Escan/english/firewall: Difference between revisions

From eScan Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
(8 intermediate revisions by the same user not shown)
Line 1: Line 1:
== '''Firewall''' ==
'''Firewall'''


'''Description''' :- Firewall monitors all incoming and outgoing network activities in your system and also protects from all network based attacks.
=='''Description'''==
 
Firewall monitors all incoming and outgoing network activities in your system and also protects from all network based attacks.


'''Firewall''' is a comprehensive feature that is designed to prevent unauthorized access to a computer or network that is connected to the Internet. It enforces a boundary between two or more networks by implementing default or user-defined access-control policies (rules) between two or more networks.  
'''Firewall''' is a comprehensive feature that is designed to prevent unauthorized access to a computer or network that is connected to the Internet. It enforces a boundary between two or more networks by implementing default or user-defined access-control policies (rules) between two or more networks.  
Line 11: Line 13:
A user is vulnerable to hacker attack when their system connects to a public network
A user is vulnerable to hacker attack when their system connects to a public network
   
   
- When you log in to chat, you connect to Internet Relay Chat (IRC) servers on the Internet and join others in the numerous ‘channels’ on the IRC network.
:- When you log in to chat, you connect to Internet Relay Chat (IRC) servers on the Internet and join others in the numerous ‘channels’ on the IRC network.
 
:- When you use Telnet to connect to a server on the Internet and execute commands ‘on’ the server from your computer.
 
:- When you use FTP to transfer files from a remote server to your computer. FTP is the File Transfer Protocol for exchanging files over the Internet, and works in the same way that HTTP and SMTP do in transferring Web pages from servers to user’s browser and transferring e-mail across the WWW respectively.
 
:- When you use NetBIOS (Network Basic Input/Output System) to communicate with another user on the LAN; the LAN could in turn be connected to the Internet. NetBIOS insulates the applications that users use to communicate with one another, from understanding the underlying network details.
 
:- When you are a part of a Virtual Private Networks (VPN). These private network connections communicate ‘securely’ over a public network, such as the Internet.
 
:- When you browse the Web.


- When you use Telnet to connect to a server on the Internet and execute commands ‘on’ the server from your computer.
:- When you send/receive e-mail.


- When you use FTP to transfer files from a remote server to your computer. FTP is the File Transfer Protocol for exchanging files over the Internet, and works in the same way that HTTP and SMTP do in transferring Web pages from servers to user’s browser and transferring e-mail across the WWW respectively.


- When you use NetBIOS (Network Basic Input/Output System) to communicate with another user on the LAN; the LAN could in turn be connected to the Internet. NetBIOS insulates the applications that users use to communicate with one another, from understanding the underlying network details.
=='''Status in main Protection Center Window'''==


- When you are a part of a Virtual Private Networks (VPN). These private network connections communicate ‘securely’ over a public network, such as the Internet.
The <B><font color="Green"> '''green''' </font></B> colored Tick <U><B><font color="Green">()</font></B></U> mark indicates the Firewall is active and running.


- When you browse the Web.
The <B><font color="Red"> '''red''' </font></B> colored Cross mark <U><B><font color="Red">(X)</font></B></U> indicates the Firewall is inactive and stopped.


- When you send/receive e-mail.


=='''Configuration section'''==


'''Status displayed in the main Protection Window''':-
:''Status: ''  


The green colored Tick mark indicates the Firewall is active and running.
:* Firewall Status – This will display whether the Firewall is Running or Disabled.


The red colored Cross mark indicates the Firewall is inactive and stopped.
:* Action – This will display the Firewall Mode.


:'''Buttons'''


'''1. Configuration section''' -
:''Allow All'' – Clicking on this button will disable the eScan Firewall i.e. all the incoming and outgoing network traffic will not be monitored / filtered.  


''Status: ''  
:''Limited Filter'' – Clicking on this button will enable eScan Firewall in limited mode which will monitor all incoming traffic only and will be allowed / blocked as per the conditions or rules defined in the Firewall.


* Firewall Status This will display whether the Firewall is Running or Disabled.
:''Interactive'' - Clicking on this button will enable eScan Firewall to monitor all the incoming and outgoing network traffic and will be allowed / blocked as per the conditions or rules defined in the Firewall.
:'''Block All button''' Clicking on this button will enable eScan Firewall to block all the incoming and outgoing network traffic.


