background image

8

NOTE: The 

New network detected

 window is not displayed if the computer’s IP address belongs to a subnet 

which doesn’t contain any other IP addresses (mask 255.255.255.255), or is a public IP address. In both cases, the 
subnet is treated as not trusted.

Zones can be used to create rules on a per network basis. The examples below show two separate networking 
scenarios and a solution for each: 

Task 1:    

FTP communication should be enabled in the local network, and disabled outside the LAN, except for the public IP 
addresses 217.67.22.98 and 72.32.7.91.

Solution 1:  

Create a new zone, add the IP addresses 217.67.22.98 and 72.32.7.91 and name it “Internet  FTP servers“. Create a new 
rule allowing outgoing FTP communication. On the 

Remote

 tab, add the zones  “Trusted zone” and “Internet FTP 

servers “.

Task 2:

Client computers need to use DNS services within the local network. These services mustn’t be accessible from 
outside the network (i.e., from the Internet), because the server is also an Internet gateway for the network.

Solution 2:

Create a new rule named “DNS for client computers”, using the following parameters:  
 

General 

tab - Direction: 

IN

, Action: 

ALLOW

, Protocol: 

UDP

.  

Local

 tab - Local port: 53 (

DNS

).  

Remote

 tab - Zone: 

Trusted zone

.

2..3  Strict rules & security levels 

The administrator can select one of the following scenarios for deployment of the ESET Smart Security Personal 

Содержание PERSONAL FIREWALL

Страница 1: ...ESET Personal Firewall we protect your digital worlds User Guide...

Страница 2: ...Personal Firewall Copyright 2008 by ESET spol s r o ESET Personal Firewall was developed by ESET spol s r o For more information visit www eset com All rights reserved No part of this documentation m...

Страница 3: ...re are several reasons A Personal firewall can eliminate attacks from within the local network e g an infected guest notebook connecting to the corporate network A Personal firewall allows the adminis...

Страница 4: ...This mode is based on user defined rules as well as a basic set of predefined rules If a rule already exists to allow or deny a specific type of communication that rule is automatically applied For c...

Страница 5: ...may wish to allow communication on port 443 HTTPS There are three ways to accomplish this o Wait until the web browser establishes communication on port 443 e g when you log in to your online banking...

Страница 6: ...ve been defined the connection is denied and no dialog window is displayed This is the main difference between Interactive and Policy based mode Policy based mode is well suited to large corporate net...

Страница 7: ...rewall will treat that network as not trusted Networks marked as Not trusted The opposite of the Trusted zone It should list all IP addresses address ranges and subnets that are automatically treated...

Страница 8: ...add the IP addresses 217 67 22 98 and 72 32 7 91 and name it Internet FTP servers Create a new rule allowing outgoing FTP communication On the Remote tab add the zones Trusted zone and Internet FTP s...

Страница 9: ...ication is enabled only for Outlook Express and HTTP traffic only for Mozilla Firefox 2 4 Rule configuration strategy in large networks If you wish to set the most strict level of network access for c...

Страница 10: ...program settings based on an existing configuration In both cases the Zone and rule setup dialog windows are similar to each other Items with grey background mark rules defined by ESET In certain cas...

Страница 11: ...e name of the application process to which the rule applies Remote port target communication port or group of ports Remote address target IP address or IP address range or subnet NOTE The rule order i...

Страница 12: ...3 IMAP IP addresses of your email servers remote address can be filled in if you want very strict protection Web browsing Out TCP Web browser process 80 HTTP 443 HTTPS or proxy server port FTP client...

Страница 13: ...ication Remote port Remote address svchost exe ven Out TCP svchost exe 443 update microsoft com download microsoftupdates com windowsupdate microsoft com 3 1 Detection of modified applications The App...

Страница 14: ...and downloads PDF documents from the Internet Thus a specific rule exclusion would need to be defined to allow this activity 3 2 Logging network activity Information about processed or blocked activi...

Страница 15: ...firewall can be viewed by clicking Protection status Personal firewall from the main program window You can right click to open a context menu showing additional options such as Temporarily deny comm...

Страница 16: ...an existing user defined rule is renamed a duplicate rule is created after the configuration is applied If you want to use an exported configuration but want to change Personal firewall settings only...

Страница 17: ...ss of the filtering mode This will prevent users from seeing dialog windows asking them to add the current subnet to the Trusted or Not trusted zone ESET Smart Security does not contain any predefined...

Отзывы: