Firewall Builder consists of a GUI and set of policy compilers for various firewall platforms. It helps users maintain a database of objects and allows policy editing using simple drag-and-drop operations. The GUI and policy compilers are completely independent, which provides for a consistent abstract model and the same GUI for different firewall platforms. It currently supports iptables, ipfilter, ipfw, OpenBSD pf, Cisco PIX and FWSM, and Cisco routers access lists.
fwlogwatch is a packet filter and firewall log analyzer with support for Linux ipchains, Linux netfilter/iptables, Solaris/BSD/HP-UX/IRIX ipfilter, Cisco IOS, Cisco PIX/ASA, Netscreen, Elsa Lancom router, and Snort IDS log files. It can output its summaries in text and HTML and has a lot of options. fwlogwatch also features a realtime anomaly response capability with a Web interface.
SING stands for 'Send ICMP Nasty Garbage.' It is a tool that sends ICMP packets fully customized from command line. Its main purpose is to replace and complement the ping command, adding certain enhancements as fragmentation; send and receive spoofed packets; send many ICMP information types (echo as the old ping, address mask, timestamp, and router discovery) and errors (redirect, unreach, and time exceeded); and send monster packets. It also supports loose and strict source routing and record routing.
vpnd is a daemon which connects two networks on network level either via TCP/IP or a (virtual) leased line attached to a serial interface. All data transfered between the two networks are encrypted using the unpatented free Blowfish encryption algorithm with a key length of up to 576 bits (may be downgraded to a minimum of 0 bits to suit any legal restrictions).
Xtradius is a radius server that permits you to handle user authentication and accounting request via external scripts. You can handle script requests for user accounting, user authentication, NAS start and NAS stop packets. You can also write additional information into the NAS detail logfile. Parameters to scripts are passed via command line options or environment variables, making it very simple to implement SQL-based user accounting, authentication and account expiration. It is also compatible with "standard" cistron radius server.
TransConnect is an implementation of function interposing to allow users on *nix platforms to transparenly tunnel all networking applications over an HTTPS proxy. It has been extensively tested with telnet, SSH, fetchmail, IRC, whois, Pine, Netscape, Mozilla, Evolution, etc. over squid proxy.
DAXFi is a Python script that helps configure several different kinds of firewalls in a consistent way. It can run as daemon to adapt its behavior to external conditions; rules can be described with XML files, XML strings, or generated directly by the code; the program can be configured and extended with a sort of plug-ins written in Python. It comes with a Python package, useful to build other applications aimed to manipulate different firewalls in a uniform way (some example programs are included).
MailScanner is an email virus scanner, vulnerability protector, and spam tagger. It supports the Postfix, Sendmail, Exim, Qmail, and ZMailer MTAs, and the Sophos, McAfee, F-Prot, F-Secure, CommandAV, InoculateIT, Inoculan, eTrust, Kaspersky, Nod32, AntiVir, BitDefender, RAV, Panda, DrWeb, ClamAV, and other anti-virus scanners. It uses SpamAssassin for highly successful spam identification, and is designed to handle denial of service attacks. It will detect password-protected zip files and apply filename checking to their contents. It is very easy to install, requires no changes at all to your sendmail.cf file, is designed to be lightweight, and won't grind your mail system to a halt with its load. It can be integrated into any email system, regardless of the software in use.
myNetWatchman Perl Agent is a client for myNetWatchman.com. This program is designed to capture rejected packet information from various firewall logs and forward this attack information to central analysis servers at myNetWatchman.com, which then analyze events and escalate to the provider of the source.