1. Create a new service.
a) Select the
Network Services
b) Define a unique name for the service in the
c) Enter a descriptive comment in the
services.
d) Select a protocol number for the service from the
If your service does not use ICMP, TCP or UDP protocol, select Numeric and type the
protocol number in the field reserved for it.
e) If your service uses the TCP or UDP protocol, define
f) If your service uses TCP or UDP protocols, define
g) Click
Add as a new service
h) Click Save.
The new service is saved to the service list.
2. Create a new rule for the service.
a) Select
Firewall Rules
the service you have defined.
b) Select the profile where you want to add a new rule and click
new rule.
c) Select
Accept
or
service.
d) Enter details about target addresses to the
the subnet in bit net mask format.
For example: 192.168.88.0/29
You can use the following aliases as the target address:
•
[myNetwork] - The local-area network with the same subnet on all interfaces.
•
[myDNS] - All configured DNS servers.
e) Enter a descriptive comment in the
f) Select the new service you have created in the
rule applies.
•
in = all incoming traffic that comes to your computer from the Internet.
•
out = all outgoing traffic that originates from your computer.
g) Choose network interfaces to which the rule applies. Type network interfaces you want
the rule to apply to the
the
Flag
field empty.
For example, [if:eth0], [if:eth3].
in the
Advanced mode
Description
to add the service to the Network services list.
in the
Advanced mode
Deny
as a rule
Type
to choose whether the rule allows or denies the
Remote host
Description
Flag
field. The rule is applied to all network interfaces if you leave
F-Secure Linux Security | Using the Product | 35
menu.
Service Name
field.
field to distinguish this service from other
Protocol
drop-down list.
Initiator Ports
the service covers.
Responder Ports
the service covers.
menu to create a firewall rule that uses
Add new rule
field. Enter the IP address and
field to distinguish this rule.
Service
field and the direction when the
to create a
Need help?
Do you have a question about the LINUX SECURITY and is the answer not in the manual?