* Action This will display the Firewall Mode.
:''Settings'' To configure the Firewall, click on the Settings button.


'''Buttons'''
:'''A. Zone Rule - '''This is a set of network access rules to make the decision of allowing / blocking of the  access to the system. This will contain the source IP address or source Host name or IP range either to be allowed or blocked.


''Allow All'' – Clicking on this button will disable the eScan Firewall i.e. all the incoming and outgoing network traffic will not be monitored / filtered.  
::''Buttons (to configure a Zone Rule)''
::# Add Host Name This option enables you to add a "host" in the Zone Rule. When clicked on this button, enter the HOST name of the system, select the Zone (Trusted / Blocked) and enter a name for the Zone Rule. Click on OK button to create the Zone Rule.
::# Add IP – This option enables you to add an IP address of a system to be added in the Zone rule. When clicked on this button, enter the IP address of the system, select the Zone (Trusted / Blocked) and enter a name for the Zone Rule. Click on OK button to create the Zone Rule.
::# Add IP Range – This option enables you to add an IP range to be added in the Zone rule. When clicked on this button, add the IP Range (i.e. a range of IP that the Zone rule  should be applied), select the Zone (Trusted / Blocked) and enter a name for the Zone Rule. Click on OK button to create the Zone Rule.
::# Modify – To modify / change any listed Zone Rule(s), click on the Modify button.
::# Remove - To delete any listed Zone Rule(s), click on the remove button.


''Limited Filter'' – Clicking on this button will enable eScan Firewall in limited mode which will monitor all incoming traffic only and will be allowed / blocked as per the conditions or rules defined in the Firewall.


''Interactive'' - Clicking on this button will enable eScan Firewall to monitor all the incoming and outgoing network traffic and will be allowed / blocked as per the conditions or rules defined in the Firewall.  
:'''B. Expert Rule – '''This rule is recommended for experienced users with expertise in Firewall security and networking protocols. Expert rule is based on the following below attributes:
'''Block All button''' – Clicking on this button will enable eScan Firewall to block all the incoming and outgoing network traffic.
::* Source IP Address / Host Name
::* Source Port Number
::* Destination IP Address / Host Name
::* Destination Port Number


''Settings'' – To configure the Firewall, click on the Settings button.
::''Buttons (to configure an Expert Rule)''


'''A. Zone Rule - '''This is a set of network access rules to make the decision of allowing / blocking of the  access to the system. This will contain the source IP address or source Host name or IP range either to be allowed or blocked.
::'''Add''' – Click on the Add button to create a new Expert Rule. In the Add Firewall Rule Window:


''Buttons (to configure a Zone Rule)''
:::i. General tab – In this section, specify the Rule settings
## Add Host Name – This option enables you to add a "host" in the Zone Rule. When clicked on this button, enter the HOST name of the system, select the Zone (Trusted / Blocked) and enter a name for the Zone Rule. Click on OK button to create the Zone Rule.
::::* Rule Name – Provide a name to the Rule,
## Add IP This option enables you to add an IP address of a system to be added in the Zone rule. When clicked on this button, enter the IP address of the system, select the Zone (Trusted / Blocked) and enter a name for the Zone Rule. Click on OK button to create the Zone Rule.
::::* Rule Action Action to be taken, whether to Permit Packet or Deny Packet,
## Add IP Range This option enables you to add an IP range to be added in the Zone rule. When clicked on this button, add the IP Range (i.e. a range of IP that the Zone rule  should be applied), select the Zone (Trusted / Blocked) and enter a name for the Zone Rule. Click on OK button to create the Zone Rule.
::::* Protocol Select the network protocol (eg.TCP, UDP, ARP etc…) on which the Rule will be applied
## Modify To modify / change any listed Zone Rule(s), click on the Modify button.
::::* Apply rule on Interface Select the Network Interfac on which the Rule will be applied.
## Remove - To delete any listed Zone Rule(s), click on the remove button.


:::ii. Source tab – In this section, specify / select the location from where the outgoing netowork traffic originates.
::::* Source IP Address –
:::::My Computer – The rule will be applied for the outgoing traffic originating from your computer.


