background image

protocols if necessary, similar to domain names. The registration of the ports offers 
the advantage that an application can be identified according to the port number, but 
only if the application uses the IANA registered port. The rest of the ports from port 
number 49152 to 65535 are so called 

Dynamic 

and/or 

Private Ports

. You find further 

information on the following website:

http://www.iana.org/assignments/port-numbers

Port scan:

Port scans 

are executed in order to spy out free ports on the computer. 

If a computer provides a server service to others, it opens a TCP/IP or UDP port or 
both or several ports. A web server has to open the port 80. A port scan finds out 
which ports are opened on the computer. In order to see which ports are actually 
opened on your computer you can execute a test on the following website: 

http://www.port-scan.de/index2.php

IP:

In order to get connected to a computer the 

Internet Protocol (IP) 

identifies it with a 

definite IP address. In case you send a letter to a friend you have to write the street 
and the city on it. The IP address has the same function.

Host File:

Sometimes the host file is used to block known web servers by entering the local 
host (127.0.0.1), so that all requests are sent to the own system. The specialty of this 
method is that the blockage is valid in the whole system and is not limited to the 
browser as web filters are. Furthermore you can use these filters against some 
malware programs if they are trying to get commands from already known servers. 

URL:

Uniform Resource Locators (URL) are a kind of Uniform Resource Identifiers (URLs). 
URLs identify and locate a resource via the used network protocol (e.g. HTTP or 
FTP) and the location of the resource in the computer networks. 
As URLs are the first and most frequent kind of URLs the terms are often used as 
synonyms. 
In colloquial language URL is frequently used as a synonym for Internet addresses 
like e.g

www.avira.com

.

Slide-Up:

A slide-up is a small window which appears slowly top right or down right on your 
screen and disappears after an interaction or after some time. 

- 4 -

Summary of Contents for FIREWALL PREMIUM SECURITY SUITE

Page 1: ...HowTo Firewall Avira Premium Security Suite Avira Support July 2009...

Page 2: ...16 3 2 3 2 Automatically allow applications created by trusted vendor 17 3 2 3 3 Vendors 18 3 2 3 4 Remove 19 3 2 3 5 Reload 20 3 2 4 Settings 21 3 2 4 1 Automatic rule timeout 21 3 2 4 2 Advanced op...

Page 3: ...so called ports are used Therefore the port number of the service which contains the data is also sent Additionally UPD offers an integrity check by sending a check sum Thereby an incomplete transmis...

Page 4: ...a definite IP address In case you send a letter to a friend you have to write the street and the city on it The IP address has the same function Host File Sometimes the host file is used to block kno...

Page 5: ...computer is invisible in the network Furthermore connections form outside are blocked and flooding and port scan are prevented This is the default setting after the installation of the Avira Premium...

Page 6: ...line protection The register Online protection is located on the left side of the Control Center Open firewall settings A click on Firewall on the submenu of Online protection opens the configuration...

Page 7: ...and Block all You can find a description of the levels directly on the right side of the controller Please choose the level Medium in case any problems with network printers removable hard disk or sim...

Page 8: ...ng and port scan are prevented 3 1 4 Medium In comparison to the firewall setting High the computer is visible in the network and receives TCP and UDP requests These requests are refused TCP and UDP p...

Page 9: ...security level Medium That means with Medium some TCP and UDP package requests are recognized and forwarded automatically Others are refused 3 1 5 Low Also the level Low offers you the protection of t...

Page 10: ...ure AntiVir You also have the possibility to start the configuration via the Avira Control Center by opening the Control Center and by clicking on Configuration top right or by pressing F8 or via Extr...

Page 11: ...he adapter rules as you want After you have changed the adapter rules the control ler of the firewall is placed on the security level Custom 3 2 1 1 Incoming Rules Incoming rules help to control the i...

Page 12: ...owing protocols IP ICMP UDP and TCP In order to enter settings for the Outgoing rules you can proceed in the same way as for the settings of the Incoming rules Examples Peer to Peer In case you should...

