Firewall protection settings - Access tab

 

This tab includes several options for configuring and defining the firewall ’s characteristics, rules and functioning.

 

image\nota_shg.gif Note: This configuration tab will NOT be available if you have not installed Platinum Internet Security’s firewall.

 

image\P7FWConfAccEN_shg.gif

 

Programs with access to the network section

This section allows you define what programs installed on your computer can access the Internet or the local area network -LAN- you are connected to (they have the firewall’s permission to do so).

 

Click on the Configure button and a list of the programs with network access permissions will be displayed. This list has the following columns: Program (the name of the program that can communicate with the exterior through the network), Communication (indicates if communication is allowed, denied, or if the firewall should ask the user).

 

·      Show operating system programs, if this option is checked, the list will also include the programs that belong to the operating system that are also accessing the network for some reason or other.

 

·      Add program. This button allows you to add programs that can access the network to the list. If you click on it, you must indicate the Path (program name and directory –click on the button on the right to make it easier to select the program). You must also indicate the type of permission or the Action that the firewall must apply to the program’s network communication: Allow communication, Deny communication, or Ask (the firewall will ask you when the program tries to access the network). You can only configure the advanced options if you select the option Allow communication.

 

You can also click on the button Advanced options (this button is only activated when the rule corresponding to the program selected in the list is has the action Allow communication associated with it). This button allows you to select the Addresses and communication Ports (access points in a computer or means through which information is transferred –inbound/outbound – from the computer to the outside and vice-versa -via TCP/IP-) that the program can use. This means that you can select the addresses of other computers (IP addresses) to which the program can connect. You can also select the point where the computer can connect to the network and the Internet and transfer information (port). For more details about this, consult the Firewall configuration - Advanced Options for Programs (Addresses and Ports) section in this Help.

 

·      Advanced options. This button is only activated when the rule corresponding to the program selected in the list is has the action Allow communication associated with it. Select a program from the list and click on this button to indicate the Addresses (numbers for accessing other computers – IP addresses) and communication ports (communication channels inbound/outbound – between computers) the program can use. For more details about this option, consult the Firewall configuration - Advanced Options for Programs (Addresses and Ports) section in this Help.

 

·      Remove program. Select one or several programs in the list and click on this button to remove them and prevent them from accessing the network or having access configuration options.

 

·      Regenerate list: when you click on this button a window will be displayed containing a list of common programs that will access the Internet without your confirmation. If you would like Platinum Internet Security to ask for your confirmation when these programs access the Internet, uncheck the box corresponding to the program in question.

 

·      When a rule is applied show it in the report. If you enable this checkbox, every incident involving to a rule for programs that can access the network established in the firewall will be included in the Report.

 

Advanced connection rules

This section allows you to set and implement the firewall functioning rules.

 

Click on the Configure button. This will display a list of rules (those established so far). This list contains the following columns: Rule name (name assigned to defined rules) and Action to be taken (purpose of the rule).

 

·      Add new rule. This button allows you to create and define the characteristics of a new rule to be applied to the firewall. If you click on this button, a screen is displayed with the following tabs: General, Protocols and ports and Addresses. For more details about this option, consult the Firewall protection settings - Firewall protection rule definition (General, Protocols and ports, Addresses) section in this Help.

 

·      Edit Rule. This button allows you to access the properties of the rule selected from the list and define or modify each of its characteristics. For more details about this option, consult the Firewall protection settings - Firewall protection rule definition (General, Protocols and ports, Addresses) section in this Help.

 

·      Delete rule. Select one or several rules from the list and click on this button to remove them and prevent them from being applied.

 

·      When a rule is applied show it in the report. If you enable this checkbox, every incident involving to a rule for programs that can access the network established in the firewall will be included in the Report

 

image\nota_shg.gif Note: this section incorporates a series of default system rules, that will improve your computer security.