Select the Remember action option and select Allow or Deny to create a permanent rule for the
communication. If a similar communication occurs in the future, it is automatically allowed or blocked. However,
such rules are very general, since they would always allow all incoming and outgoing communications (for all
target ports, all IP addresses...) for the given process. To specify more detailed parameters for a specified rule,
click Show advanced options. The figure below shows an example of limiting the HTTP communication (port 80)
established by the Internet Explorer web browser.
In addition to port 80 (HTTP), you may wish to allow communication on port 443 (HTTPS). There are three ways
to accomplish this:
o
Wait until the web browser establishes communication on port 443 (e.g., when you log in to your online
banking account). You will be prompted to create an additional rule for the same application (Internet Explorer
and the process iexplore.exe).
o
Click Custom rule to open a dialog window and specify detailed settings for the rule. You can add specific
ports, IP addresses, IP address ranges, etc. In this case, all communication for the given application would be
specified by only one rule.
1 If you want an application to behave differently within and outside the Trusted zone, or if you have different rules
exclusively for incoming or outgoing communication (for the same application) more than one rule would be
required.
1
5
Need help?
Do you have a question about the PERSONAL FIREWALL and is the answer not in the manual?
Questions and answers