'''B. Expert Rule '''This rule is recommended for experienced users with expertise in Firewall security and networking protocols. Expert rule is based on the following below attributes:
:::::Host Name The rule will be applied for the outgoing traffic originating from the computer as per the host name specified.
* Source IP Address / Host Name
* Source Port Number
* Destination IP Address / Host Name
* Destination Port Number


''Buttons (to configure an Expert Rule)''
:::::Single IP Address – The rule will be applied for the outgoing traffic originating from the computer as per the IP address specified.


'''Add''' Click on the Add button to create a new Expert Rule. In the Add Firewall Rule Window.
:::::Whole IP Range To enable the rule on a group of computers in series, you can specify a range of IP address. The rule will be applied for the outgoing traffic from the computer(s) which is within  the defined ip range.


i. General tab In this section, specify the Rule settings
:::::Any IP Address When this option is selected, the rule will be applied for the traffic originating from ANY IP Addresses.
** Rule Name – Provide a name to the Rule,
** Rule Action – Action to be taken, whether to Permit Packet or Deny Packet,
** Protocol – Select the network protocol (eg.TCP, UDP, ARP etc…) on which the Rule will be applied
** Apply rule on Interface – Select the Network Interfac on which the Rule will be applied.


ii. Source tab In this section, specify / select the location from where the outgoing netowork traffic originates.
::::* Source Port –
** Source IP Address –
:::::Any When this option is selected, the rule will be applied for the outgoing traffic originating from ANY port(s).
My Computer – The rule will be applied for the outgoing traffic originating from your computer.


Host Name The rule will be applied for the outgoing traffic originating from the computer as per the host name specified.
:::::Single Port When this option is selected, the rule will be applied for the outgoing traffic originating from the specified / defined port.


Single IP Address – The rule will be applied for the outgoing traffic originating from the computer as per the IP address specified.
:::::Port Range To enable the rule on a group of  ports in series, you can specify a range of ports. The rule will be applied for the outgoing traffic originating from the port which is within the defined range of ports.


Whole IP Range To enable the rule on a group of computers in series, you can specify a range of IP address. The rule will be applied for the outgoing traffic from the computer(s) which is within  the defined ip range.
:::::Port List A list of port can be specified / added. The rule will be applied for the outgoing traffic originating from the ports as per specified in the list.


Any IP Address – When this option is selected, the rule will be applied for the traffic originating from ANY IP Addresses.
:::::<U>'''NOTE:'''</U> The rule will be applied when the selected Source IP Address and Source Port matches together.


** Source Port –
Any – When this option is selected, the rule will be applied for the outgoing traffic originating from ANY port(s).


Single Port When this option is selected, the rule will be applied for  the outgoing traffic originating from the specified / defined port.
:::iii. Destination tab In this section, specify / select the location of the computer where the incoming network traffic is destined.  


Port Range To enable the rule on a group of  ports in series, you can specify a range of ports. The rule will be applied for the outgoing traffic originating from the port which is within the defined range of ports.
::::* Destination IP Address


Port List A list of port can be specified / added. The rule will be applied for the outgoing traffic originating from the ports as per specified in the list.
:::::My Computer – The rule will be applied for the incoming traffic to your computer.


'''NOTE: '''The rule will be applied when the selected Source IP Address and Source Port matches together.
:::::Host Name – The rule will be applied for the incoming traffic to the computer as per the host name specified.


:::::Single IP Address – The rule will be applied for the incoming traffic to the computer as per the IP address specified.


iii. Destination tab In this section, specify / select the location of the computer where the incoming network traffic is destined.  
:::::Whole IP Range To apply the rule on a group of computers in series, you can specify a range of IP address. The rule will be applied for the incoming traffic to the computer(s) which is within the defined IP range.


** Destination IP Address –
:::::Any IP Address – When this option is selected, the rule will be applied for the incoming traffic to ANY IP Addresses.


My Computer The rule will be applied for the incoming traffic to your computer.
::::* Destination Port –  


Host Name The rule will be applied for the incoming traffic to the computer as per the host name specified.
:::::Any When this option is selected, the rule will be applied for the incoming traffic to ANY port.


Single IP Address The rule will be applied for the incoming traffic to the computer as per the IP address specified.
:::::Single Port When this option is selected, the rule will be applied for the incoming traffic to the specified / defined port.


Whole IP Range – To apply the rule on a group of computers in series, you can specify a range of IP address. The rule will be applied for the incoming traffic to the computer(s) which is within the defined IP range.
:::::Port Range – To enable the rule on a group of ports in series, you can specify a range of ports. The rule will be applied for the incoming traffic to the port which is within the defined range of ports.  


