Bienvenido! - Willkommen! - Welcome!

Bitácora Técnica de Tux&Cía., Santa Cruz de la Sierra, BO
Bitácora Central: Tux&Cía.
Bitácora de Información Avanzada: Tux&Cía.-Información
May the source be with you!
Showing posts with label firewalls. Show all posts
Showing posts with label firewalls. Show all posts

Tuesday, March 19, 2013

Personal Firewalls

What to Look for in a Personal Firewall Program 

A personal firewall is software designed for use on a single PC. Personal firewalls lock out intruders to keep individual PCs safe at home or at the office.
TopTenREVIEWS uses the following criteria to evaluate personal firewall software:
Firewall Features
A personal firewall should offer features that go beyond standard protection. The bare necessities include keeping the system hidden and keeping uninvited people and programs out. The best firewalls include tools to manage spyware, cookies and viruses. Some firewalls offer Internet filtering to restrict content.
A firewall should keep intruders out. The firewall should keep your IP address and browser hidden while you browse the internet in stealth mode. This means that others should not be able to see your computer or personal identity unless you allow them. Your personal firewall should do its job consistently, without clashing with other software.
Additional Security Features
Great firewall software will include extras like antiphishing, antivirus and antimalware tools. Parental controls and instant message protection are also nice features to find in these types of programs.
Ease of Use
A computer novice should be able to understand and use the firewall product without help. The control panel should be intuitive and convenient. We’ve reviewed a few advanced firewall products that are powerful tools, but inappropriate for novices. When we include one of these products we note this in the “Ease of Use” section of the review.
Help & Support
The firewall software should give enough instruction for a computer novice to set up the product without help. The manufacturer should also have help online to answer common questions. Look for a firewall manufacturer willing to help you. Customer service telephone support is excellent; toll-free telephone support is a bonus. Some manufacturers use email or online question forms. Our favorite method of support is live chat online.
The software should offer a well-written help section with easy-to-understand information. The manufacturer should also provide technical support in the form of FAQs, email and phone support.

Thursday, March 7, 2013

Comodo Firewall & Windows 2003

Comodo firewall on Windows Server 2003 Standard R2
Configurattion of Comodo firewall on Win 2003 Server who runs SQL Express and Terminal Server in app mode!
Server has 2 NIC's.
On 1st NIC is LAN for SQL and admin RDP (NO GATEWAY AND NO DNS)
On 2nd NIC is open Internet 1Mb/1Mb optic for WAN RDP connections
What I want is next:
1. Config Comodo to allow all LAN requests for SQL Express 2005 so everyone on LAN can work without problems trougth NIC 1
2. Config Comodo to allow all RDP requests from WAN and LAN
3. If it's possible, enter WAN IP ranges who can connect on RDP
4. BLOCK ALL OTHER FROM WAN !
-------------------------------------------
For the 1st NIC (for the SQL & RDP), where you want all traffic allowed, do the following:
Go to Security/Tasks/Add a Zone.  You will give the Zone a name, and define it in accordance with the IP address range of the related NIC. 
Then go to Security/Tasks/Define a New Trusted Network, and select the Zone you just created.  This will add two rule to the Network Monitor (at the top of the list) ~ One rule to Allow IP Out, one rule to Allow IP In; this way all traffic can go from computer to the Zone, and back, without limitations.  Reboot.
For the WAN, you'll need/want to create Zones for the IP Range (or each IP, depending on your needs and the IP configuration) for what you want to allow to connect w/RDP.  Then use those Zones to manually create Network Monitor Rules to allow the traffic; you can set the Port, IP, etc, to control the connection and create tighter security.  You might see this thread about Network Rules.  http://forums.comodo.com/index.php/topic,1125.0.html; it's a great source of information.

