Firewall Rules
Firewall rules
define what kind of Internet traffic is allowed or blocked.
Each
security level
has a predefined set of
firewall rules
, which you cannot change. The selected
security level affects the priority which your own rules receive in relation to the predefined rules.
A
firewall rule
can be applied to traffic from the Internet to your computer (inbound), or from
your computer to the Internet (outbound). A rule can also be applied to both directions at the
same time.
A
firewall rule
consists of
firewall services
, which specify the type of traffic and the
ports
that
this type of traffic uses. For example, a rule called
Web browsing
has a service called
HTTP
,
which uses the TCP and
port
number 80.
Firewall rules
also define whether firewall
alert
pop-ups are shown to you about the traffic that
matches the
firewall rules
.
When do you have to add a new firewall rule?
You may have to add a new firewall rule if you want to allow traffic that is
blocked or if you want to block specific Internet traffic.
By adding all the services that the program or device needs to the same rule,
you can easily:
•
turn the rule on or off later, or
•
remove the rule if you uninstall the program or remove the device.
You also have to add a new rule if you have denied certain type of traffic but
you want to allow it to certain IP addresses. In this case, you already have a
general "deny"
firewall rule
. To allow the traffic to certain IP addresses, you
have to create a more specific "allow" rule.
Firewall Services
Firewall services
define the type of traffic to which a
firewall rule
applies.
Network services
, such as web browsing,
file sharing
or
remote console access
, are examples
of these firewall services.
A service uses a certain
protocol
and
port
. For example, the HTTP service uses the TCP
protocol
and the
port
number 80.
A firewall service uses two kinds of ports:
•
Initiator port
: the
port
on the computer that starts the connection.
F-Secure Linux Security | Using the Product |
53
Содержание LINUX SECURITY
Страница 1: ...F Secure Linux Security...
Страница 2: ......
Страница 14: ......
Страница 28: ......
Страница 32: ......
Страница 84: ...Note Press ctrl C to cancel your changes 84 F Secure Linux Security Command Line Tools...
Страница 120: ...G 1 G Man Pages fsav 2 fsavd 32 dbupdate 48 fsfwc 52 fsic 55 fschooser 62 fsims 64 fssetlanguage 67...
Страница 150: ...CHAPTERG G 31 For more information see F Secure home page...
Страница 166: ...CHAPTERG G 47 dbupdate 8 fsav 1 For more information see F Secure home page...
Страница 170: ...CHAPTERG G 51 fsav 1 and fsavd 8 For more information see F Secure home page...
Страница 188: ...H 69 H Config Files fsaua_config 70 fssp conf 75...
Страница 219: ...H 100 expiredText EVALUATION PERIOD EXPIRED nTo purchase license please check http www F Secure com purchase n...