User Guide for Zone Labs Security Software

User Guide for Zone Labs Security Software

User Guide for Zone Labs security software version 6.5 Smarter Security TM © 2006 Zone Labs, LLC. All rights reserved. © 2006 Check Point Software Technologies Ltd. All rights reserved. Check Point, Application Intelligence, Check Point Express, the Check Point logo, AlertAdvisor, ClusterXL, Cooperative Enforcement, ConnectControl, Connectra, CoSa, Cooperative Security Alliance, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FloodGate-1, Hacker ID, IMsecure, INSPECT, INSPECT XL, Integrity, InterSpect, IQ Engine, Open Security Extension, OPSEC, Policy Lifecycle Management, Provider-1, Safe@Home, Safe@Office, SecureClient, SecureKnowledge, SecurePlatform, SecurRemote, SecurServer, SecureUpdate, SecureXL, SiteManager-1, SmartCenter, SmartCenter Pro, Smarter Security, SmartDashboard, SmartDefense, SmartLSM, SmartMap, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartViewTracker, SofaWare, SSL Network Extender, TrueVector, UAM, User-to-Address Mapping, UserAuthority, VPN-1, VPN-1 Accelerator Card, VPN-1 Edge, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 VSX, Web Intelligence, ZoneAlarm, Zone Alarm Pro, Zone Labs, and the Zone Labs logo, are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726 and 6,496,935 and may be protected by other U.S. Patents, foreign patents, or pending applications. Zone Labs, LLC. A Checkpoint Company 475 Brannan, Suite 300 San Francisco, CA 94107 ZLD -0422-0650-2006-0601 Contents Tables . ix Figures . xi Preface . xiii About Zone Labs security software . xiv About this guide . xv Conventions . xv Zone Labs User Forum . xv Chapter 1 Installation and setup . 1 System requirements and supported software . 2 Hardware requirements and supported operating systems . 2 Supported protocols for e-mail protection . 2 Supported browser software . 2 Supported IM clients . 3 Installing Zone Labs security software . 4 Installing ZoneAlarm . 4 Installing Zone Labs security software. 4 Upgrading from a previous version . 6 Upgrading and the Windows XP SP2 Windows Firewall . 6 Upgrading and IMsecure myVault settings . 6 Upgrading and MailFrontier settings . 6 Configuring basic options. 7 Configuring program access permissions . 7 Joining the DefenseNet community . 7 Uninstalling Zone Labs security software . 9 Chapter 2 Zone Labs security software basics . 11 Tour of the Zone Labs security software Control Center. 12 Getting around the Control Center . 12 Using the dashboard . 13 System Tray icons . 15 Shortcut menu . 15 Using the Status tab . 16 Understanding Zones . 18 Zones manage firewall security . 18 Zones provide program control. 19 Responding to alerts. 20 User Guide for Zone Labs security software i Contents New Program alerts . 20 New Network and VPN alerts. 21 Setting product preferences. 22 Setting update options . 22 Setting your password . 22 Backing up and restoring security settings . 23 Setting general product preferences . 23 Setting contact preferences . 24 Setting product display and proxy server options. 25 Creating an online fraud protection profile . 26 Licensing, registration, and support . 27 Updating your product license. 27 Registering Zone Labs security software . 27 Accessing technical support . 28 Chapter 3 Networking with Zone Labs security software. 29 Configuring a new network connection . 30 Using the Network Configuration Wizard . 30 Disabling the Network Configuration Wizard. 31 Using the Wireless Network Configuration Wizard . 31 Disabling the Wireless Network Configuration Wizard. 31 Integrating with network services . 33 Enabling file and printer sharing . 33 Connecting to network mail servers . 33 Enabling Internet Connection Sharing. 34 Configuring your VPN connection . 35 Supported VPN protocols . 35 Configuring your VPN connection automatically . 35 Configuring your VPN connection manually . 36 Adding a VPN gateway and other resources to the Trusted Zone. 37 Removing a VPN gateway from a blocked range or subnet. 37 Allowing VPN protocols . 37 Granting access permission to VPN software . 38 Chapter 4 Firewall protection. 39 Understanding Firewall protection. 40 Choosing security levels . 41 Setting the security level for a Zone . 41 Setting advanced security options . 42 Setting gateway security options . 42 Setting ICS (Internet Connection Sharing) options . 42 Setting general security options . 43 Setting network security options . 44 Setting wireless network security options. 44 Managing traffic sources . 46 Viewing the traffic source list . 46 Modifying traffic sources . 46 Adding to the Trusted Zone. 47 Adding to the Blocked Zone . 48 User Guide for Zone Labs security software ii Contents Viewing logged Firewall events. 48 Blocking and unblocking ports . 50 Default port permission settings . ..

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    296 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us