Changes since the the 2.0.12 release:
Improvements and changes in the GUI
* The GUI works much faster with very large object trees.
* "Where used" menu item to quickly find and show all groups and
firewall rules that reference given object. Confirmation dialog
shown when an object is deleted also shows all groups and rules
that use it.
* Built-in installer can now save a copy of .fwb file to the firewall.
* Compile/install dialog is now an independent window instead of a modal
dialog, this means the user can look at the policy and objects while
compilation and/or installation is going on.
* Network discovery driud is back, ported from fwbuilder 1.0. As before,
it supports reading object definitions from a file in /etc/hosts
format, can read DNS zone and also can crawl the network using SNMP
queries.
* Startup splash window has been removed.
* Keeping track of dependencies between objects. Firewalls that refer
to an object that is modified are marked with bold font.
* Added bulk compile and install operations.
* All object dialogs have been converted into built-in panels that
appear in the right hand part of the main window.
* Improvements in "Find" function: administrator can now drag an object
into a well in the find dialog panel to make it search for this
particular object.
* The "Find and replace" operation has been implemented.
New object types, new rule types and rule elements, new actions and other new
features
* AddressTable This object resolves to a set of IP addresses defined in
an external file.
* DNSName: This object resolves a host name to the IP address using
DNS. Object can be confgiured to do so at compile time or run time.
* TagService: This object matches tags set by action Tag.
* Interface objects can now be marked as bridge ports.
* Support for routing rules has been implemented.
* Global policy and interface policies have been merged. Each policy
rule now has rule element "Interface".
* Policy rules can have the following new actions:
* Queue: This action passes the packet to user space process for
inspection.
* Custom: This action allows administrator to define arbitrary
piece of code to be used in place of an action.
* Branch: This action is used to create a branch in the rule set.
* Tag: This action associates internal tag with the packet.
* Classify: This action allows the firewall to define QoS class
for the packet that matches the rule.
* Route: This action makes the firewall to route the packet that
matches the rule through an interface or a gateway specified in
the parameters of the action.
* Firewall object now has an attribute "inactive" excluding it from
bulk compiles and installs.
Compiler for iptables
* Support for address tables loaded from external files at compile or
run time.
* Support user defined chains with predefined names (using special
action )
* Support for CLASSIFY, MARK, CONNMARK, QUEUE, ROUTE targets
* Support for physdev module for bridging firewalls
* additional optimization of rules in INPUT and OUTPUT chain: now
removing firewall object from src or dst to simplify rule if it uses
OUTPUT or INPUT chain.
* support for modules connlimit and hashlimit.
Compiler for PF
* Support for load balancing rules
* Support for tag and route options
* Support for address ranges and network objects in TSrc in NAT rules
* Support for pool types in NAT rules ('bitmask', 'random',
'source-hash', 'round-robin'), as well as 'static-port' option.
* Supprot for anchors (by way of a special action)
* Support for tables with predefined names (using AddressTable object)
* Support for packet 'tagging' (by way of a special action and service
object TagService)
Compiler for ipfilter
* Support for PPTP and IRC proxies
* Support for route option
API
* internal object ID is augumented with process ID of the program that
creates an object.
* fwbedit
Fwbedit can now create objects and repair broken object database.