|File Search||Catalog||Content Search|
Zorp has been successfully deployed in demanding environments like the protection of high traffic web sites, or the protection of large intranets. Since the protocol analysis is strict and many of the common exploits violate the application protocol they are injected into, a large percentage of the attacks do not cross a Zorp based firewall even if the given service is permitted.
In a labor environment we could fully saturate a 100MBit ethernet link, and use up to about 600MBit of the bandwidth of an 1000MBit ethernet link. In real life situations we saturated a 10MBit internet link with 500 parallel sessions.
This is Zorp, welcome. ---------------------- Zorp is a new generation proxy firewall suite making it possible to finetune proxy decisions (with its built in script language), to fully analyze complex protocols (like SSH with several forwarded TCP connections), and to utilize outband authentication techniques (unlike common practices where proxy authentication had to be hacked into the protocol) more»
Zorp for DEBIAN --------------- I know that the documentation is very poor, we are working on it. If you have question with Zorp firewall and not the Debianization, please use http://lists.balabit.hu/mailman/listinfo/zorp mail list.
INSTANCES.CONF(5) INSTANCES.CONF(5) NAME instances.conf_ - zorp(8) instances database DESCRIPTION The instances.conf file describes the zorp(8) instances to be run on the system. It is processed by zorpctl(8) line by line, each line having the structure described below. Empty lines and lines beginning with ´#´ are comments i more»
POLICY.PY(5) POLICY.PY(5) NAME policy.py_ - zor more»
ZORPCTL.CONF(5) ZORPCTL.CONF(5) NAME zorpctl.conf_ - more»
ZORP(8) ZORP(8) NAME zorp_ - Zorp Fir more»
ZORPCTL(8) ZORPCTL(8) NAME zorpctl_ - Start more»
zorp (3.3.6-1.1) unstable; urgency=low * Non-maintainer upload * Add to libzorp0: "Replaces: "l more»