
49
4.2.4 Configuring zones
In the Zone setup window you can specify the zone name, description, network address list and zone authentication
(see Zone authentication – Client configuration).
A zone represents a collection of network addresses which create one logical group. Each address in a given group is
assigned similar rules defined centrally for the whole group. One example of such a group is the Trusted zone. The
Trusted zone represents a group of network addresses which are fully trusted and not blocked by the Personal firewall
in any way.
These zones can be configured using the Zones tab in the Zone and rule setup window, by clicking the Edit button.
Enter a Name for the zone, a Description, and add a remote IP address by clicking the Add IPv4/IPv6 address button.
4.2.4.1 Network authentication
For mobile computers, it is recommended that you verify the network credibility of the network that you are
connecting to. The Trusted zone is identified by the local IP address of the network adapter. Mobile computers often
enter networks with IP addresses that are similar to the trusted network. If the Trusted zone settings are not manually
switched to Strict protection, the Personal firewall will continue to use the Allow sharing mode.
To prevent this type of situation, we recommended using zone authentication.
4.2.4.1.1 Zone authentication - Client configuration
In the Zone and rule setup window, click the Zones tab and create a new zone using the name of the zone
authenticated by the server. Then click Add IPv4 address and select the Subnet option to add a subnet mask that
contains the authentication server.
Click the Zone authentication tab. Each zone can be set to authenticate to the server. The zone (its IP address and
subnet) will be valid after it is successfully authenticated – e.g. actions such as switching to a firewall profile and adding
an address/subnet of the zone to the Trusted Zone will be performed only after successful authentication.
Select the IP addresses/subnets in the zone will become valid... option to make a zone that will become invalid if
authentication is unsuccessful. To select a Personal firewall profile to be activated after a successful zone authentication,
click the Profiles... button.
If you select the Add addresses/subnets of the zone to the Trusted Zone option, the addresses/subnets of the zone
will be added to the Trusted zone after successful authentication (recommended). If the authentication is unsuccessful,
the addresses will not be added to the Trusted zone. If the Switch to profile with the same name automatically (a
new profile will be created) option is active, a new profile will be created after successful authentication. Click the
Profiles... button to open the Firewall profiles window.
Komentarze do niniejszej Instrukcji