ESET SMART SECURITY Guía de usuario Pagina 23

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 46
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 22
23
Remote: This tab contains information about the remote port
(port range). It also allows you to define a list of remote IP
addresses or zones for a given rule.
Local: Displays information about the local side of the connection,
including the number of the local port or port range and the name
of the communicating application.
A good example of adding a new rule is allowing your Internet browser
to access the network. The following must be provided in this case:
On the General tab, enable outgoing communication via the TCP
and UDP protocol
Add the process representing your browser application (for
Internet Explorer it is iexplore.exe) on the Local tab
On the Remote tab, enable port number 80 only if you wish to
allow standard Internet browsing activities.
4.2.5.2 Editing rules
To modify an existing rule, click the Edit button. All parameters (see
section 4.2.5.1, “Creating new rules” for descriptions) can be modified.
Modification is required each time any of the monitored parameters
are changed. In this case, the rule cannot fulfill the conditions and the
specified action cannot be applied. In the end, the given connection
may be refused, which can result in problems with operation of the
application in question. An example is a change of network address or
port number for the remote side.
4.2.6 Configuring zones
In the Zone setup window you can specify the zone name,
description, network address list and zone authentication (see section
4.2.6.1.1, “Zone authentication – Client configuration”).
A zone represents a collection of network addresses which create one
logical group. Each address in a given group is assigned similar rules
defined centrally for the whole group. One example of such a group
is the Trusted zone. The Trusted zone represents a group of network
addresses which are fully trusted and not blocked by the Personal
firewall in any way.
These zones can be configured using the Zones tab in the Zone and
rule setup window, by clicking the New button. Enter a Name for the
zone and a Description, and add a remote IP address by clicking the
Add IPv4 address button.
4.2.6.1 Network authentication
The Trusted zone is identified by the local IP address of the network
adapter. Mobile computers often enter networks with IP addresses
that are similar to the trusted network. If the Trusted zone settings
are not manually switched to Strict protection, the Personal firewall
will continue to use the Allow sharing mode.
To prevent this type of situation, Zone authentication searches for a
specific server in the network and uses asymmetric encryption (RSA)
to authenticate the server. The authentication process is repeated for
each network your computer connects to.
4.2.6.1.1 Zone authentication ‑ Client configuration
In the Zone and rule setup window, click the Zones tab and create
a new zone using the name of the zone authenticated by the server.
Then click Add IPv4 address and select the Subnet option to add a
subnet mask that contains the authentication server.
Click the Zone authentication tab and select the IP addresses/
subnets in the zone will become valid after a successful
authentication of the server in the network option. With this
option selected, the zone will become invalid if authentication is
unsuccessful. To select a Personal firewall profile to be activated after
a successful zone authentication, click the Profiles... button. If you
select the Add addresses/subnets of the zone to the Trusted Zone
option, the addresses/subnets of the zone will be added to the Trusted
zone after an authentication is successful (recommended).
There are three authentication types available:
1) Using ESET authentication server
Click Setup... and specify a server name, server listening port and
a public key that corresponds to the private server key (see section
4.2.6.1.2, “Zone authentication – Server configuration”). The server
name can be entered in the form of an IP address, DNS or NetBios
name. The server name can be followed by a path specifying the
location of the key on the server (e.g., server_name_/directory1/
directory2/authentication). Enter multiple servers, separated by
semicolons, to serve as alternate servers if the first one is unavailable.
The public key can be a file of one of the following types:
PEM encrypted public key (.pem) ‑ This key can be generated
using the ESET Authentication Server (see section 4.2.6.1.2, “Zone
Vista de pagina 22
1 2 ... 18 19 20 21 22 23 24 25 26 27 28 ... 45 46

Comentarios a estos manuales

Sin comentarios