7
2..2 Zones
In addition to rules, zones also play an important role. A zone can be defined by any of the following:
• individual IP address (for example 192.168.1.1)
• IP Address range (from 192.168.1.1 to 192.168.1.5)
• subnet (192.168.1.0 / mask 255.255.255.0, which means addresses from 192.168.1.1 to 192.168.1.255)
A zone can contain a single IP address or several IP addresses defined by a range or subnet. You can also specify
groups of IP addresses, which can be useful when creating rules. Some zones are predefined and can’t be modified
or removed. These zones are listed below:
•
Trusted zone
The Trusted zone consists of IP addresses, address ranges or subnets which are recognized by the Personal
firewall as safe. Adding IP addresses or ranges to this category will change the behavior of ESET Smart Security
when accessing shared folders and printers. If any computer is assigned a different IP address not belonging to
the Trusted zone, the Personal firewall will treat that network as not trusted.
•
Networks marked as Not trusted
The opposite of the Trusted zone. It should list all IP addresses, address ranges and subnets that are
automatically treated as not trusted. In such a network, shared folders and printers are by default disabled, and
the computer will not be visible to other computers in the network.
• DNS servers
Specifies DNS servers which client is allowed to use.
•
Local addresses
Specifies IP addresses by which the client is represented (usually contains the IP address 127.0.0.1 and IP addresses
assigned to all network adapters).
Zones can also be used for specifying strict rules in the Personal firewall.
The behavior of the Personal firewall in a new network is determined by the option
Do not display dialog with
Trusted zone settings when changes in the network adapter settings are detected
(
e.g., change of IP address
)
,
located in
Advanced setup...... > Personal firewall > Rules and zones
. If this option is enabled and the computer
receives communication by an IP address not specified by the Trusted zone, then this subnet is automatically
treated as not trusted (see
Strict Protection
, below).