Tuesday, February 26, 2013

Firewall

Eine Firewall (von englisch firewall [ˈfaɪəwɔːl] „die Brandmauer“) ist ein Sicherungssystem, das ein Netzwerk oder einen einzelnen Computer vor unerwünschten Netzwerkzugriffen schützt[1] und ist weiter gefasst auch ein Teilaspekt[2] eines Sicherheitskonzepts.
Jedes Firewall-Sicherungssystem basiert auf einer Softwarekomponente. Die Firewall-Software dient dazu, den Netzwerkzugriff zu beschränken, basierend auf Absender- oder Zieladresse und genutzten Diensten. Sie überwacht den durch die Firewall laufenden Datenverkehr und entscheidet anhand festgelegter Regeln, ob bestimmte Netzwerkpakete durchgelassen werden oder nicht. Auf diese Weise versucht sie, unerlaubte Netzwerkzugriffe zu unterbinden.
Abhängig davon, wo die Firewall-Software installiert ist, wird unterschieden zwischen einer Personal Firewall (auch Desktop Firewall) und einer externen Firewall (auch Netzwerk- oder Hardware-Firewall genannt). In Abgrenzung zur Personal Firewall arbeitet die Software einer externen Firewall nicht auf dem zu schützenden System selbst, sondern auf einem separaten Gerät, welches Netzwerke oder Netzsegmente miteinander verbindet und dank der Firewall-Software gleichzeitig den Zugriff zwischen den Netzen beschränkt. In diesem Fall kann ‚Firewall’ auch als Bezeichnung für das komplette System stehen (ein Gerät mit der beschriebenen Funktion).[3]
Die Funktion einer Firewall besteht nicht darin, Angriffe zu erkennen. Sie soll ausschließlich Regeln für die Netzwerkkommunikation umsetzen. Für das Aufspüren von Angriffen sind sogenannte IDS-Module zuständig, welche durchaus auf einer Firewall aufsetzen können. Sie gehören jedoch nicht zum Firewall-Modul.[4]
Die externe Firewall befindet sich zwischen verschiedenen Rechnernetzen. In diesem Beispiel beschränkt sie den Netzwerkzugriff des Internets (externes Netz; WAN) auf das private (in sich geschlossene) Netz (internes Netz; LAN). Sie tut dies, indem sie beispielsweise (Antwort-)Pakete durchlässt, die aus dem internen Netz heraus angefordert wurden und alle anderen Netzwerkpakete blockiert.
Die Software der Personal Firewall läuft auf dem zu schützenden Computersystem und beschränkt dort den Zugriff auf Netzwerkdienste des Computers. Abhängig vom Produkt kann sie zudem versuchen, innerhalb ihrer Grenzen den unerlaubten Zugriff von Anwendungen auf das Netz zu unterbinden.

Thursday, February 14, 2013

Firewall, VPN, vrtualization and multiple NICs

Multiple NIC, Configure Windows Advanced Firewall
For our Small Business customers moving to Windows Server 2008, I needed some type of Plain English in-depth guide to using and configuring Microsoft's Windows Firewall with Advanced Security, especially in a Hyper-V dual NIC scenario. Since I could not find such a write-up, here is my attempt.

If you find any mistakes, have any suggestions, or just want to let me know this was useful, please use the email link on our Home Page to contact me.

As with any Microsoft technology, there are usually numerous ways to manipulate settings. Since I ended up investing a lot of time investigating just about any method I could think of to manipulate Windows Advanced Firewall settings, I have included my entire process below in the hope that others will benefit for the different approaches I experimented with.

See our Multiple NIC, Configuring WFAS, Quick Guide page to skip the background info.

Background, environment
Our Typical scenario: the Small Business Customer (SMB) has for their Operations Server (Op-Server) a Windows 2000/2003 Standard or Small Business Server (SBS) Standard edition with dual NIC's. Using the RRAS service, it was quite easy to accomplish several tasks:
- create a Virtual Private Network (VPN) from our office to the customer site, for easy remote control and administration of the workstations.
- block all inbound public traffic except: PPTP port 1723 (MS VPN) and Remote Desktop (RDP) port 3389.

The external NIC was typically behind an inexpensive router, which allowed for a DMZ and reduced attack surface of the Operating System (OS) by pin-hole forwarding just ports 1723 and 3389. For the SMB, this solution to the desired goals was reasonably affordable. It is also possible (although undesirable) to just attach the internet connection directly to the external NIC, and configure the external NIC with the public address.

The introduction of Hyper-V in Windows Server 2008 has made possible for the SMB the many advantages moving the Op-Server to a Virtual Machine (VM). With the Op-Server in a VM, remote console access to the Host OS is highly desired in case normal network access through the Op-Server becomes unavailable either because of router or cabling problems, or problems with the Op-Server.

