Author Topic: Untangle is now Untangle Next Generation (NG) Firewall.  (Read 3386 times)

0 Members and 1 Guest are viewing this topic.

Software Santa

  • Administrator
  • *****
  • Posts: 4288
Untangle is now Untangle Next Generation (NG) Firewall.
« on: September 23, 2008, 06:27:01 PM »
Untangle Firewall filters traffic based on IP address, protocol and ports.

Your First Line of Defense

Firewalls draw the line which separates internal and external networks.  Untangle NGs Firewall filters traffic based on IP address, protocol and ports that allow administrators to: 

    * Designate which systems and services (http, ftp, etc.) are publicly available
    * Create a DMZ and perform NAT (with Router)
    * Run as a transparent bridge to complement existing hardware

The Firewall is the most basic security element to hide your network from the outside and control all external access points (also known as ports). It lets you block unwanted activity and protect your network.

You can build a list of rules that meets your unique needs control traffic by protocol, source address or port, destination address or port, and set default actions.

Firewall evaluates traffic traveling across your network by applying your rules until a block/pass verdict is reached or a default action is taken.

Key Features:

    * Open source & Free under the GNU General Public License (GPL)
    * Easily blocks sessions based on simple rules
    * Rules can be based on a variety of attributes

Firewall Technical Specifications

Firewall can both monitor and block traffic sessions based on simple, yet flexible rules. The Firewall enables you to control traffic by:

    * Protocol
    * Source address or port
    * Destination address or port

You can build your own list of rules, and dictate how the Firewall must respond.
What It Does

Provides traditional firewall functionality
How It Does It

Uses Untangle proprietary technology for rules-based logging or blocking of network traffic

    * Default action can be globally set to "block" or "pass"
    * Custom logging, blocking or passing rules can be created by:
          o protocol
          o direction
          o source address
          o destination address
          o source port
          o destination port
    * Rule matching order can be customized
« Last Edit: March 03, 2014, 06:09:48 PM by Software Santa »


Welcome Visitor: