud-based services.
firewall_e is a small Web application which allows administrators to create lists of servers, users, and ports and assign them to each other. This allows an administrator to login, create users, and assign ports on servers for them to access. Users can login and their remote IP address will be stored. From this address, they'll then be able to access whatever services the administrator provided them.