It would also make sense that if adding the RRAS service can be avoided on a minimal Role 2008 server, we can take advantage of keeping the Host OS as a minimal install, with only the Hyper-V Role installed.

In my thinking, since most of our SMBs have a block of 5 static IP's, this should be easy:
- Connect the extra NIC on the physical server directly to the internet device (cable/DSL modem, etc.)
- In the Host OS, configure the extra NIC by assigning one of the unused static IP's and configure the firewall profile "Ultra Secure Everything Blocked Except RDP"
- Then setup the LAN NIC with a private IP and the "Private Network" firewall profile.

Bada-bing, good-to-go, nice affordable solution for the SMB!
I hear you lauging! Hey, an SMB Admin can dream, can't I?!
Silly me, trying to keep it affordable for the customer.

Microsoft does not make this easy
I am usually fine with wizards and suggestions, but the forced Network Location Awareness (NLA) feature makes locking down and administering networks a nightmare. It would seem that Microsoft's decision to make indentifying a network based on that connection's gateway is a poor choice in a multi-homed server configuration. Knowledgable IT administrators should be able to define the network profile ("Set Network Location") regardless of whether a gateway exists or not. When we are not allowed to configure our systems, I think most IT administrators chafe that Microsoft has forced settings, especially when the gaping holes created are obvious.

To make matters worse, the initial version of Server 2008 (pre-R2) does NOT allow assigning of network profiles on a per adapter basis! If the machine is a domain member, all adapters are assigned 'Domain Network' profile and all the firewall ports for domain communication are open on all adapters, no choice in the matter!! In my humble opinion, this is pathetic.


Investigating options for configuring 'Location Type' on a multi-homed server.

Keep in mind, this is for configuring a dual-homed server.

It would seem the only way to be able to define the network type is to assign a gateway to the LAN connection. The irony here is that this configuration can lead to problems, and we are even warned as such! (See the pop-up warning at right).

Now that the LAN network is no longer considered "unidentified", we can assign a network type.


Note: to assist with keeping track of the multiple network adapters, in the "Network Connections" list I rename the "Local Area Connection" name to "LAN" and "WAN" accordingly.

Clicking on the "Public Network" that now appears below for the LAN connection will now let us assign the "Work Network" profile, which appears as "Private network" in the Network and Sharing Center. The icon will also change.
Changing the Group Policy for unidentified networks
The alternative way for defining the network type is by using Group Policy to specify that an "Unidentifed Network" should be assigned "Private Network". If the server is joined to a domain, you will probably want to do this with a Domain GPO.

For a stand-alone server, the procedure is:
1. Start -- run -- gpedit.msc
2. Browse: Computer configration -- Windows Settings
-- Security Settings -- Network List Manager Policies -- Unidentified Networks
3. Change 'Location type' to: Private, click 'Ok'.



As you can see in the image at right, with the Gateway removed from the LAN configuration, the "Unidentifed Network" is now assigned the "Private Network" profile.

This is the solution I decided to go with.
Now that I had the Network Type(s) as I needed them, I set about the task of defining the Windows Firewall and Advanced Security (WFAS) profiles the way I wanted them. I wanted all traffic on the WAN interface to be blocked except RDP (port 3389). In WFAS terminology, what I wanted was: "any enabled inbound rule with Profile of 'All' change to Profile of 'Domain,Private'".
What I was NOT going to do was edit every rule individually! That would be crazy!
It is rather alarming that the 'Default' WFAS policy is to allow on a Public connection such activity as Hyper-V managment, DHCP, File and Printer share, and (judging from the portscan) netbios and RPC (I may be mis-judging here). Still, on a server, I can't imagine why by default any public ports would be open.
Important Tips:
I strongly recommend you export your current WFAS policy before making any changes!! In the WFAS snap-in, in the left pane right-click the top node "Windows Firewall and Advanced Security" > "Export Policy..." This saved my bacon for writing this up.

Also, I did not have a good experience with using the "Restore Default Policy..." option, in that there were numerous rules that disappeared as compared to the original set of rules. Apparently, "Default Policy" does not take into account if you have enabled any Roles, Features, or File sharing.

netsh Command
My first try was to attempt changing the configuration with the netsh command. What I had been able to do in the past with netsh is dump the current firewall configuration to a text file, make any tweaks using notepad giving me a chance to review carefully, then re-import the rules.

Unfortunately, with WFAS, there seems to be no way to dump the rules to a text file. I am forced to work on the rules 'live'. Using the TechNet page 'Netsh AdvFirewall Firewall Commands' as a reference, it would seem I could change rules according to certain filters. Perfect! I attempted the following commands:
----------------------------------------------------------------------------------
C:\>netsh
netsh>advfirewall
netsh advfirewall>set rule name=all enable=yes profile=any dir=in new profile=domain,private
'enable' is not a valid argument for this command.
----------------------------------------------------------------------------------
Error? Upon closer review of the article, 'enable' is indeed not listed before the 'new' keyword. That's a problem, I only want to change the rules that are enabled, so that rules out the netsh command as an option. Just to see if the command would work anyway, I tried to make "all inbound rules with profile of public not enabled":
----------------------------------------------------------------------------------
netsh advfirewall>set rule name=all profile=public dir=in new enable=no
Updated 19 rule(s).
Ok.
----------------------------------------------------------------------------------
That worked. But considering all of the default rules with profile of just public are already disabled, this does not do me much good (after reviewing the default rules, I purposely chose this command in that nothing would actually change). I could maybe try to change all profile=all rules to just profile=Domain,Private, but that would also change the not enabled rules, which I would rather not do. Clearly, better filtering is needed.

Changing WFAS with VBScript
One of the most annoying features of the WFAS management snap-in, is the left-right scrolling required to see all of the columns of information (it sure would be nice if the Actions Pane was stacked on the left under the WFAS pane, to gain a little more screen real estate). Additionally, I am typically Remote Desktop into the server. So despite my having dual monitors, I usually use a desktop size of 1152 x 864, which is not wide enough to display all the columns of information in WFAS (another nice touch would be for Remote Desktop to be dual monitor aware, and let me use the screen size slider to span both my monitors, say about 2000 or 2500 pixels wide with the slider, it's a bit of a pain to make an RDP file then go edit the screen width manually in the RDP file).

I decided exporting all the WFAS settings to Excel would be nice for opening on my local workstation, so that I could easily span both monitors and thus see all columns at once. Microsoft has a nice sample VBScript for displaying all WFAS properties, it didn't take much to create a tweaked Script for enumerating all the current rules to a tab-delimited file.

Example:
----------------------------------------------------------------------------------
C:\>cscript //Nologo C:\TestScripts\JEnumFWRules.vbs > C:\TestScripts\EnumFW.txt
----------------------------------------------------------------------------------
I copied the text file to my local network, then dropped the file into Excel. Now I had the ability to "Freeze Panes", sort, and span two monitors with all the WFAS rule information.

Note: I saved all sample scripts here as ".txt" files, you will need to save them as ".vbs".
Disclaimer: Use sample scripts at your own risk! You should export current WFAS settings first!

Going back to my original goal, "allow RDP only" on external interface, I was now able to use VBScript to quickly make the desired changes. There were two stategies I could use to block all public traffic using the existing rules:
- Change all "enabled" rules with "Profile=All" to "Profile=Domain,Private" (my preference).
- Optionally, first copy all "enabled" rules with "Profile=All" to "enabled=no & Profile=Public"
(I was thinking the second option would be nice for retaining which rules were originally "Profile=All", but I have since decided too many rules are created).

For setup purposes, I also prefer to allow ICMPv4 response to Ping (there does not appear to be a rule for ICMPv4 ping, so I needed to add a rule). I made a VBScript that "enables existing Remote Desktop rule, and adds rule to allow ICMPv4 ping".

With careful review of the rules using the WFAS tool, these changes were made perfectly! I also performed a port scan on the reconfigured interface, and now the only port responding was RDP (3389), happy day!.

Summary
I fully recognize that with powerful features, the complexity increases. There are enough failings of WFAS that it would seem improvement is needed. In my humble opinion, properly managed security should NOT involve resorting to hacks and scripts to get a multi-homed server configured. The chance for unintended consequences and mis-configuration elevates when resorting to these non-interface methods. Hopefully, Microsoft will recognize these shortcomings and improve WFAS through an update or Service Pack.

Needed Changes to Network and Sharing Center, Windows Firewall with Advanced Security, and related tools
(in my humble opinion, of course)
- Allow pre-R2 machines to define the network profile on a per adapter basis. urgent!
- Allow manual setting of Network Location, without a gateway assigned.
- Align terms!
(very annoying when searching for an option, and the option is worded different in another window)
- Profile = Set Network Location
- Work Network = Private Network
- (on Windows Firewall window) Advanced Settings = Windows Firewall with Advanced Security - Adapter Settings = Network Connections
- In netsh advfirewall mode, allow filtering by: "enable=yes"
- When exporting the Inbound Rules to CSV, change any commas to another character.
- Allow dump of all netsh advfirewall rules in text format for importing, like we can for netsh.
- With "add rule", allow "group="
- When drag/dropping one rule on to another, allow "Undo"!! (what is this functionality, anyway?)
- Allow assigning/changing of Group to new/changed rules.
- Fix the COM object: 'INetFwRule::LocalPorts Property' to allow value of 'IPHTTPS'.
- Create a "Network List" API, to allow manipulation of "Network Category" from VBScript.

Mildly related suggested tweaks:
- When navigating within the Network and Sharing Center window, allow right-click "Open in new window"
- When using Avanced Sharing on a server, the default permissions should be for group "Administrators", not "Everyone".
- When many columns of information appear in an MMC snap-in, allow the first column to be "frozen" from the left-right scrolling (Excel style).
- Remote Desktop could be dual-monitor aware, to allow easy connection with a window that spans both monitors.

Wednesday, November 21, 2012

Untangle Gateway 9.3

usalug.com
Untangle Gateway Untangle, Inc. has announced the release of Untangle Gateway 9.3, a Debian-based network gateway with pluggable modules for network applications: "Untangle, Inc., a network software company, today announced the release of Untangle 9.3, the latest version of its award-winning multi-functional firewall software. The new version includes full tunnel OpenVPN, performance improvements, and enhanced reporting. Support for full tunnel OpenVPN allows administrators to force all remote client or remote site traffic through Untangle before going out to the Internet. This new feature allows an unprecedented level of control for network administrators using Untangle to protect remote offices and employees. The connected VPN clients and sites can now benefit from Untangle's full suite of features, including web content filtering, application control, anti-virus, spam blocking and more." Read the press release for more details. http://www.untangle.com/press-releases/untangle-9-3/

Download http://www.untangle.com/store/get-untangle ( MD5 on page ):
Or at www.distrowatch.com
untangle_930_x32.iso (423MB), untangle_930_x64.iso (428MB).

IPFire 2.11 Core 61

http://usalug.com/phpBB3
Michael Tremer has announced the release of IPFire 2.11 Core 61, a specialist Linux distribution for firewalls: "The IPFire development team has just released the 61st core update for IPFire 2.11. This update brings a lot of exciting changes, new features and several bug fixes. Since IPFire 2.11, OpenVPN net2net (N2N) or site2site (S2S) connections are supported. Here are some of the exciting new features: static routes may be defined for OpenVPN clients; connections can now be renamed when importing them; OpenVPN N2N connections are displayed with their status on the index page; optional client-config-dir (CCD) is supported which enables the option to add configuration parameters for a single client connection. On the connections page, you can now see how much traffic has been transfered over a single connection." The release announcement. http://www.ipfire.org/news/ipfire-2-11- ... 1-released

Download all available architecture and image versions : http://www.ipfire.org/download
Or at www.distrowatch.com
ipfire-2.11.i586-full-core61.iso (76.8MB, torrent).

Saturday, October 29, 2011

IPfire

IPFire ist eine Firewall-Distribution für den optimalen Einsatz in mittleren bis kleinen Unternehmensnetzwerken und Heimnetzwerken.
Obwohl das System extrem schlank gehalten wurde, können Addons mit nur einem Klick installiert werden. Diese Eigenschaft unterscheidet IPFire von anderen Distributionen: IPFire ist einfach zu administrieren hat aber genug Leistung um allen Anforderungen gewachsen zu sein.
http://forum.ipfire.org/index.php?topic=550.0
http://forum.ipfire.org/index.php?topic=5426.msg38494;topicseen#msg38494
http://forum.ipfire.org/index.php?topic=1685.0
http://forum.ipfire.org/index.php?topic=2859.0
http://forum.ipfire.org/index.php?topic=4866.0

Friday, October 28, 2011

lighttpd

lighttpd.net
Security, speed, compliance, and flexibility -- all of these describe lighttpd (pron. lighty) which is rapidly redefining efficiency of a webserver; as it is designed and optimized for high performance environments. With a small memory footprint compared to other web-servers, effective management of the cpu-load, and advanced feature set (FastCGI, SCGI, Auth, Output-Compression, URL-Rewriting and many more) lighttpd is the perfect solution for every server that is suffering load problems. And best of all it's Open Source licensed under the revised BSD license.
Web 2.0
lighttpd powers several popular Web 2.0 sites like YouTube, wikipedia and meebo. Its high speed io-infrastructure allows them to scale several times better with the same hardware than with alternative web-servers.
This fast web server and its development team create a web-server with the needs of the future web in mind:
Its event-driven architecture is optimized for a large number of parallel connections (keep-alive) which is important for high performance AJAX applications.

Wednesday, October 5, 2011

Stealth Ports in Comodo firewall


Source
Port Stealthing is a security feature whereby ports on an Internet connected PC are hidden from sight, evoking no response to opportunistic port scans.

Wednesday, July 13, 2011

Athena's Firewall Browser

Source
Athena is proud to bring you powerful free tool to search your rulebases based on address or service ranges — the way your change requests are actually made. Other tools and device consoles allow for pattern matching against rules, but only Athena's Firewall Browser allows you to:
  • Search rules and objects by IP addresses, object name, service or port
  • View security rulebases, network and service object definitions
  • Search on Cisco, Check Point and Netscreen firewalls from one location

Wednesday, April 6, 2011

Best Free Firewall

Source
Quick selecting guide 

 Comodo Firewall    Rating 9 of 10 Gizmo's Top Pick

Pros Its Defense+ HIPS performance exceeds commercial products and leads the class, it includes an excellent "memory firewall" feature, and it allows you to quickly switch between Defense+ security modes and configurations. Includes automatic updates. Installation can automatically configure your PC to use the Comodo SecureDNS (but you can do this without installing CIS).

Cons  [Revising]
Developer Home Page http://www.comodo.com/
Download link http://www.comodo.com/home/download/download.php?prod=firewall
File Size 34 MB  Version 5.3.181415.1237 License Type Unrestricted Freeware   Installation Requirements Windows XP (SP2), Vista, Windows 7
64 Bit version available 64-bit version available (use the download link and select 64-bit Windows from the drop down box)
Info Additional Features of Interest (as Found in its Interface): Installation mode/training mode, auto updating, built-in help and tips, parental control with password protection, extra themes and languages, and a stealth ports wizard. Purges old or unused firewall/Defense+ policies or unused files (safe files, files waiting for review, etc.). Displays balloon messages for instant logging events.
To learn more visit its forum, online help, or release notes.

Why use our Firewall?
Comodo Firewall Pro introduces the next evolution in computer security: Default Deny Protection (DDP™). What is DDP? Most security programs maintain a list of known malware, and use that list to decide which applications and files shouldn't access a PC. The problem here is obvious. What if the list of malware is missing some entries, or isn't up to date? DDP fixes this problem to ensure complete security. The firewall references a list of over two million known PC-friendly applications. If a file that is not on this safe-list knocks on your PC's door, the Firewall immediately alerts you to the possibility of attacking malware. All this occurs before the malware infects your computer. It's prevention-based security, the only way to keep PCs totally safe.
Firewall is a component of Comodo Internet Security 2011, which comes bundled with Comodo Antivirus. You have the option to only install Firewall if you prefer.
Firewall is also a part of Comodo Internet Security Pro 2011, which gives you the most robust defense and inlcudes other components like WiFi security, live 24/7 expert assistance for numerous computing needs. 
Firewall Features:
  • Easily understood and informative alerts
  • No complex configuration issues—perfect for amateur users
  • Lots of configuration options let techies configure things just as they like
  • DDP-based security keeps you informed and PCs safe
  • Quickly learns user behavior to deliver personalized protection
  • User-friendly, attractive graphical interface
One of the first steps in securing a computer is downloading and activating a quality firewall to repel intruders. Only this free firewall software has access to Comodo's extensive safe-list of PC-friendly applications, a key component of Default Deny Protection™. Check out our firewall software today or upgrade to 360-degree protection with Comodo Internet Security Pro 2011.

