Zorp firewall
Encyclopedia
Zorp is a proxy firewall suite developed by Balabit
IT Security. Its core framework allows the administrator to fine-tune proxy decisions (with its built-in script language), and fully analyze embedded protocols (such as SSL with an embedded POP3 or HTTP protocol).
The FTP, HTTP, FINGER
, WHOIS
, TELNET
, and SSL protocols are fully supported with an application-level gateway.
Zorp aims for compliance with the Common Criteria
/Application Level Firewall Protection Profile for Medium Robustness.
Zorp released under GNU/GPL
and commercial license too. The GPL
version is completely usable and functional, however it lacks some of the more advanced functions available in the commercially available version only.
Supported protocols: Finger, Ftp, Http, Pop3, NNTP, IMAP4, RDP, RPC, SIP, SSL, SSH, Telnet, Whois, LDAP, RADIUS, TFtp, SQLNet NET8, Rsh. Plug is implemeted for proxing any L7 protocols.
Supported working modes: transparent
and non-transparent working mode is supported as well.
(ICSA) firewall certificate.
2009: Westcoast labs certificate.
Balabit
BalaBit IT Security, founded in 1996, is a software company specializing in the development of IT security systems and related services.-History:...
IT Security. Its core framework allows the administrator to fine-tune proxy decisions (with its built-in script language), and fully analyze embedded protocols (such as SSL with an embedded POP3 or HTTP protocol).
The FTP, HTTP, FINGER
Finger protocol
In computer networking, the Name/Finger protocol and the Finger user information protocol are simple network protocols for the exchange of human-oriented status and user information.-Name/Finger protocol:...
, WHOIS
WHOIS
WHOIS is a query and response protocol that is widely used for querying databases that store the registered users or assignees of an Internet resource, such as a domain name, an IP address block, or an autonomous system, but is also used for a wider range of other information. The protocol stores...
, TELNET
TELNET
Telnet is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communications facility using a virtual terminal connection...
, and SSL protocols are fully supported with an application-level gateway.
Zorp aims for compliance with the Common Criteria
Common Criteria
The Common Criteria for Information Technology Security Evaluation is an international standard for computer security certification...
/Application Level Firewall Protection Profile for Medium Robustness.
Zorp released under GNU/GPL
GNU General Public License
The GNU General Public License is the most widely used free software license, originally written by Richard Stallman for the GNU Project....
and commercial license too. The GPL
GNU General Public License
The GNU General Public License is the most widely used free software license, originally written by Richard Stallman for the GNU Project....
version is completely usable and functional, however it lacks some of the more advanced functions available in the commercially available version only.
Supported protocols: Finger, Ftp, Http, Pop3, NNTP, IMAP4, RDP, RPC, SIP, SSL, SSH, Telnet, Whois, LDAP, RADIUS, TFtp, SQLNet NET8, Rsh. Plug is implemeted for proxing any L7 protocols.
Supported working modes: transparent
Network transparency
Network transparency in its most general sense refers to the ability of a protocol to transmit data over the network in a manner which is transparent to those using the applications that are using the protocol....
and non-transparent working mode is supported as well.
Certification
2005: International Computer Security AssociationInternational Computer Security Association
ICSA Labs began as NCSA . In its early days, NCSA focused almost solely on the certification of anti-virus software. Using the Consortia model, NCSA worked together with anti-virus software vendors to develop one of the first anti-virus software certification schemes...
(ICSA) firewall certificate.
2009: Westcoast labs certificate.
See also
- Application layer firewallApplication layer firewallAn application firewall is a form of firewall which controls input, output, and/or access from, to, or by an application or service. It operates by monitoring and potentially blocking the input, output, or system service calls which do not meet the configured policy of the firewall...
- Comparison of firewallsComparison of firewallsThe following tables compare different aspects of a number of firewalls, starting from simple home firewalls up to the most sophisticated Enterprise firewalls.-Firewall software:...
- Computer securityComputer securityComputer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to...
- FirewallFirewall (computing)A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass....
- Network securityNetwork securityIn the field of networking, the area of network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources...