Vanguard provides enterprise class anti-virus and anti-spam protection to multiple internal mail servers, including the Gordano Messaging Suite, Microsoft Exchange, and IBM Lotus Notes/Domino. Dual anti virus scanning engines provide both traditional signature based virus protection and advanced Zero Hour protection. Any number of internal servers can be protected from a single Vanguard server. Each of those servers may be servicing the same Internet domain, separate Internet domains, or even multiple Internet domains on a single server. There is no limit to the number of protected domains or message throughput.
LDAP User Management System (LUMS) provides a set of basic LDAP API functions for PHP and a strong configuration language. This API can then be used to create Web services or can be used in any PHP script. The language allows the administrator to define LDAP object types along with their corresponding attributes. Each attribute may be defined as required as multivalued with a type (string, binary, dn, telephone, mail, etc.) and can be user inserted, constant, auto incremented, or function created. Attribute uniqueness is supported.
Nipper is a network infrastructure parser. It takes a network infrastructure device configuration file(s), processes it, and produces a report with a security audit, device configuration, and other relevant information. It currently supports Cisco IOS-based routers, Cisco IOS-based switches, Cisco IOS-based catalysts, Cisco NMP-based catalysts, Cisco CatOS-based catalysts, Cisco PIX-based Firewalls, Cisco ASA-based Firewalls, Cisco FWSM-based Firewalls, Cisco Content Service Switches, Juniper ScreenOS-based Firewalls (NetScreen), Nortel Passport devices, CheckPoint Firewall-1 Firewalls, and Sonicwall SonicOS-based Firewalls. Report output is in HTML, LaTeX, XML, and text formats.
This daemon makes GVRP announcements of all VLAN interfaces on a FreeBSD system. GVRP is the GARP VLAN Registration Protocol, defined in IEEE 802.1Q (VLANS). GARP is the Generic Attribute Registration Protocol, defined in 802.1D (bridging). The protocol allows switches or trunked end stations to announce to the network what VLANs should be forwarded to that device. The effect is that VLANs only need to be configured on the member ports; the protocol figures out which trunk ports are effectively also members. The daemon just announces the VLANs statically configured on each interface to that interface. It does not listen for inbound GVRP announcements.
sipscreen is a Linux iptables QUEUE target handler for screening inbound SIP phone calls flowing through a Linux gateway. If you have a Vonage appliance, or other voice-over-IP adapter located behind a Linux router, you may find sipscreen useful for accepting or rejecting calls based on the caller ID information, time of day, or other custom algorithms.
The NAT selection patch for the Linux kernel allows you to select between Endpoint Independent, Endpoint Dependent, Endpoint & Port Dependent, and Port Dependent NAT. Or in RFC 3489 (STUN) terminology: full cone NAT, restricted cone NAT, port restricted cone NAT, or symmetric NAT. (Full cone NAT is not implemented, but it could eventually be achieved using port forwarding either to a specific port or to a full host). For symmetric NAT, it adds also a random new port allocation.
PhishBouncer is an anti-phishing platform based on an HTTP/HTTPS proxy integrating anti-phishing checks that do not depend on block lists or Phish signatures. The checking algorithms make use of the attributes of the Web site being visited, the structure and properties of the referring URL, and the Web site's association with other legitimate Web sites that the user interacts with. The checks are implemented as plug-in interceptors, and it is easy to modify them and add or remove new checks.
Broadband-usage meters the traffic on an SNMP-enabled broadband modem or router and then lets you find out your usage by calendar month. Its main purpose is to let you know what your usage is without having to resort to your ISP's Web site and without having to trust their accounting. If they get their accounting wrong (which can happen), this software gives you data that you might be able to use when contesting the invoice.