You can use Networks, Users, Computers, IP ranges and their groups as sources and destinations in Firewall Access rules. Each rule can contain more than one source, destination and protocol.
ReaSoft Network Firewall contains the set of the most popular protocols that are used in Firewall Rules. You can specify additional protocols yourself. It is not recommended to edit the protocols predefined in the system.
affordable and business-ready solutionsFor fastest service you can purchase ReaSoft Network Firewall from our secure online store:
ReaSoft Network Firewall additional info
product updates, new releases