Sunbelt Personal Firewall User Guide
Total Page:16
File Type:pdf, Size:1020Kb
Use of this software is subject to the End User License Agreement found in this User Guide (the License Agreement). By installing the software, you agree to accept the terms of the License Agreement. Copyright (c) 2008 Sunbelt Software. All rights reserved. All products mentioned are trademarks or registered trademarks of their respective companies. Information in this document is subject to change without notice. No part of this publication may be reproduced, photocopied, stored in a retrieval system, transmitted, or translated into any language without the prior written permission of Sunbelt Software, Inc. Sunbelt Personal Firewall User Guide Contents Introduction .......................................................................................... 1-1 Before You Start .............................................................................................................1-2 Overview .........................................................................................................................1-2 Components ...................................................................................................................1-3 Functions and Features ..................................................................................................1-4 System Requirements ....................................................................................................1-4 Conflicting Software ........................................................................................................1-5 Styles and References ...................................................................................................1-5 Installation ............................................................................................ 2-1 Before You Install ...........................................................................................................2-2 Installation ......................................................................................................................2-2 Initial Settings .................................................................................................................2-8 Upgrading to a New Version ...........................................................................................2-8 Uninstalling the Personal Firewall ...................................................................................2-9 Updating the current version ........................................................................................2-10 Purchasing and Product Registration ................................................ 3-1 Free Version vs. Full Version .........................................................................................3-2 Purchasing Sunbelt Personal Firewall ............................................................................3-2 Product Registration .......................................................................................................3-3 Firewall Components and Basic Control Features ........................... 4-1 Components ...................................................................................................................4-2 System Tray Icons ..........................................................................................................4-2 Firewall Behavior and User Interaction .............................................. 5-1 Firewall Behavior ............................................................................................................5-2 Connection Alert .............................................................................................................5-3 Application Alert ..............................................................................................................5-6 Host Intrusion Alerts .......................................................................................................5-8 Alerts For Connections with Rules ................................................................................5-10 Basic Firewall Configuration ............................................................... 6-1 The Interface ..................................................................................................................6-2 Working with Network Connections ................................................................................6-5 Working with Statistics ....................................................................................................6-7 Setting Firewall Preferences ...........................................................................................6-9 Network Security .................................................................................. 7-1 What is Network Security? .............................................................................................7-2 Rules ..............................................................................................................................7-2 How are Rules Applied? .................................................................................................7-2 Application Rules ............................................................................................................7-3 Packet Filter Rules .........................................................................................................7-7 Predefined Rules ..........................................................................................................7-20 Trusted Area .................................................................................................................7-22 Advanced settings ........................................................................................................7-23 Boot time Protection .....................................................................................................7-24 Detecting New Network Interfaces ...............................................................................7-25 Checking Dialed Telephone Numbers ..........................................................................7-26 Internal Firewall Rules ......................................................................... 8-1 Internal Network Traffic Rules ........................................................................................8-2 System Security Rules ...................................................................................................8-4 i Sunbelt Personal Firewall User Guide AVG Component Rules ..................................................................................................8-6 Intrusion Detection ............................................................................... 9-1 Intrusions ........................................................................................................................9-2 Network Intrusion Prevention System (NIPS) .................................................................9-3 Host Intrusion and Prevention System (HIPS) ................................................................9-5 Application Behavior Blocking ........................................................................................9-9 Web Content Filtering ........................................................................ 10-1 Ad Blocking, Privacy and Site Exception Parameters ..................................................10-2 Site Exceptions .............................................................................................................10-5 Logs & Alerts ...................................................................................... 11-1 Viewing Logs and Alerts ...............................................................................................11-2 Context Menu ...............................................................................................................11-3 Log Options ..................................................................................................................11-4 Network Log .................................................................................................................11-5 NIPS Log ......................................................................................................................11-6 HIPS Log ......................................................................................................................11-7 Behavior Log ................................................................................................................11-8 Web Log .......................................................................................................................11-9 Debug, Error, Warning Logs .......................................................................................11-10 Open-source libraries ........................................................................ 12-1 Glossary .............................................................................................. 13-1 ii Sunbelt Personal Firewall User Guide Introduction Welcome to the Sunbelt Personal Firewall User Guide. This guide provides in-depth information and procedures that will not only help you to understand Sunbelt Personal Firewall, but also walk you through the steps needed to protect your computer or computer network. Section Page Overview 1-2 Components 1-3 Functions and Features 1-4 System Requirements 1-4 Conflicting Software 1-5 Styles and References 1-5 1-1 Sunbelt Personal Firewall User Guide Before You Anyone, from novices to advanced