LiteFile.com

Software Download & Purchase

No need to install software:

Online File Converter
Bandwidth Management and Firewall 3.5.1

Gateway software providing bandwidth management and state firewall.

Publisher: Soft in Engines Bandwidth Management and Firewall Screenshot
Downloads: 1
Software Type: Shareware, 110.00
File Size: 19.58M
OS: Windows All
Update Date: 05 February, 2017

 

BMF is tool for network administrators who needs to have central control over traffic shaping, amount of transferred data and security in company network. It contains stateful firewall for mostly used internet protocols. It is suitable tool for internet service providers or companies who needs network management tool on Windows platform. Product€s TCP stateful inspection belongs to the quickest in contemporary Windows firewalls and this property makes it suitable for deploying on network interfaces with 1Gbit/s and higher data flows. High speed capacity gets under control thousands of clients and TCP connections. With help of packet filtering or stateful protocol information can be set bandwidth limit, Fair Usage Policy data quotas, prohibiting of network traffic and other actions. All product functionality is contained in one installation package deployed on Windows gateway configured like router or ethernet bridge. Deploying BMF on ethernet bridge is transparent for network clients. Managing of network with BMF does not need to install some client software on client machines. Supported protocols: Ethernet, IPv4,IPv6,TCP,UDP,ICMP,ICMPv6,DNS,Passive FTP,HTTP,SSL,P2P, support for VLAN and traffic shaping by VLAN ID. Multiple NAT can contains up to 255 public IP addresses and choses public IP address by private subnet. Other features: captive portal, TCP connection redirection, Integration with Active Directory, Maximum of TCP/UDP connections per client, DoS protection. BMF contains DHCP server based on ISC DHCP server which is able to operate on LAN with hundreeds clients. Logging features provides information about amount of transferred data through network connections, transferred data by network users, URL requests log or security log etc. Graphs generated from log data shows bandwidth usage for some user or network protocol in dedicated time periods.

 

100% Clean Certified

5 Gold Stars Rated