Page 13: ...VMware In case the Internet access should not be possible out of your VMware you have to enable it via the following template 13...

Page 14: ...have administrative rights the list only shows you the currently logged on users Example Thereby an administrator can make sure that a web browser doesn t receive Internet access or that a chat progr...

Page 15: ...ode Filtered the adapter rules and the application rules are checked In the mode Privileged only the application rules are checked Furthermore the action can be changed from Allow to Deny or Ask If yo...

Page 16: ...he network access of application which are signed by the listed vendors by default Therefore you activate the option Automatically allow applications created by trusted vendors 3 2 3 1 Trusted vendors...

Page 17: ...lly allow applications created by trusted vendor If this option is activated applications with a signature of known and trusted vendors get automatically an access to the network This option is activa...

Page 18: ...ctivated as we have the contact data of these vendors The vendors are licensed software enterprises Therefore the vendors are categorized as trusted vendors 3 2 3 3 Vendors The list shows all vendors...

Page 19: ...3 2 3 4 Remove The marked entry is removed from the list of trusted vendors In order to remove the marked vendor definitely from the list press OK or Apply in the configuration win dow 19...

Page 20: ...can t reload it But you have the possibility to add the vendor again to the list of trusted vendors via the option Always trust this vendor in the popup window of the network event The firewall priori...

Page 21: ...default 3 2 4 2 Advanced options Windows Host file is NOT LOCKED If this option is on LOCKED the windows host file is write protected A manipulation of the file is no longer possible For example malwa...

Page 22: ...startup This option is activated by default as the use of two firewalls at the same time might cause problems Two desktop firewalls interfere with each other 3 2 4 3 Notifications Here you can choose...

Page 23: ...ions blocked In case an application should try to build up an external connection which you have not allowed in the firewall or which is not privileged the connection is blocked by the Avira firewall...

Page 24: ...er different network ac cesses of an application individually That means you create a special application rule for an application You can administer the traffic of an application individually or you o...

Page 25: ...network connection Alternatively you are informed only on the first con nection attempt This option is deactivated by default We recommend you to keep the default settings So you receive only one pop...

Page 26: ...r this application in the dialogue box Network event is automatically activated for the network access by signed applications of certain vendors The vendors are Microsoft Mozilla Opera Yahoo Google He...

Page 27: ...ent is import ant to you Show details on demand The details are only shown on request in the box network event That means the de tails are shown after a click on the button Show details in the box net...

Page 28: ...s disabled The option Allow privileged is deactivated by default in the box network event Remember last used state The option Allow privileged is used as it has been before in the box network event If...

Page 29: ...29...

Page 30: ...websites into content groups The URL filer lists are updated every day adjusted and extended They support European languages English German French Italian Russian The roles child young person adult a...

Page 31: ...t side You can open the windows by clicking on the plus in front of WebGuard The parental control is the third point Choose it and activate it on the right side 4 2 User selection You find all users o...

Page 32: ...30 sign are given for a name Example The role child under 16 should be added Click on Add The new role appears in the right box In order to configure the role Child under 16 choose the role and click...

Page 33: ...provided by a huge data base of the enterprise Cobion Furthermore the web filter accesses to a data base of the consumer protection central Hamburg If you should find a website which belongs to a cate...

Page 34: ...y Start the Avira AntiVir Control Center view page 5 Start the AntiVir Scheduler Click on the button Administration on the left side of the AntiVir Control Center Click on the button Scheduler In the...

Page 35: ...istant for creating and changing jobs appears You see the name and the description of the job Here you can change the description as you like By a click on the button Next the window for the selection...

Page 36: ...n next box you can choose the desired update time By activating the box underneath you can choose if the update should be started while connecting to the Internet If the update should be repeated beca...

Page 37: ...Click on Next in order to get to the selection of the display mode Click on the selection box and you can choose one of the following display mode 37...

Page 38: ...on with a click on Finish The procedure for a scan job is similar Here you only have to choose Scan job instead of Update job You find further information In the online help of the program Taste F1 In...

Reviews: