<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Internet content filtering solutions for business - WFilter Blog &#187; Settings</title>
	<atom:link href="http://blog.wfilterngf.com/?cat=5&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>http://blog.wfilterngf.com</link>
	<description>Internet content filter and firewall solutions for business network.</description>
	<lastBuildDate>Thu, 28 Aug 2025 05:37:57 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.8.5</generator>
	<item>
		<title>IP mac history is now available in WFilter NG firewall.</title>
		<link>http://blog.wfilterngf.com/?p=541</link>
		<comments>http://blog.wfilterngf.com/?p=541#comments</comments>
		<pubDate>Fri, 01 Sep 2017 06:38:13 +0000</pubDate>
		<dc:creator><![CDATA[WFilter]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Settings]]></category>

		<guid isPermaLink="false">http://blog.wfilterros.com/?p=541</guid>
		<description><![CDATA[In the last version of WFilter NG firewall(2017.09.01), we&#8217;ve added ip mac history for all network clients. With this feature, you will be able to: Query ip and mac address history of all network clients. Gateway and bridge deployment are supported. You can record ip-mac activities even in bridge mode. When &#8220;mac address detector&#8221; is [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>In the last version of WFilter NG firewall(2017.09.01), we&#8217;ve added ip mac history for all network clients. With this feature, you will be able to:</p>
<ol>
<li>Query ip and mac address history of all network clients.</li>
<li>Gateway and bridge deployment are supported. You can record ip-mac activities even in bridge mode.</li>
<li>When &#8220;mac address detector&#8221; is enabled, you&#8217;re able to record ip-mac information in multi-subnet networks.</li>
</ol>
<p>Below are some screenshots:</p>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2017/09/QQ截图20170901083529.png"><img class="alignnone size-full wp-image-543" alt="QQ截图20170901083529" src="http://blog.wfilterngf.com/wp-content/uploads/2017/09/QQ截图20170901083529.png" width="1321" height="628" /></a></p>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2017/09/QQ截图20170901083551.png"><img class="alignnone size-full wp-image-542" alt="QQ截图20170901083551" src="http://blog.wfilterngf.com/wp-content/uploads/2017/09/QQ截图20170901083551.png" width="1544" height="495" /></a></p>
<p><img alt="Maccd00.jpg" src="http://wiki.wfilterngf.com/images/thumb/b/b5/Maccd00.jpg/750px-Maccd00.jpg" /></p>
]]></content:encoded>
			<wfw:commentRss>http://blog.wfilterngf.com/?feed=rss2&#038;p=541</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Software solutions to monitor internet usage in business networks.</title>
		<link>http://blog.wfilterngf.com/?p=533</link>
		<comments>http://blog.wfilterngf.com/?p=533#comments</comments>
		<pubDate>Thu, 24 Aug 2017 06:38:09 +0000</pubDate>
		<dc:creator><![CDATA[WFilter]]></dc:creator>
				<category><![CDATA[Content Filter]]></category>
		<category><![CDATA[Deployment]]></category>
		<category><![CDATA[Network management]]></category>
		<category><![CDATA[Settings]]></category>

		<guid isPermaLink="false">http://blog.wfilterros.com/?p=533</guid>
		<description><![CDATA[To save internet bandwidth and raise productivity, administrators need to know bandwidth usage and internet activities in business networks. There are network firewall appliances with this ability, while in this post, I will introduce several software monitoring solutions. 1. Passby monitoring on a mirroring port. &#8220;Port mirror&#8221; is a feature of manageable switches or routers. [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>To save internet bandwidth and raise productivity, administrators need to know bandwidth usage and internet activities in business networks. There are network firewall appliances with this ability, while in this post, I will introduce several software monitoring solutions.</p>
<p><img class="alignnone size-full wp-image-537" alt="monitor_usage" src="http://blog.wfilterngf.com/wp-content/uploads/2017/08/monitor_usage.png" width="800" height="500" /></p>
<h1>1. Passby monitoring on a mirroring port.</h1>
<p>&#8220;Port mirror&#8221; is a feature of manageable switches or routers. With &#8220;port mirroring&#8221;, you can get a copy of packets from other ports. So you can setup a software program in the target port pc to monitor all network traffic. This is called as &#8220;passby monitoring&#8221;. The network diagram:</p>
<p><img alt="" src="http://www.wfiltericf.com/support/WFilter_4_1/Doc/images/passby_switch_topology.png" /></p>
<p>With <a href="http://www.wfiltericf.com/WFilter.htm">WFilter internet content filter</a> installed, you will be able to monitor bandwidth, internet activities and deploy internet access policies. Screenshots:</p>
<p><img alt="" src="http://www.wfiltericf.com/internet-usage-monitoring/images/internet_usage_monitoring02.jpg" /></p>
<p><img alt="" src="http://www.wfiltericf.com/internet-usage-monitoring/images/internet_usage_monitoring05.jpg" /></p>
<p><img alt="" src="http://blog.wfilterngf.com/wp-content/uploads/2017/05/QQ%E6%88%AA%E5%9B%BE20170505164907.png" /></p>
<h1>2. SNMP-based monitoring</h1>
<p>Comparing to &#8220;port mirroring&#8221;, SNMP-based monitoring is easier to setup with less features. However, it&#8217;s also very convenient to monitor bandwidth with SNMP. Below are screenshots from PRTG.</p>
<p><img alt="Image result for PRTG" src="http://media.packetlife.net/media/armory/screenshots/prtg-network-monitor-137.png" /></p>
<h1>3. Linux network bridge</h1>
<p>Network bridge is more powerful,  with the ability to monitor traffic, allocate bandwidth, filter internet activities&#8230; A network bridge shall be deployed between your router/firewall and switch.</p>
<p><img alt="Ros guide bridge.png" src="http://wiki.wfilterngf.com/images/thumb/f/f0/Ros_guide_bridge.png/600px-Ros_guide_bridge.png" /></p>
<p>To setup a network bridge, you need a pc with two network cards(wired adapters only). I would recommend you to use <a href="http://www.wfilterngf.com" target="_blank">WFilter NG firewall</a> as the operation system. It&#8217;s a dedicated linux distribution for internet content filtering and firewall. Below are screenshots from WFilter NGF:</p>
<p><img alt="freelicense03" src="http://blog.wfilterngf.com/wp-content/uploads/2017/06/freelicense03.png" /></p>
<p><img alt="freelicense04" src="http://blog.wfilterngf.com/wp-content/uploads/2017/06/freelicense04.png" /></p>
<p><img alt="freelicense07" src="http://blog.wfilterngf.com/wp-content/uploads/2017/06/freelicense07.png" /></p>
]]></content:encoded>
			<wfw:commentRss>http://blog.wfilterngf.com/?feed=rss2&#038;p=533</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Wireless authentication solutions for business network.</title>
		<link>http://blog.wfilterngf.com/?p=528</link>
		<comments>http://blog.wfilterngf.com/?p=528#comments</comments>
		<pubDate>Tue, 15 Aug 2017 06:39:53 +0000</pubDate>
		<dc:creator><![CDATA[WFilter]]></dc:creator>
				<category><![CDATA[monitor wireless users]]></category>
		<category><![CDATA[Network management]]></category>
		<category><![CDATA[Settings]]></category>

		<guid isPermaLink="false">http://blog.wfilterros.com/?p=528</guid>
		<description><![CDATA[Most business networks are now providing WiFi access for employees and customers. Since everyone can access WiFi network, unauthorized access will bring virus attack and intruders. So you need to pay more attention to your network security. Usually, you have below options: Set WiFi users in a separator VLAN, which shall only have limited access [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Most business networks are now providing WiFi access for employees and customers. Since everyone can access WiFi network, unauthorized access will bring virus attack and intruders. So you need to pay more attention to your network security.</p>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2017/08/wifi_auth_solution01_en.png"><img class="alignnone size-full wp-image-529" alt="wifi_auth_solution01_en" src="http://blog.wfilterngf.com/wp-content/uploads/2017/08/wifi_auth_solution01_en.png" width="800" height="499" /></a></p>
<p>Usually, you have below options:</p>
<ol>
<li>Set WiFi users in a separator VLAN, which shall only have limited access to enterprise resources. This is the first door to keep intruders out.</li>
<li>Enable user authentication for WiFi users.</li>
<li>Enable ip-mac binding for WiFi users.</li>
<li>Record internet usage history for WiFi users, including IP, MAC, visited websites.</li>
</ol>
<p>In this post, I will introduce the &#8220;Web Auth&#8221; feature of WFilter NG firewall. For WiFi clients, the most widely used authentication is &#8220;Web Authentication&#8221;(Portal Authentication). Clients won&#8217;t have internet access until authenticated in a web portal. For IOS and windows, the web portal will show up automatically.</p>
<h2>1. User &amp; Pass Authentication</h2>
<p>When enabled, WiFi clients will be required for username and password.</p>
<p><a href="http://wiki.wfilterngf.com/File:Faq_en_webauth002.jpg"><img alt="Faq en webauth002.jpg" src="http://wiki.wfilterngf.com/images/thumb/0/0f/Faq_en_webauth002.jpg/800px-Faq_en_webauth002.jpg" width="800" height="464" /></a></p>
