Please see http://firehol.org/ for up-to-date releases and information. FireHOL is a stateful iptables packet filtering firewall configurator. It is abstracted, extensible, easy and powerful. It can handle any kind of firewall, but most importantly, it gives you the means to configure it, the same way you think of it.

Features

  • stateful packet filtering via netfilter (iptables) connection tracking
  • bidirectional firewall (protects you from outside but also enforces policy for internet usage to your clients)
  • high level configuration - you write does the obvious, the rest are handled by firehol
  • unlimited number of firewalling rules
  • unlimited number of interfaces
  • unlimited number of firewalling zones, which can be defined using a dynamic set of criteria (including nested ones)
  • supports all kinds of NAT (MASQ, SNAT, DNAT, REDIRECT, etc)
  • supports transparent proxies (which can be applied on all or subsets of the clients, the servers, or the local machine users)
  • cooperates with VPN software (GRE, IPIP, IPSEC, OpenVPN) and allows PPTP clients and servers
  • extensible via plugin modules
  • firewalling rules can use any matching criteria (IPs, ports, protocols, etc), including any netfilter module available

Project Activity

See All Activity >

License

GNU General Public License version 2.0 (GPLv2)

Follow FireHOL

FireHOL Web Site

Other Useful Business Software
Cybersecurity Management Software for MSPs Icon
Cybersecurity Management Software for MSPs

Secure your clients from cyber threats.

Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
Rate This Project
Login To Rate This Project

User Ratings

★★★★★
★★★★
★★★
★★
3
0
0
0
0
ease 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 0 / 5
features 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 0 / 5
design 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 0 / 5
support 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 0 / 5

User Reviews

  • Best way to manage IP tables bar none with great developer support.
  • Easy to configure, statefull - great!
  • Great product, much simpler than directly working with iptables. But, it is not trivial. If you use the examples (there are a lot) its easy, but if you have to come up with your own solution, you still need to understand the concept of routing quite well.
Read more reviews >

Additional Project Details

Operating Systems

Linux, BSD

Languages

English

Intended Audience

Telecommunications Industry, Advanced End Users, System Administrators, Developers, End Users/Desktop, Quality Engineers

User Interface

Console/Terminal, Command-line

Programming Language

Unix Shell

Related Categories

Unix Shell Security Software, Unix Shell Systems Administration Software, Unix Shell Firewall Software

Registered

2002-07-22