Page tree
Skip to end of metadata
Go to start of metadata

Using the Rule wizard

The rule wizard allows you to define specific additional rules for the relevant rule set, or to modify existing rules. We recommend that users unfamiliar with firewall technology use the rule wizard rather than the advanced editing mode.

You can use the rule wizard to change one or more rules in the selected rule set. Thus you always create a rule within a rule set that contains various rules.

Depending on which rule set you have specified for the relevant network, one rule set (e.g. for untrustworthy networks) may block an application while another (e.g. for trustworthy networks) could grant it full network access. This means you can use a strategic combination of rules to restrict a browser in such a way that, for example, it can access websites available within your home network but cannot access content from the data transmission network.

The following basic rules are available in the rule wizard:

  • Allow or block applications: This allows you to select a specific application (program) on your hard disk and explicitly permit or deny it access to the network governed by the rule set. Simply use the wizard to select the required program (program path) then, under Direction, indicate whether the program is to be blocked for inbound connections, outbound connections or both inbound and outbound connections. This enables you, for example, to prevent your MP3 player software forwarding data about your listening habits (outbound connections) or to ensure that program updates are not downloaded automatically (inbound connections).
  • Allow or block network services: A Port is a specific address area that automatically forwards data transferred over a network to a specified protocol and then on to specified software. For example, standard websites are transferred via port 80, while email is sent via port 25 and received via port 110, etc. Without a firewall, all ports on your computer normally remain open, although the majority of users do not need most of these. Blocking one or more of these ports is a quick way of eliminating vulnerabilities that could be used for attacks by hackers. The wizard provides the option of blocking ports completely or for a particular application only (e.g. your MP3 player software).
  • File/printer sharing: If you permit access, you have the option of using shared folders and printers on the network. At the same time other computers and users on the network can access your shared data (where set up for this).
  • Allow or block domain services: A domain is a type of classification directory for computers on a network that allows the computers linked to the network to be managed centrally. Enabling for domain services in untrustworthy networks should generally be denied.
  • Shared use of the Internet connection: If your system connects directly to the Internet, you can specify whether all computers on the network should have access to the Internet via a computer connected to the Internet or not. Such Internet connection sharing can usually be enabled for a home network.
  • Allow or block VPN services: VPN is an abbreviation for Virtual Private Network and refers to the option of exclusively linking computers to one another, thus setting up a sort of direct connection between them. To enable VPN services to function, they must be approved by the firewall.
  • Advanced Rule Set Editor (expert mode): This allows you to move from the rule wizard to the advanced editing mode. For further information on the advanced editing mode, see the section below entitled Using the advanced editing mode.

Using the advanced editing mode

The advanced editing mode allows you to set highly specific rules for the relevant network, although you will need a certain level of knowledge of network security for this. You can of course create all the rules here that can be created using the rule wizard, but advanced settings can also be made.

The following configuration options are available here:

  • Name: This allows you to change the name of the current rule set if required. The rule set will then be displayed under this name in the list within the Rule setsarea and can be combined with networks identified by the firewall there.
  • Stealth mode: Stealth mode (meaning: hidden, secret) is used for not answering requests to the computer that verify the relevant port's accessibility. This makes it difficult for hackers to obtain system information in this manner.
  • Action if no rule applies: Here you can specify whether access to the network is generally allowed, denied or regulated on request. Any special rules for individual programs defined by the firewall's learning function are applied.
  • Adaptive mode: The adaptive mode supports applications that use feedback channel technology (e.g. FTP and numerous online games). These applications connect to a remote computer and negotiate a feedback channel with it, which the remote computer then uses to reverse connect to your application. If the adaptive mode is enabled, the firewall detects this feedback channel and permits it without querying it separately.

Rules


The list of rules contains all the rules that are defined for this rule set. This means, for example, that selected programs can be authorized for numerous network accesses even if the network is classified as untrustworthy. The rules applicable here may have been created in various ways:

Of course, each rule set has its own list of rules.

Since the firewall rules are in part switched hierarchically, it is sometimes important to note the rank of each rule. For example, a port that you have granted access to may be blocked again because a certain protocol is denied access. To modify the rank of a rule in the sequence, highlight it with the mouse and use the arrow buttons under Rank to move it up or down the list.

If you create a new rule using the advanced editing mode, or modify an existing rule using the Edit dialog, the Edit rule dialog appears with the following setting options:

  • Name: For default and automatically generated rules, this displays the program name to which the relevant rule applies.
  • Rule enabled: You can disable a rule without actually deleting it by deactivating the checkbox.
  • Note: This indicates how the rule was created. Next to rules preset for the rule set it says "Default rule"; next to rules that arise from the dialog for the Firewall alarm it says "generated in response to alert"; and for rules that you generate yourself via the advanced editing mode you can insert your own comment.
  • Direction: This setting specifies if the selected rule applies to inbound or outbound connections, or to both inbound and outbound connections.
  • Access: This specifies if access is to be permitted or denied for the relevant program within this rule set.
  • Protocol: This allows you to select the connection protocols you want to permit or deny access. You can generally block or enable protocols or link usage of a protocol to the use of one or more specific applications (Match to applications). Similarly, you can use the Match to Internet service button to specify the ports that you do or do not wish to use.
  • Time window: You can also set up time-related access to network resources to ensure, for example, that the network can only be accessed during your normal working day and is blocked at all other times.
  • IP range: It is advisable to regulate network use by restricting the IP address range, especially for networks with fixed IP addresses. A clearly defined IP address range significantly reduces the risk of attack from a hacker.

  • No labels