<p>Various authentication method are supported, including &#8220;Local Auth&#8221;, &#8220;Email Auth&#8221;, &#8220;Ldap Auth&#8221; and &#8220;Radius Auth&#8221;.</p>
<ul>
<li>If you have an existing ldap domain, you can authenticate with domain users.</li>
<li>Users also can authenticate with email accounts.</li>
<li>You also can define local users in WFilter for authentication.</li>
<li>Remote radius server is also supported.</li>
</ul>
<p><img alt="" src="http://wiki.wfilterngf.com/images/4/4a/Faq_en_webauth001.png" /></p>
<p>You can set internet access policy, query history and reports based on usernames.</p>
<p><img alt="" src="http://wiki.wfilterngf.com/images/9/99/Faq_en_account002.png" /></p>
<p><img alt="" src="http://wiki.wfilterngf.com/images/9/9e/Faq_account003.png" /></p>
<h2>2. Third Party Auth</h2>
<p>&#8220;Third party authentication&#8221; is designed for marketing purpose. You have &#8220;wechat WiFi&#8221; and &#8220;facebook WiFi&#8221; in default. When enabled, users shall checkin in your facebook page to access internet.</p>
<p><img alt="" src="http://wiki.wfilterngf.com/images/e/e0/Faq_en_fbwifi001.png" /></p>
<p><img alt="" src="http://wiki.wfilterngf.com/images/4/49/Faq_en_fbwifi003.png" /><br />
<a href="http://www.wfilterngf.com/download.htm" target="_blank">Download WFilter NG firewall now!</a></p>
]]></content:encoded>
			<wfw:commentRss>http://blog.wfilterngf.com/?feed=rss2&#038;p=528</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>API overview of WFilter NGF.</title>
		<link>http://blog.wfilterngf.com/?p=520</link>
		<comments>http://blog.wfilterngf.com/?p=520#comments</comments>
		<pubDate>Tue, 18 Jul 2017 09:18:11 +0000</pubDate>
		<dc:creator><![CDATA[WFilter]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Settings]]></category>

		<guid isPermaLink="false">http://blog.wfilterros.com/?p=520</guid>
		<description><![CDATA[WFilter NGF has a built-in API library for developers to manipulate the entire system or integrate WFilter features. With APIs, you&#8217;re able to: 1. Get bandwidth history. 2. Get online users, including ip, mac, account, live connections. 3. Terminate user connections, kick off user&#8230; 4. Add/remove user from virtual group to apply policies. 5. Extend user [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>WFilter NGF has a built-in API library for developers to manipulate the entire system or integrate WFilter features. With APIs, you&#8217;re able to:</p>
<ul>
<li>1. Get bandwidth history.</li>
<li>2. Get online users, including ip, mac, account, live connections.</li>
<li>3. Terminate user connections, kick off user&#8230;</li>
<li>4. Add/remove user from virtual group to apply policies.</li>
<li>5. Extend user expire date.</li>
</ul>
<p>In this post, I will use an API example to demonstate the API library usage of WFilter NGF. The requirement is simple: &#8220;a API call to set access policy and bandwidth rate limit for an ip address&#8221;.</p>
<p>1. First, we need to setup WFilter NGF.</p>
<p>Because &#8220;access policy&#8221; and &#8220;bandwidth shaper&#8221; are separate modules in WFilter NGF,  we need to setup a virtual group with policies applied. In the API call, we only need to add IP addresses into the virtual group to apply the rules.</p>
<p>1.1) New a &#8220;limited access&#8221; virtual group.</p>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2017/07/api01.png"><img class="alignnone size-full wp-image-521" alt="api01" src="http://blog.wfilterngf.com/wp-content/uploads/2017/07/api01.png" width="971" height="624" /></a> <a href="http://blog.wfilterngf.com/wp-content/uploads/2017/07/api02.png"><img class="alignnone size-full wp-image-522" alt="api02" src="http://blog.wfilterngf.com/wp-content/uploads/2017/07/api02.png" width="655" height="424" /></a></p>
<p>1.2) Setup policies to this group.</p>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2017/07/api03.png"><img class="alignnone size-full wp-image-523" alt="api03" src="http://blog.wfilterngf.com/wp-content/uploads/2017/07/api03.png" width="1289" height="638" /></a></p>
<p>2. Use php to call WFilter API.</p>
<p>Now, we&#8217;ve setup policies for the virtual group. To implement policies to an IP address, we only need to add this IP into this group.  We have a php SDK, you need to include the WFilterNGF.php to call the API functions.</p>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2017/07/api04.png"><img class="alignnone size-full wp-image-524" alt="api04" src="http://blog.wfilterngf.com/wp-content/uploads/2017/07/api04.png" width="851" height="611" /></a></p>
<p>Isn&#8217;t it simple? You may check more details in <a href="http://wiki.wfilterngf.com/API" target="_blank">WFilter API</a>. If you have any suggestions or requirement, please feel free to <a href="http://www.wfiltericf.com/contact.htm" target="_blank">contact us</a>.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://blog.wfilterngf.com/?feed=rss2&#038;p=520</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Three ways to block torrent traffic in your network.</title>
		<link>http://blog.wfilterngf.com/?p=506</link>
		<comments>http://blog.wfilterngf.com/?p=506#comments</comments>
		<pubDate>Mon, 03 Jul 2017 09:10:01 +0000</pubDate>
		<dc:creator><![CDATA[WFilter]]></dc:creator>
				<category><![CDATA[bandwidth]]></category>
		<category><![CDATA[Block P2P]]></category>
		<category><![CDATA[How to block p2p]]></category>
		<category><![CDATA[Settings]]></category>

		<guid isPermaLink="false">http://blog.wfilterros.com/?p=506</guid>
		<description><![CDATA[Torrent downloading is annoying and can consume most of your bandwidth, so you might want to block torrent in your network. There are several ways to block torrent in your network. While in this post, I will introduce three solutions to block torrent(bittorrent, utorrent, qtorrent) with WFilter internet content filter and WFilter NG firewall. Please [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Torrent downloading is annoying and can consume most of your bandwidth, so you might want to block torrent in your network. There are several ways to block torrent in your network. While in this post, I will introduce three solutions to block torrent(bittorrent, utorrent, qtorrent) with WFilter internet content filter and WFilter NG firewall.</p>
<p>Please be aware that &#8220;WFilter internet content filter(ICF)&#8221; and &#8220;WFilter NG firewall(NGF)&#8221; are total different products. WFilter ICF is a windows program, which is designed for pass-by deployment on a mirroring port. While WFilter NGF is a dedicated linux firewall system.</p>
<p>1. Block torrent with WFilter ICF</p>
<p><img alt="passby_router_topology.png" src="http://www.wfiltericf.com/support/WFilter_4_1/Doc/images/passby_router_topology.png" /></p>
<p>As you can see in the diagram, the WFilter internet content filter(ICF) shall be connected to a mirroring port in your router or switch. So it can analysis network packets and deploy internet access policies. Steps to block torrent with WFilter ICF:</p>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2017/07/blocktorrent01.png"><img class="alignnone size-full wp-image-507" alt="blocktorrent01" src="http://blog.wfilterngf.com/wp-content/uploads/2017/07/blocktorrent01.png" width="1087" height="619" /></a> <a href="http://blog.wfilterngf.com/wp-content/uploads/2017/07/blocktorrent02.png"><img class="alignnone size-full wp-image-508" alt="blocktorrent02" src="http://blog.wfilterngf.com/wp-content/uploads/2017/07/blocktorrent02.png" width="1182" height="440" /></a> <a href="http://blog.wfilterngf.com/wp-content/uploads/2017/07/blocktorrent03.png"><img class="alignnone size-full wp-image-509" alt="blocktorrent03" src="http://blog.wfilterngf.com/wp-content/uploads/2017/07/blocktorrent03.png" width="1325" height="625" /></a></p>
<p>2. Block torrent with WFilter NGF as a network bridge.</p>
<p>Network topology diagram:</p>
<p><img alt="Ros guide bridge.png" src="http://wiki.wfilterngf.com/images/thumb/f/f0/Ros_guide_bridge.png/600px-Ros_guide_bridge.png" width="600" height="310" /></p>
<p>WFilter NGF acts as a network bridge, sitting between your router and switch. So it can filter internet traffic.</p>
<p>3. Block torrent with WFilter NGF as a network gateway.</p>
<p>Network topology diagram:</p>
<p><img alt="Ros guide gateway.png" src="http://wiki.wfilterngf.com/images/thumb/3/30/Ros_guide_gateway.png/600px-Ros_guide_gateway.png" width="600" height="263" /></p>
<p>In this topology, WFilter NGF acts as the gateway of your network to deploy internet access policies. Please be aware that you can install WFilter NGF in a virtual machine to act as a virtual gateway, here is a guide: <a href="http://wiki.wfilterngf.com/VMWare_Image" target="_blank">Using a pre-built VMWare image of WFilter NG Firewall</a></p>
<p>You can setup &#8220;application control&#8221; policies to block torrent with below steps:</p>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2017/07/block_torrent1.png"><img class="alignnone size-full wp-image-510" alt="block_torrent1" src="http://blog.wfilterngf.com/wp-content/uploads/2017/07/block_torrent1.png" width="1039" height="601" /></a> <a href="http://blog.wfilterngf.com/wp-content/uploads/2017/07/block_torrent2.png"><img class="alignnone size-full wp-image-511" alt="block_torrent2" src="http://blog.wfilterngf.com/wp-content/uploads/2017/07/block_torrent2.png" width="857" height="457" /></a> <a href="http://blog.wfilterngf.com/wp-content/uploads/2017/07/block_torrent3.png"><img class="alignnone size-full wp-image-512" alt="block_torrent3" src="http://blog.wfilterngf.com/wp-content/uploads/2017/07/block_torrent3.png" width="886" height="563" /></a></p>
<p>&nbsp;</p>
<p>When deployed and configured properly, both WFilter ICF and WFilter NGF can block torrent completely. All torrent clients will have zero uploading and downloading speed.</p>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2017/07/utorrent_4.jpg"><img class="alignnone size-full wp-image-513" alt="utorrent_4" src="http://blog.wfilterngf.com/wp-content/uploads/2017/07/utorrent_4.jpg" width="926" height="288" /></a> <a href="http://blog.wfilterngf.com/wp-content/uploads/2017/07/block_torrent0412.jpg"><img class="alignnone size-full wp-image-514" alt="block_torrent04[1][2]" src="http://blog.wfilterngf.com/wp-content/uploads/2017/07/block_torrent0412.jpg" width="697" height="294" /></a> <a href="http://blog.wfilterngf.com/wp-content/uploads/2017/07/after..jpg"><img class="alignnone size-full wp-image-515" alt="after." src="http://blog.wfilterngf.com/wp-content/uploads/2017/07/after..jpg" width="676" height="149" /></a></p>
<p>&nbsp;</p>
<p>WFilter ICF homepage: <a href="http://www.wfiltericf.com/WFilter.htm" target="_blank">WFilter Internet Content Filter</a></p>
<p>WFilter NG homepage: <a href="http://www.wfilterngf.com" target="_blank">WFilter NG firewall</a></p>
<p>WFilter videos: <a href="http://youtube.com/user/wfbla/videos" target="_blank">WFilter Videos</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://blog.wfilterngf.com/?feed=rss2&#038;p=506</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How to setup ip-mac binding in your switch?</title>
		<link>http://blog.wfilterngf.com/?p=500</link>
		<comments>http://blog.wfilterngf.com/?p=500#comments</comments>
		<pubDate>Sat, 24 Jun 2017 09:03:42 +0000</pubDate>
		<dc:creator><![CDATA[WFilter]]></dc:creator>
				<category><![CDATA[Network management]]></category>
		<category><![CDATA[Settings]]></category>

		<guid isPermaLink="false">http://blog.wfilterros.com/?p=500</guid>
		<description><![CDATA[For security purpose, you might want to bind ip address with MAC address for client devices. There are several IP-mac binding solutions, including ARP binding, port-based binding&#8230; In this post, I will introduce the steps to setup port-based IP-MAC binding in your switch. 1. Cisco 2950 Syntax of cisco 2950 port-based IP-MAC binding. Switch#config terminal [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><span style="line-height: 1.71429; font-size: 1rem;">For security purpose, you might want to bind ip address with MAC address for client devices. There are several IP-mac binding solutions, including ARP binding, port-based binding&#8230;</span></p>
<p>In this post, I will introduce the steps to setup port-based IP-MAC binding in your switch.</p>
<h2>1. Cisco 2950</h2>
<p><em>Syntax of cisco 2950 port-based IP-MAC binding.</em><br />
<em> Switch#config terminal</em><br />
<em> Switch(config)#Interface fastethernet 0/1</em><br />
<em>Switch(config-if)#switchport port-security mac-address xxxx.xxxx.xxxx ip-address 192.168.x.x</em></p>
<h2>2. Huawei S5700</h2>
<p><em>Syntax of Huawei S5700 port-based IP-MAC binding.</em><br />
<em> #interface GigabitEthernet 1/0/1</em><br />
<em> #user-bind mac-addr xxxx-xxxx-xxxx ip-addr 10.100.11.2</em></p>
<p>Other models have similar syntax. Port-based binding in switch is powerful, but it&#8217;s rather complicated to setup and maintaince, especially when you have a lot clients.</p>
<p>However, IP-MAC binding in gateway is easier to setup, also with powerful features, please check below screenshots in WFilter NG firewall.</p>
<h2>3. WFilter NGF</h2>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2017/06/ipbound01.png"><img class="alignnone size-full wp-image-501" alt="ipbound01" src="http://blog.wfilterngf.com/wp-content/uploads/2017/06/ipbound01.png" width="1390" height="657" /></a> <a href="http://blog.wfilterngf.com/wp-content/uploads/2017/06/ipbound02.png"><img class="alignnone size-full wp-image-502" alt="ipbound02" src="http://blog.wfilterngf.com/wp-content/uploads/2017/06/ipbound02.png" width="857" height="581" /></a></p>
<p>When configured, DHCP clients will be assigned with static ip addresses; clients not matching the ip-mac binding relationship will be blocked.</p>
]]></content:encoded>
			<wfw:commentRss>http://blog.wfilterngf.com/?feed=rss2&#038;p=500</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>A site to site ipsec vpn example.</title>
		<link>http://blog.wfilterngf.com/?p=496</link>
		<comments>http://blog.wfilterngf.com/?p=496#comments</comments>
		<pubDate>Tue, 13 Jun 2017 10:03:23 +0000</pubDate>
		<dc:creator><![CDATA[WFilter]]></dc:creator>
				<category><![CDATA[Network management]]></category>
		<category><![CDATA[Settings]]></category>

		<guid isPermaLink="false">http://blog.wfilterros.com/?p=496</guid>
		<description><![CDATA[With the &#8220;IPSec VPN&#8221; module in WFilter NGF, you can build a secure site-to-site VPN by a few clicks. In this post, I will demonstrate a typical usage of site to site ipsec vpn. Please check the diagram at first. When successfully configure, A,B,C will have full access of each other. Please check below steps: Suppose [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>With the &#8220;IPSec VPN&#8221; module in WFilter NGF, you can build a secure site-to-site VPN by a few clicks. In this post, I will demonstrate a typical usage of site to site ipsec vpn. Please check the diagram at first.</p>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2017/06/ipsecVPN.png"><img class="alignnone size-full wp-image-497" alt="ipsecVPN" src="http://blog.wfilterngf.com/wp-content/uploads/2017/06/ipsecVPN.png" width="572" height="419" /></a></p>
<p>When successfully configure, A,B,C will have full access of each other. Please check below steps:</p>
<p>Suppose you have 3 networks:</p>
<ul>
<li>Headquarter A, static public ip address, LAN subnet is 192.168.10.0/24.</li>
<li>Branch B, PPPoE internet access, LAN subnet is 192.168.30.0/24.</li>
<li>Branch C, PPPoE internet access, LAN subnet is 172.16.1.0/24.</li>
</ul>
<p>Now let me guide you to build a virtual private network(VPN) for these three locations.</p>
<h3>1 Settings for Headquarter A</h3>
<ul>
<li>Setup the IPSec tunnel</li>
</ul>
<p><a href="http://wiki.wfilterngf.com/File:Ipsec_center01.png"><img alt="Ipsec center01.png" src="http://wiki.wfilterngf.com/images/thumb/a/af/Ipsec_center01.png/800px-Ipsec_center01.png" width="800" /></a></p>
<p><a href="http://wiki.wfilterngf.com/File:Ipsec_center02.png"><img alt="Ipsec center02.png" src="http://wiki.wfilterngf.com/images/thumb/b/ba/Ipsec_center02.png/800px-Ipsec_center02.png" width="800" /></a></p>
<ul>
<li>Enable forwarding of branches</li>
</ul>
<p>Without this setting, branches can access headquarter, but no access between branches. <a href="http://wiki.wfilterngf.com/File:Ipsec_center03.png"><img alt="Ipsec center03.png" src="http://wiki.wfilterngf.com/images/thumb/7/7b/Ipsec_center03.png/800px-Ipsec_center03.png" width="800" /></a></p>
<h3>2 Branch B</h3>
<ul>
<li>Setup the IPSec tunnel</li>
</ul>
<p><a href="http://wiki.wfilterngf.com/File:Ipsec_client01.png"><img alt="Ipsec client01.png" src="http://wiki.wfilterngf.com/images/thumb/2/27/Ipsec_client01.png/800px-Ipsec_client01.png" width="800" /></a></p>
<h3>3 Branch C</h3>
<ul>
<li>Setup the IPSec tunnel</li>
</ul>
<p><a href="http://wiki.wfilterngf.com/File:Ipsec_client03.png"><img alt="Ipsec client03.png" src="http://wiki.wfilterngf.com/images/thumb/9/94/Ipsec_client03.png/800px-Ipsec_client03.png" width="800" /></a></p>
<p>By above steps, AB and AC are now connected. If you also want B and C to communicate with each other, you need to add B&amp;C subnets in headquartor&#8217;s local subnet.</p>
<p><a href="http://wiki.wfilterngf.com/File:Ipsec_client04.png"><img alt="Ipsec client04.png" src="http://wiki.wfilterngf.com/images/thumb/4/44/Ipsec_client04.png/800px-Ipsec_client04.png" width="800" /></a></p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>http://blog.wfilterngf.com/?feed=rss2&#038;p=496</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Powerful networking diagnose tool sets for IT professionals.</title>
		<link>http://blog.wfilterngf.com/?p=433</link>
		<comments>http://blog.wfilterngf.com/?p=433#comments</comments>
		<pubDate>Fri, 12 May 2017 07:09:23 +0000</pubDate>
		<dc:creator><![CDATA[WFilter]]></dc:creator>
				<category><![CDATA[Deployment]]></category>
		<category><![CDATA[Network management]]></category>
		<category><![CDATA[Settings]]></category>

		<guid isPermaLink="false">http://blog.wfilterros.com/?p=433</guid>
		<description><![CDATA[As a network professional, when things go wrong in your network, the right tools are required to minimize network downtime. In this post, I will reveal you the extension system in WFilter, a powerful tool sets for networking issues. At a first galance All WFilter systems have an &#8220;extension&#8221; library, which contains a powerful free [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2017/05/toolsethome.png"><img class="alignnone size-full wp-image-439" alt="toolsethome" src="http://blog.wfilterngf.com/wp-content/uploads/2017/05/toolsethome.png" width="744" height="400" /></a><br />
As a network professional, when things go wrong in your network, the right tools are required to minimize network downtime.<br />
In this post, I will reveal you the extension system in WFilter, a powerful tool sets for networking issues.</p>
<h2>At a first galance</h2>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2017/05/toolset01.png"><img class="alignnone size-full wp-image-434" alt="toolset01" src="http://blog.wfilterngf.com/wp-content/uploads/2017/05/toolset01.png" width="1388" height="653" /></a></p>
<p>All WFilter systems have an &#8220;extension&#8221; library, which contains a powerful free tool sets for IT administrators. Most extensions are free. Even supported in WFilter free, a freeware for network internet filtering and monitoring.</p>
<p>Now let&#8217;s see what we can do with WFilter extensions:</p>
<h3>1. Scan client devices in network</h3>
<p>With &#8220;network scan&#8221; extension, you can get a complete list of network clients, including IP, MAC, manufactor and open ports&#8230;<br />
<a href="http://blog.wfilterngf.com/wp-content/uploads/2017/05/toolset02.png"><img class="alignnone size-full wp-image-435" alt="toolset02" src="http://blog.wfilterngf.com/wp-content/uploads/2017/05/toolset02.png" width="1195" height="647" /></a></p>
<h3>2. Discover and scan DHCP services in network</h3>
<p>The &#8220;Network DHCP discover plugin&#8221; of WFilter can scan DHCP services in your network by a single click. It will list all dhcp servers ip addresses, MAC addresses and MAC manufactures.<br />
<img alt="" src="http://wiki.wfiltericf.com/images/thumb/5/5f/Plugin_dhcp02.png/600px-Plugin_dhcp02.png" /></p>
<h3>3. Detect NAT sharing services in network</h3>
<p>Detect illegal NAT sharing in network.<br />
<img alt="" src="http://wiki.wfiltericf.com/images/thumb/f/fd/Nat_discover02.png/600px-Nat_discover02.png" /></p>
<h3>4. Check network health of availability, IP conflict, ARP spoof and broadcast storm</h3>
<p>This extension can:</p>
<ol>
<li>check availability and ping performance of dns servers.</li>
<li>check availability and ping performance of internet sites.</li>
<li>check availability and ping performance of local network hosts.</li>
<li>check whether there is ip conflict in local network.</li>
<li>check whether there is arp spoof running in local network.</li>
<li>check whether there is broadcast storm in local network.</li>
</ol>
<p><img alt="" src="http://wiki.wfiltericf.com/images/thumb/b/b2/Ping_test02.png/600px-Ping_test02.png" /></p>
<h3>5. Scan proxy servers in network</h3>
<p><img alt="" src="http://wiki.wfiltericf.com/images/thumb/d/d5/Proxy_scan02.png/600px-Proxy_scan02.png" /></p>
<h3>6. Graph ping performance of multiple hosts</h3>
<p>With this plugin, you can get ping performance and graph reports for multiple hosts in a period of time.<br />
<img alt="" src="http://wiki.wfiltericf.com/images/thumb/d/de/Multiping01.png/800px-Multiping01.png" /></p>
<p>A complete extesions list can be found at here: <a href="http://www.wfiltericf.com/plugins" target="_blank">WFilter extensions</a>. And more will come. The most important thing is that most extension are free, supported in &#8220;WFilter internet content filter(commercial)&#8221;, &#8220;WFilter NG firewall&#8221; and &#8220;WFilter Free&#8221;.</p>
<p>Isn&#8217;t it exicting? <a href="http://www.wfiltericf.com/download_trial.htm" target="_blank">Download WFilter Now!</a></p>
]]></content:encoded>
			<wfw:commentRss>http://blog.wfilterngf.com/?feed=rss2&#038;p=433</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How to bind ip address with mac address in network?</title>
		<link>http://blog.wfilterngf.com/?p=394</link>
		<comments>http://blog.wfilterngf.com/?p=394#comments</comments>
		<pubDate>Thu, 06 Apr 2017 06:00:55 +0000</pubDate>
		<dc:creator><![CDATA[WFilter]]></dc:creator>
				<category><![CDATA[Deployment]]></category>
		<category><![CDATA[Installation]]></category>
		<category><![CDATA[Network management]]></category>
		<category><![CDATA[Settings]]></category>

		<guid isPermaLink="false">http://blog.wfilterros.com/?p=394</guid>
		<description><![CDATA[IP and MAC address binding is usually configured in network switch or router(gateway). An effective IP-MAC binding solution needs to: 1. Be able to integrate with the DHCP server to assign static IPs to clients. 2. Have option to block or allow internet for un-bound devices. 3. Be able to do IP-MAC binding in multi-subnet [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>IP and MAC address binding is usually configured in network switch or router(gateway). An effective IP-MAC binding solution needs to:<br />
1. Be able to integrate with the DHCP server to assign static IPs to clients.<br />
2. Have option to block or allow internet for un-bound devices.<br />
3. Be able to do IP-MAC binding in multi-subnet networks.</p>
<p>In this post, I will demonstrate the &#8220;IP-MAC binding&#8221; feature in WFilter NG firewall. For IP-MAC binding in &#8220;WFilter internet content filter&#8221;, please check: &#8220;<a href="http://wiki.wfiltericf.com/WFilter_IPBound" target="_blank">WFilter IP-MAC binding solution</a>&#8220;.</p>
<h2>1. IP-MAC Binding List</h2>
<p>You can define the IP-MAC binding list in &#8220;Modules&#8221;-&gt;&#8221;Access Policy&#8221;-&gt;&#8221;IP-MAC Binding&#8221;. When listed, these devices will always be assigned with static IP addresses when using dynamic IP address.</p>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2017/04/ipbound01.png"><img class="alignnone size-full wp-image-395" alt="ipbound01" src="http://blog.wfilterngf.com/wp-content/uploads/2017/04/ipbound01.png" width="1390" height="657" /></a></p>
<h2>2. Settings</h2>
<p>Below options are available in the &#8220;IP-MAC binding&#8221; module:<br />
1. For unlisted IP addresses, you can choose &#8220;Allow all&#8221;, &#8220;Block all&#8221; or &#8220;Block below IP ranges&#8221;.<br />
2. For unlisted MAC addresses(devices), you can configure whether to assign IP address or not.</p>
<p><a href="http://blog.wfilterngf.com/wp-content/uploads/2017/04/ipbound02.png"><img class="alignnone size-full wp-image-396" alt="ipbound02" src="http://blog.wfilterngf.com/wp-content/uploads/2017/04/ipbound02.png" width="857" height="581" /></a></p>
<h2>3. Multi-subnet IP-MAC binding solution</h2>
<p>Your network is multi-subnet? No worry. With <a href="http://wiki.wfilterngf.com/Maccd" target="_blank">&#8220;MAC address detector&#8221;</a>, WFilter NGF is able to retrieve MAC addresses from your core switch. So you can bind IP address with MAC address, even in a multi-subnet network.</p>
<p><img alt="Maccd00.jpg" src="http://wiki.wfilterngf.com/images/thumb/b/b5/Maccd00.jpg/750px-Maccd00.jpg" /></p>
<p>A guide of &#8220;IP-MAC binding&#8221; in WFilter NGF can be found at: <a href="http://wiki.wfilterngf.com/Ipbound" target="_blank">IP-MAC binding</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://blog.wfilterngf.com/?feed=rss2&#038;p=394</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>WFilter ICF vs. proxy-based internet filtering solutions</title>
		<link>http://blog.wfilterngf.com/?p=372</link>
		<comments>http://blog.wfilterngf.com/?p=372#comments</comments>
		<pubDate>Wed, 08 Mar 2017 09:15:54 +0000</pubDate>
		<dc:creator><![CDATA[WFilter]]></dc:creator>
				<category><![CDATA[Deployment]]></category>
		<category><![CDATA[Settings]]></category>

		<guid isPermaLink="false">http://blog.wfilterros.com/?p=372</guid>
		<description><![CDATA[Proxy-based internet filtering solution requires you to setup a proxy server, either transparent or non-transparent, then you can setup policies to filter web access. There are a lot open source or free products. This solution has below advantages and disadvantages. Advantages: Free or open source. Can filter websites. Disadvantages: Most are linux-based. You need a [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Proxy-based internet filtering solution requires you to setup a proxy server, either transparent or non-transparent, then you can setup policies to filter web access. There are a lot open source or free products. This solution has below advantages and disadvantages.</p>
<p><strong>Advantages:</strong></p>
<ol>
<li>Free or open source.</li>
<li>Can filter websites.</li>
</ol>
<p><strong>Disadvantages:</strong></p>
<ol>
<li>Most are linux-based. You need a linux pc to setup the proxy.</li>
<li>No support.</li>
<li>Less features. Only for domain filtering.</li>
<li>Add network latency.</li>
</ol>
<p><strong>Comparison</strong></p>
<p>Proxy-based internet filtering solution is similar to the &#8220;website black list&#8221; in your router/firewall. If you only need to block some sites, it&#8217;s an option.</p>
<p>With WFilter ICF, you will get:</p>
<ol>
<li>Enterprise-level internet monitoring and filtering features.</li>
<li>Dedicated support.</li>
<li>No influence to network performance.</li>
<li>Easier to be deployed.</li>
</ol>
]]></content:encoded>
			<wfw:commentRss>http://blog.wfilterngf.com/?feed=rss2&#038;p=372</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
