Blocking Intrusions
37
Blocking Intrusions
Introduction
Desktop Protector identifies and stops most intrusions according to your preset protection
level, but you may still notice activity that isn't explicitly blocked. This topic explains how
to handle intrusions from a particular address or intrusions that use a particular protocol.
Caution:
Do not block port scans from your own internal network. This may interfere
with normal network management procedures.
Blocking an event
or an intruder
You can block any intruder listed on your events list. When you do, Desktop Protector
creates an IP address entry in your firewall that prevents all traffic from that IP address
from entering your system. To block an intruder or an event:
1. Do one of the following:
■
On the Intruders tab, right-click the name of the intruder.
■
On the Events tab, right-click the name of the event.
2. On the submenu, select the duration of the block.
Note:
A month is defined as 30 days.
3. Click
Yes
.
Blocking an IP
address
To block an IP address:
1. From the Tools menu, select
Advanced Firewall Settings
.
The Advanced Firewall Properties window appears.
2. Click
Add
.
The Add Firewall Entry window appears.
3. Type a name for the IP address filter.
Note:
This should be the name of the system to block, if you know it. For example, if
you are creating a filter to block all port scans from a known intruder, use the
intruder’s computer name for the name of this address filter. For information about
how to learn about intruders, see “Back Tracing” on page 50.
4. Type the IP address or range of addresses for the system to block.
■
Use standard
000.000.000.000
notation.
■
If you are specifying a range of IP addresses, place a dash between them. For
example,
192.168.10.23–192.168.10.32
.
■
To block transmissions from all IP addresses through a specific port, select
All
Addresses.
Note:
You cannot block all transmissions from all IP addresses in this window. To
block all unsolicited inbound traffic, select the “Paranoid” protection level on the
Firewall tab.
5. In the
Mode
area, select
Reject
.
6. In the
Duration of Rule
area, select the length of the block.
7. Click
Add
.
Desktop Protector adds the entry to the list in the Advanced Firewall Settings
window.
Содержание RealSecure
Страница 1: ...TM Desktop Protector User Guide Version 3 5 ...
Страница 28: ...Chapter 2 Using RealSecure Desktop Protector with ICEcap Manager 20 ...
Страница 38: ...Chapter 3 Setting Up RealSecure Desktop Protector 30 ...
Страница 49: ...Ignoring Events 41 For more information see The Prompts Tab on page 83 ...
Страница 66: ...Chapter 4 Configuring RealSecure Desktop Protector 58 ...
Страница 67: ...TM Appendixes ...
Страница 68: ......
Страница 96: ...Appendix B Configuration Tabs 88 ...
Страница 106: ...Appendix C Advanced Firewall Settings 98 ...
Страница 112: ...Appendix D Advanced Application Protection Settings 104 ...
Страница 120: ...Appendix E The Main Menu 112 ...
Страница 124: ...Index 116 ...