 Online Armor Free    Rating 9 of 10

Pros Excellent proactive security performance. Includes a "run safer" feature to reduce rights for specific risky applications, and the ability to monitor key logger activity and host files. It handles the installation of new programs better than many other tested products.
Cons It doesn't have automatic updates or a built-in help. It's mandatory to enter an email during installation, and it has a pre-checked option to send it anonymous information.
Developer Home Page http://www.online-armor.com/
Download link http://www.online-armor.com/downloads.php
File Size 19 MB   Version 4.5.1.43  License Type Restricted Freeware   Installation Requirements Windows XP, Vista, Windows 7 (32-bit only)
Info Additional Features of Interest (as Found in its Interface): Set passwords, protect programs (right-click > "Advanced options"), key Loggers tab/Hosts tab, and multi desktop support.
To learn more visit its forum, and blog.
 

 Zone Alarm Free Firewall 2010    Rating 8 of 10

Pros Top security performance, setup is easy for any experience level,  popup alert format is easy, customizable settings, anti-phishing protection, identity theft protection, online backup (2 GB), solid inbound/outbound os firewall, hosts file lock, stealth mode, and more. 
Cons Free version has inadequate protection against interactivity behavior of installed software. Programs can still reach the internet using browser even when program is blocked from internet access by Zone Alarm. No High setting for program access in Free version. In spite of available automatic update option, updates almost always must be performed manually.
Developer Home Page http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-firewall.htm
Download link http:///www.zonealarm.com/security/en-us/anti-virus-spyware-free-download.htm
File Size 44.8 MB    Version 92.102   License Type Restricted Freeware   Installation Requirements Windows XP (32-bit only), Vista, Windows 7
64 Bit version available 64-bit compatible on Vista and 7 (designed for both 32-bit and 64-bit) Not compatible for XP 64-bit
Info  To learn more visit its service and support page

 Outpost Firewall Free    Rating 8 of 10

Pros Proactive security (at max settings) compares with Online Armor. Highly flexible protection, simplified alert messages, and includes a full screen mode.
Cons It fails tests for protection against malicious logouts or system shutdowns. The free version lacks automatic updates and the ability to break active connections.
Developer Home Page http://free.agnitum.com/
Download link http://download.cnet.com/Agnitum-Outpost-Firewall-Free/3000-10435_4-10913746.html
File Size 16.63 MB   Version 2009   License Type Restricted Freeware   Installation Requirements Windows 2000, XP, Vista
64 Bit version available 64-bit version (98.81 MB v 7.1) available here:  http://download.cnet.com/Agnitum-Outpost-Security-Suite-Free-64-bit/3000-18510_4-75328026.html
Info Reduced HIPS monitoring (lacking anti-key logger protection for example)
Additional Features of Interest (as Found in its Interface): Built-in "Help", full screen mode or entertainment mode.

 Privatefirewall    Rating 8 of 10

Pros Effective proactive security and stealth, one of the lightest of all tested firewalls on memory, simple setup (no nags or ads!). Easily choose between 3 network profiles. Has a unique "email/system anomaly detection" feature, which trains over 7 days by default.
Cons Ineffective self-protection, fails a leak test (see echo2), and fails some tests for prevention of malicious system shutdowns. It doesn't have an automatic installation mode (but it has a training mode in "Settings" > "Advanced"). The tray icon flashes for log events instead of network activity per se. No update feature.
Developer Home Page http://www.privacyware.com/
Download link http://www.privacyware.com/personal_firewall.html
File Size 7.6 MB   Version 7.0.23.3  License Type Unrestricted Freeware   Installation Requirements Windows 2000, Server 2003, XP, Vista, Windows 7 (32/64 bit*).
64 Bit version available 64-bit compatible
Info Additional Features of Interest (as Found in its Interface): Built-in help and tips. Auto trusts safe vendors. Able to block outbound email automatically. Network options for experts, with three default settings to modify (Home, Public, Work).
To learn more visit its feature list and online support (change log, user guide, tutorials).