Software Firewalls © N. Ganesan, Ph.D.
Module Objectives Explore the features of a software firewall such as Zone Alarm Pro
Introduction
Features Inbound traffic protection Outbound traffic protection Optional protection Optional antivirus monitoring
Types of Protection and Control Firewall Protection Program Control Privacy Protection Identity Protection
Protection Alerts Program alerts Firewall alerts
Program Alert Example In the following example, program alert for the ping command will be demonstrated
Firewall Event Informs intrusion efforts
Zoning for Access Control Internet zone –All computers fall into this category –They are generally unknown computers Trusted zone –Permission is automatically given to access computers in the trusted zone Bad zone –Access to computers in this zone are explicitly denied
Disconnecting from Internet Stop button Internet lock
Additional Information Use the help feature
Overview of ZoneAlarm Pro
Firewall Zone Settings High –Explicit permission must be given for access Medium –Access must be blocked explicitly
1 2 3
Blocked Zone Advanced control is possible for blocked zones
Adding and Removing Networks to and from Zones
Assigning Networks Networks can be assigned to trusted and internet zones based on: –Host/site –IP address –IP range –Subnet
Computers with Access In the previous example, the computers with the following range of IP address will have network access privilege – to The values defined could also be edited
Can be removed as well.
Rule Based Access Control
Purpose Traffic can be controlled based on source address, destination address, protocol and time of the day
Expert Firewall Access control (allow of blocks) can be exercised based on the following parameters: –Source –Destination –Protocol –Time
Auto-Lock Auto lock can be set to be involved when the computer is inactive for a given period of time
Program Access Control
Individual Program Control This is perhaps the most frequently used option Access to the network for a program can be set to the following –Allow –Block X –Ask ?
Program Control Properties Allow –Allows the program to access the network Ask –Ask each time the program tries to access the network Block –Block access without asking In general, one may want to block the program acting as a server Moreover, whenever in doubt, access could be set to “Ask” As seen in the next slide, new program could also be added to the list of programs that need to be controlled with respect to network access
Individual program security.
Antivirus Monitoring
Protection
New attachment types can be added.
Privacy
1 2 3
Customizing cache cleaning.
Cookie Control, Ad Blocking and Mobile Code Control
1 2 3
Cookie control.
Ad blocking.
Mobile code execution control.
Site Access Control
ID Lock
Alerts and Logs
The End