The Securepoint Unified Threat Management (UTM) security solutions provide all important security applications (firewall, VPN gateway, virus scanner, spam filter, Web filter, IDS, etc.) within a corresponding server environment, to ensure smooth updates of all systems and to make the everyday usage of these systems successful and secure for companies. They are available as UTM hardware appliances, as virtual appliances, and as a pure software solution which can be installed on standard computer systems and may be adjusted according to individual requirements. Securepoint is Windows 7-ready and supports IKEv1 and IKEv2.
Zentyal (formerly eBox Platform) is a small business server that offers small and medium businesses an affordable and easy-to-use enterprise-level computer network. It can act as a Gateway, Infrastructure Manager, Unified Threat Manager, Office Server, Unified Communication Server, or a combination of these.
CacheGuard Appliance is an all-in-one OS appliance providing firewall, antivirus, caching, compression, bandwidth allocation, load balancing, reverse and forward proxy, high availability, Web application firewall, URL guarding, and more. It can be purchased as an OS to install on your server, as an OS to run in a virtual machine, or as a hardware appliance.
Andrisoft WANGUARD is an enterprise-grade traffic monitoring and DDoS detection and protection solution that delivers the functionality NOC, IT, and security teams need to effectively monitor and protect their network through a single, integrated package. WANGUARD Sensor relies on sFlow, NetFlow, IPFIX, or Port Mirroring / SPAN.
firewall_e is a small Web application which allows administrators to create lists of servers, users, and ports and assign them to each other. This allows an administrator to login, create users, and assign ports on servers for them to access. Users can login and their remote IP address will be stored. From this address, they'll then be able to access whatever services the administrator provided them.
Fing is a command line tool for network and service discovery. It provides you a complete view of any network in a very short time. Its smart discovery automatically detects the network type and uses the best technique to scan it. The best results are achieved on Ethernet networks (including Wireless ones), where Fing is able to detect all network hosts, firewalled ones included. The service discovery feature quickly detects active TCP services on a target host or network. Fing is based on Look@LAN.
IPTEditor intends to ease the task of managing/editing iptables rules. It presents an intuitive graphical interface that organizes iptables tables as tabs of a notebook, each of which, in turn, organizes their chains in notebooks tabs. Each rules tab contains a list made up of rows (rules) or item columns ordered according to their occurrence. The items in the rows can be edited by appropriate forms, such as through dialogs for targets and criteria (modules), edit fields for network addresses, and selection boxes for actions and protocols, among others.
SpamBlock counts attempts to establish a connection on port 25/tcp via tcpdump. When a host exceeds the allowed number of attempts per unit of time, it is added to a corresponding ipfw table and email notification is sent. Spamblock currently supports ipfw only, but it can be easily adapted for any firewall and OS. It can also be configured to watch multiple ports to prevent Telnet and SSH attacks in addition to SMTP.
flex-fw is a small and fast front-end for the Linux iptables utility with an easy command syntax like ipfw or pf from BSD systems. It features service-oriented configuration, support for network profiles, which is useful for notebooks, support for macros, easy migration to another network environment by redefining macros, easy distribution to many hosts, syslog logging support for iptables errors and dropped packets, an interactive mode for manually configuring "on the fly", a batch mode for execution from shell scripts, and a library mode for using the flex-fw functions in your shell scripts.