RSS 26 projects tagged "Firewalls"

Download Website Updated 05 Feb 2014 fwsnort

Screenshot
Pop 722.96
Vit 37.88

fwsnort translates snort rules into an equivalent iptables ruleset. By making use of the iptables string match module, fwsnort can detect application layer signatures which exist in many snort rules. fwsnort adds a --hex-string option to iptables, which allows snort rules that contain hex characters to be input directly into iptables rulesets without modification. In addition, fwsnort makes use of the IPTables::Parse Perl module in order to (optionally) restrict the snort rule translation to only those rules that specify traffic that could potentially be allowed through an existing iptables policy.

Download Website Updated 11 Jan 2012 Service-Guardian

Screenshot
Pop 42.08
Vit 2.72

Service Guardian aims to protect servers against various things such as resource exhaustion and connection floods. It can measure the number of connections to servers' ports and, after a grace time period, compares and sees if the host is still in violation of the specified settings. If a host is in violation of the settings, it will be filtered out and dropped via netfilter/iptables.

Download Website Updated 21 Oct 2010 DenyThem

Screenshot
Pop 42.71
Vit 1.52

DenyThem is a program designed to protect your Linux system from malicious attacks. It is an active response system to disrupt and block dictionary attacks and DOS attacks. DenyThem by default uses /var/log/syslog and /var/log/auth.log and searches for hack attempts. When DenyThem finds enough hack attempts from a single host, it will add a DROP statement to your system's firewall, thus preventing future attacks. DenyThem uses iptables, so it will only work on Linux or any other system that uses iptables. It can also block traffic from specific countries.

Download Website Updated 19 Feb 2010 JumpBox for Nagios

Screenshot
Pop 38.47
Vit 1.95

Nagios is a host, service, and network monitoring system that will watch your network and alert you to problems before your clients or end-users do. The system runs checks on hosts and services that you specify using plugins that return status information to Nagios. When problems are encountered, the system will send notifications to system administrators so that they can take action on the problem. The JumpBox for Nagios gives you a head start to using the system. It eliminates the complexity involved in getting the application installed, and allows you to focus on the configuration for your specific environment. Since Nagios is based on plugins, depending on what you want to do this will vary in complexity.

Download Website Updated 02 Jan 2008 Bandwidth Management Tools

Screenshot
Pop 312.19
Vit 6.56

Bandwidth Management Tools is a total bandwidth management solution for Linux and can be used for firewalling, traffic graphing, and shaping. It is not based on any currently-available bandwidth management software and supports packet queues, bursting, complex traffic flow hierarchies, flow groups, traffic logging, and a simple real-time monitoring front-end.

Download Website Updated 15 Nov 2007 NoNox

Screenshot
Pop 29.39
Vit 1.62

NoNox is intended to help automate the defense of Internet servers against attacks such as dictionary login attacks. NoNox monitors log files for user-specified trigger patterns. When a pattern is seen enough times in a given file within a given period of time, NoNox will execute a command. The patterns, time limits, files to watch, and commands are all user-specified. For example, if NoNox sees too many failed login attempts from one IP address, it could execute a command that tells a firewall to drop packets from that host, instantly cutting off the attacker.

Download No website Updated 25 Mar 2007 PIX Logging Architecture

Screenshot
Pop 33.26
Vit 1.93

PIX Logging Architecture is a project allowing for correlation of Cisco PIX Firewall traffic, IDS, and informational logs. It parses Cisco PIX logs from syslog files, then pushes the parsed data to a database. It contains a Web-based front end for displaying and searching the Cisco PIX Firewall logs.

No download Website Updated 03 Jan 2007 SpotSec Network Gateway

Screenshot
Pop 9.27
Vit 51.57

SpotSec Network Gateway is an all in one Linux firewall and gateway distribution that features a Web-based management console. It is designed to be a unified threat management system to protect and defend a network. Common features include intrusion detection and prevention and HTTP, SMTP, and POP3 proxies with content filtering and virus scanning. The design of the Web interface is centered around the definition of networks, services, users, and time events, which allows easier modification of packet filter rules.

No download Website Updated 17 Oct 2006 Monolith mSuite

Screenshot
Pop 19.60
Vit 52.32

mSuite is a solution for enterprise-wide infrastructure management. This solution uses Monolith Event Manager (Event/Fault), Action Manager (E&N), and Reporter (Historical Reporting). Monolith integrates with a variety of availability and performance tools based upon a client's needs. mSuite can monitor syslogs, SNMP traps, and NT event logs.

No download Website Updated 03 Nov 2005 Dedicated Server Manager Standard

Screenshot
Pop 17.49
Vit 1.00

DSM (Dedicated Server Manager) Standard is a solution for hosting companies and organizations who need to combine a Web server, mail server, DNS server, or a fully featured Web hosting environment. DSM Standard offers four levels of interface access: root user, reseller, site-owner, and mailuser.

Screenshot

Project Spotlight

beets

A media library management system for obsessive-compulsive music geeks.

Screenshot

Project Spotlight

libdwarf-dwarfdump

A library for DWARF debug information reading/writing.