F-SECURE CLIENT SECURITY 8.00 Administrator's Manual page 90

Hide thumbs Also See for CLIENT SECURITY 8.00:
Table of Contents

Advertisement

90
Firewall Rules Table
The Firewall Rules page contains the Firewall Rules Table, that lists the
rules defined for different security levels. You can select the Internet
Shield Security level from the Internet Shield security level being edited
drop-down menu. When the selected security level is changed, the rules
associated with the new security level are displayed in the table.
When the F-Secure Internet Shield Firewall is in use, the firewall rules are
checked in the order in which they are displayed in the table, from top to
bottom. For the security levels with filtering mode 'normal' (see the
Firewall Security Levels page on Settings tab), it is possible to define
domain or host specific rules. When Allow users to define new rules is
selected, the end users are also allowed to define new rules for that
security level. The table also displays the location for these rules.
The Firewall Rules table displays the following information for each rule:
Whether the rule is enabled or disabled
The name and comment for the rule
The type of rule (allow/deny)
The related service and direction: <= for an inbound service, =>
for an outbound service and
<=> for a bidirectional service.
The affected remote hosts
Whether alert sending is enabled
Whether the rule is applied only when a dialup link is used.
When Allow users to define new rules is selected, the users can create
new rules.
To move where the users new rule are in the table for predefined security
levels click
Specify a new
Move Down buttons to move where the users rules are in the table.
In addition, application control on the host will automatically create rules
for applications that have been allowed. The rules are placed just before
the first 'Deny rest' rule in the rules table, which is the first deny rule with
service 'All traffic' and remote host 'Any'. The rules allow incoming
packets to server applications, and stateful firewall then allows outgoing
location. You can now use the Move Up and

Advertisement

Table of Contents
loading

This manual is also suitable for:

Client security

Table of Contents