CHAPTER 6
197
6.1.2
Security Level Design Principles
Each security level has a set of pre-configured Firewall Rules. In addition,
you can create new rules for all security levels for which the
Filtering
Mode
Normal
is displayed in the
Firewall Security Levels
table. The rules
in the
Firewall Security Levels
table are read from top to bottom.
When you create new security levels, you should consider the following
main principle for defining the firewall rules associated with them:
Allow only the needed services, and deny all the rest. This
minimizes the security risk. The drawback is that when new
services are needed, the firewall must be reconfigured, This,
however, is a small price to pay for increased security.
The opposite concept - to deny dangerous services and allow the rest - is
not acceptable, because no one can tell with certainty which services are
dangerous or might become dangerous in the future when a new security
problem is discovered.
A good security level would look something like this:
1.
Deny rules for the most dangerous services or hosts, optionally with
alerting.
2.
Allow rules for much-used common services and hosts.
3.
Deny rules for specific services you want alerts about (e.g. trojan
probes) with alerting.
4.
More general allow rules.
5.
Deny everything else.
Disabled
In this security level all network traffic, inbound
and outbound, is allowed and no alerts are
generated. Local rules cannot be created.
Summary of Contents for CLIENT SECURITY 7.00
Page 1: ...F Secure Client Security Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Page 41: ...CHAPTER2 41 Click Next to continue...
Page 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Page 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Page 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Page 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Page 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Page 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Page 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Page 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Page 297: ...297 GLOSSARY...