From Wikipedia, the free encyclopedia
The tools may be used to create, update, and view the tables that contain the filtering rules, similarly to the iptables program from which it was developed. A popular application is the creation of filter configurations to prevent ARP spoofing.
|This network-related software article is a stub. You can help Wikipedia by expanding it.|