mirror of
https://github.com/tnodir/fort
synced 2024-11-15 04:45:59 +00:00
deploy | ||
src | ||
.gitignore | ||
ChangeLog | ||
LICENSE.GPLv3 | ||
README.md |
Fort Firewall
Fort is a simple firewall for Windows 7+.
Features
- Filter by network addresses, application groups
- Support wildcards in program path names
- Application group speed limits
- Stores traffic statistics
- Graphical display of bandwidth
- Based on Windows Filtering Platform (WFP)
Supported OS versions
OS | Version | Architectures |
---|---|---|
Windows | 7 SP1+, 8.1, 10 | x86, x64 |
FAQ
Windows 7 SP1 64-bit fails to install not digitally signed drivers
See "SHA-2 Code Signing Support for Windows 7".
What the difference is between "Internet Addresses" and "Allowed Internet Addresses" on the IPV4 Addresses tab?
- All FW rules act on "Internet Addresses" only. LAN addresses are immediately allowed by FW and not checked by app groups or speed limiter.
For example here you can describe Internet addresses as:
- "Include All" addresses,
- but exclude 127.0.0.0/8, 192.168.0.0/16.
- "Allowed Internet Addresses" may be used for example:
- to block only some addresses:
- "Include All" addresses,
- but exclude facebook.com: "31.13.72.36".
- to allow only some addresses:
- "Exclude All" addresses,
- but include wikipedia.com: "91.198.174.192".
Filtered apps will be shown in the "Blocked" tab.
Do the App rules take precedence over the Allowed Internet rules?
Filtering steps:
- If address is 127.* or 255.255.255.255 and "Filter Local Addresses" is turned off, then PERMIT
- If "Filter Enabled" is turned off, then PERMIT
- If "Stop Traffic" is turned on, then BLOCK
- If address is not from "Internet Addresses", then PERMIT
- If "Stop Internet Traffic" is turned on, then BLOCK
- If address is not from "Allowed Internet Addresses", then BLOCK
- If app path is allowed, then PERMIT
- Log about blocked event and BLOCK
Code Quality Monitor
-- Nodir Temirkhodjaev, nodir.temir@gmail.com