92
Firewall Rules Table
The
Firewall Rules
page contains the
Firewall Rules Table
, that lists the
rules defined for different security levels. You can select the Internet
Shield Security level from the
Internet Shield security level being edited
drop-down menu. When the selected security level is changed, the rules
associated with the new security level are displayed in the table.
When the F-Secure Internet Shield Firewall is in use, the firewall rules are
checked in the order in which they are displayed in the table, from top to
bottom. For the security levels with filtering mode ‘normal’ (see the
Firewall Security Levels
page on
Settings
tab), it is possible to define
domain or host specific rules. When
Allow users to define new rules
is
selected, the end users are also allowed to define new rules for that
security level. The table also displays the location for these rules.
The Firewall Rules table displays the following information for each rule:
Whether the rule is enabled or disabled
The name and comment for the rule
The type of rule (allow/deny)
The related service and direction: <= for an inbound service, =>
for an outbound service and
<=> for a bidirectional service.
The affected remote hosts
Whether alert sending is enabled
Whether the rule is applied only when a dialup link is used.
When
Allow users to define new rules
is selected, the users can create
new rules.
Specify a new location
changes the place of the user defined rules in
the
Firewall Rules Table
.
In addition, application control on the host will automatically create rules
for applications that have been allowed. The rules are placed just before
the first ‘Deny rest’ rule in the rules table, which is the first deny rule with
service ‘All traffic’ and remote host ‘Any’. The rules allow incoming
packets to server applications, and stateful firewall then allows outgoing
Содержание CLIENT SECURITY 7.00
Страница 1: ...F Secure Client Security Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Страница 41: ...CHAPTER2 41 Click Next to continue...
Страница 44: ...44 Step 12 Review the changes that setup is about to make Click Start to start the installation...
Страница 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Страница 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Страница 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Страница 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Страница 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Страница 135: ...CHAPTER4 135 Autoregistration Import Rules Figure 4 6 Import Autoregistered Hosts dialog Import Rules tab...
Страница 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Страница 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Страница 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Страница 297: ...297 GLOSSARY...
Страница 310: ...310 Worm A computer program capable of replication by inserting copies of itself in networked computers...
Страница 311: ...311 Technical Support Overview 312 Web Club 312 Advanced Technical Support 312 F Secure Technical Product Training 313...