Any IP Address When this option is selected, the rule will be applied for the incoming traffic to ANY IP Addresses.
:::::Port List A list of port can be specified / added. The rule will be applied for incoming traffic originating from the ports as per specified in the list.


** Destination Port
:::::<U>'''NOTE:'''</U> The rule will be applied when the selected Destination IP Address and Destination Port matches together.


Any When this option is selected, the rule will be applied for the incoming traffic to ANY port.
:::iv. Advanced tab This tab contains advance setting for Expert Rule.


Single Port – When this option is selected, the rule will be applied for the incoming traffic to the specified / defined port.
::::* Enable Advanced ICMP Processing - This is activated when the ICMP protocol is selected in the General tab.
::::* The packet must be from/to a trusted MAC address – When this option is selected, the rule will only be applied on the MAC address defined / listed in the Trusted MAC Address tab.
::::* Log information when this rule applies – This will enable to log information of the Rule when it is implied.


Port Range – To enable the rule on a group of ports in series, you can specify a range of ports. The rule will be applied for the incoming traffic to the port which is within the defined range of ports.


Port List A list of port can be specified / added. The rule will be applied for incoming traffic originating from the ports as per specified in the list.
::::'''Modify''' This button will enable to change or modify any Expert Rule.


'''NOTE: '''The rule will be applied when the selected Destination IP Address and Destination Port matches together.
::::'''Remove''' – This button will delete a rule from the Expert Rule.


iv. Advanced tab – This tab contains advance setting for Expert Rule.
::::'''Default Rules''' – This button will load / reset the rules to the Default settings present during the installation of eScan. This will remove all the settings defined by user.


* Enable Advanced ICMP Processing - This is activated when the ICMP protocol is selected in the General tab.
::::'''Up and Down Arrows''' – The UP and DOWN arrow button will enable to move the rules up or down as required and will take precedence over the rule listed below it.  
* The packet must be from/to a trusted MAC address – When this option is selected, the rule will only be applied on the MAC address defined / listed in the Trusted MAC Address tab.
* Log information when this rule applies – This will enable to log information of the Rule when it is implied.


::::''Other options on Right Click on any rule''


'''Modify''' – This button will enable to change or modify any Expert Rule.
::::'''Enable Rule / Disable Rule '''–When clicked on this option this will either enable or disable the selected rules. The option toggles between Enable and Disable rule.


'''Remove''' – This button will delete a rule from the Expert Rule.


'''Default Rules''' – This button will load / reset the rules to the Default settings present during the installation of eScan. This will remove all the settings defined by user.


'''Up and Down Arrows''' – The UP and DOWN arrow button will enable to move the rules up or down as required and will take precedence over the rule listed below it.  
:'''C. Application Rule – '''This rule is based on the Programs / Application(s) that is permitted / denied to access the Internet or any Network services. For e.g. Internet Explorer.
::''Buttons (to configure an Application Rule)''.
::# Add To add a new Application rule click on the Add button and browse and locate the executable file and select the action to be taken i.e. either Permit or Deny.
::# Remove – This button will delete a rule from the Application Rule.
::# Default Rules - This button will load / reset the rules to the Default settings present during the installation of eScan. This will remove all the settings defined by user.
::To change / modify actions on a particular Application rule, you can right click on the applications.


::''Other options on Right Click on any rule''


'''C. Application Rule – '''This rule is based on the Programs / Application(s) that is permitted / denied to access the Internet or any Network services. For e.g. Internet Explorer.
:::Ask –When the selected application is executed, eScan Firewall will prompt whether to allow this application to be permited / denined. (Rule Color code – Gray).
''Buttons (to configure an Application Rule)''.
# Add – To add a new Application rule click on the Add button and browse and locate the executable file and select the action to be taken i.e. either Permit or Deny.
# Remove – This button will delete a rule from the Application Rule.
# Default Rules - This button will load / reset the rules to the Default settings present during the installation of eScan. This will remove all the settings defined by user.
To change / modify actions on a particular Application rule, you can right click on the applications.


:::Permit - When the selected application is executed, eScan Firewall will allow this application to run. (Rule Color code – Green).


'''D. Trojan Rule – '''This rule is based on predefined rules set by MicroWorld on the basis of our database and research of various Trojans that exploits the Network Services like accessing a system in the network. This rule is similar to settings in the Expert Rule.
:::Deny - When the selected application is executed, eScan Firewall will stop this application from running. (Rule Color code Red).


:::Process Properties – This will display the properties of the selected process / executable file.


'''E. Trusted MAC Address '''This section contains the information of the MAC address of the system. A MAC address (Media Access Control address) is a hardware address that uniquely identifies each node of a network. The Trusted MAC address list will be checked alongwith the Expert Rule only when "The packet must be from/to a trusted MAC address" option is checked and the action will be as per specified in the rule. (refer to the Advance Tab of the Expert Rule).
:::Process Details – This will provide the online detail of the selected process / executable file.
''Buttons (to configure the Trusted MAC Address)''
# Add – To add a MAC address click on this button. Enter the MAC address to be added in the list for eg. 00-13-8F-27-00-47
# Edit – To modify / change the MAC Address click on this button.
# Remove – To delete the MAC Address click on this button.
# Clear All – To delete all the listed MAC Address click on this button.




'''F. Local IP List – '''This section contains a list of Local IP addresses.
:'''D. Trojan Rule – '''This rule is based on predefined rules set by MicroWorld on the basis of our database and research of various Trojans that exploits the Network Services like accessing a system in the network. This rule is similar to settings in the Expert Rule.
:<U>'''NOTE: This feature was available only prior to eScan version 10.0.968.374 and have been removed after this version.'''</U>


''Buttons (to configure the Local IP List)''
:'''E. Trusted MAC Address – '''This section contains the information of the MAC address of the system. A MAC address (Media Access Control address) is a hardware address that uniquely identifies each node of a network. The Trusted MAC address list will be checked alongwith the Expert Rule only when "The packet must be from/to a trusted MAC address" option is checked and the action will be as per specified in the rule. (refer to the Advance Tab of the Expert Rule).
::''Buttons (to configure the Trusted MAC Address)''
:::# Add – To add a MAC address click on this button. Enter the MAC address to be added in the list for eg. 00-13-8F-27-00-47
:::# Edit – To modify / change the MAC Address click on this button.
:::# Remove – To delete the MAC Address click on this button.
:::# Clear All – To delete all the listed MAC Address click on this button.


# Add – To add a Local IP address click on this button.
# Remove – To remove a Local IP address click on this button.
# Clear All – To clear all the Local IP address in the list click on this button.
# Default List – To load the default list of IP address click on this button.


:'''F. Local IP List – '''This section contains a list of Local IP addresses.


''Other Buttons''
::''Buttons (to configure the Local IP List)''


'''Clear Alert Cache''' - This option will clear / delete all the information stored by the Firewall cache
:::# Add – To add a Local IP address click on this button.
'''Show Application Alert''' Selecting this option will display an eScan FireWall Alert displaying the blocking of any application as defined in the Application Rule.  
:::# Remove – To remove a Local IP address click on this button.
:::# Clear All – To clear all the Local IP address in the list click on this button.
:::# Default List To load the default list of IP address click on this button.




'''2. Reports section'''  
::''Other Buttons''


''Statistics''
:::'''Clear Alert Cache''' - This option will clear / delete all the information stored by the Firewall cache
:::'''Show Application Alert''' – Selecting this option will display an eScan FireWall Alert displaying the blocking of any application as defined in the Application Rule.


* Inbound Traffic Allowed – Displays the number of allowed incoming traffic.
* Outbound Traffic Allowed - Displays the number of allowed outgoing traffic.
* Inbound Traffic Blocked - Displays the number of blocked incoming traffic.
* Outbound Traffic Blocked - Displays the number of blocked outgoing traffic.


'''a. View Current Network Activity''' – This will display all the network activities including Active connections and Established Connections. This will contain the information of the process, protocol, local address and the remote address and the status of each network connection.
=='''Reports section'''==


'''b. View Summary '''– Clicking on this option can create a Summary / Detailed report.
:''Statistics''
 
::* Inbound Traffic Allowed – Displays the number of allowed incoming traffic.
::* Outbound Traffic Allowed - Displays the number of allowed outgoing traffic.
::* Inbound Traffic Blocked - Displays the number of blocked incoming traffic.
::* Outbound Traffic Blocked - Displays the number of blocked outgoing traffic.
 
::'''a. View Current Network Activity''' – This will display all the network activities including Active connections and Established Connections. This will contain the information of the process, protocol, local address and the remote address and the status of each network connection.
 
::'''b. View Summary '''– Clicking on this option can create a Summary / Detailed report.
A Summary report will consist of information of the rules that has been invoked and applied by the Firewall. Rules like Application Rule, Expert Rule, Zone Rule, Trojan Rule.
A Summary report will consist of information of the rules that has been invoked and applied by the Firewall. Rules like Application Rule, Expert Rule, Zone Rule, Trojan Rule.
A Detailed report will consists of information of the rules including the Network Activity.
A Detailed report will consists of information of the rules including the Network Activity.
The report also consists of Graphical reports.
The report also consists of Graphical reports.


'''c. View Report '''– Clicking on this option will display the Incoming and Outgoing traffic which is Allowed or Blocked.  
::'''c. View Report '''– Clicking on this option will display the Incoming and Outgoing traffic which is Allowed or Blocked.  






'''Enforcement of Firewall Rules'''
=='''Enforcement of Firewall Rules'''==


Any Network packets that are received / sent on or from a Network Interface, eScan Firewall will first check the rules in the following order:
Any Network packets that are received / sent on or from a Network Interface, eScan Firewall will first check the rules in the following order:


1^st^ – Trojan Rules
::1^st^ – Trojan Rules
::<U>'''NOTE: This feature was available only prior to eScan version 10.0.968.374 and have been removed after this version.'''</U>
 
::2^nd^ – Zone Rules


2^nd^ – Zone Rules
::3^rd^ – Expert Rules


3^rd^ – Expert Rules
::4^th^ – Application Rules


4^th^ – Application Rules






'''*[http://193.34.136.70/wiki/index.php/EScan_ver.10 Click here to return to Main Index of eScan v.10 Online Help]'''
==<I>'''[http://download1.mwti.net/wiki/index.php/Glossary Glossary]'''</I>==
==<I>'''[http://download1.mwti.net/wiki/index.php/EScan_ver.10 Main Feature Index]'''</I>==

Revision as of 07:31, 23 March 2009

Firewall

Description

Firewall monitors all incoming and outgoing network activities in your system and also protects from all network based attacks.

Firewall is a comprehensive feature that is designed to prevent unauthorized access to a computer or network that is connected to the Internet. It enforces a boundary between two or more networks by implementing default or user-defined access-control policies (rules) between two or more networks. The user can set rules to control incoming network access to their system as well as outgoing traffic from their system. Rules are user defined / created or selected either to allow or block any outgoing or incoming traffic. The Firewall checks the rules and analyzes the network packets (small chunks of data) and filter. If they fulfill the criteria defined in the Rules, they are allowed to pass through or else discard them.

Within the software, are provided set of predefined rules that can be added to the firewall by selecting those that are appropriate to one’s security needs. Users can define their own ‘rules’, and when they don’t feel the need for any of the rules they have ‘added’, they can remove them.

Vulnerable Scenarios - A user is vulnerable to hacker attack when their system connects to a public network

- When you log in to chat, you connect to Internet Relay Chat (IRC) servers on the Internet and join others in the numerous ‘channels’ on the IRC network.
- When you use Telnet to connect to a server on the Internet and execute commands ‘on’ the server from your computer.
- When you use FTP to transfer files from a remote server to your computer. FTP is the File Transfer Protocol for exchanging files over the Internet, and works in the same way that HTTP and SMTP do in transferring Web pages from servers to user’s browser and transferring e-mail across the WWW respectively.
- When you use NetBIOS (Network Basic Input/Output System) to communicate with another user on the LAN; the LAN could in turn be connected to the Internet. NetBIOS insulates the applications that users use to communicate with one another, from understanding the underlying network details.
- When you are a part of a Virtual Private Networks (VPN). These private network connections communicate ‘securely’ over a public network, such as the Internet.
- When you browse the Web.
- When you send/receive e-mail.


Status in main Protection Center Window

The green colored Tick (√) mark indicates the Firewall is active and running.

The red colored Cross mark (X) indicates the Firewall is inactive and stopped.


Configuration section

Status:
  • Firewall Status – This will display whether the Firewall is Running or Disabled.
  • Action – This will display the Firewall Mode.
Buttons
Allow All – Clicking on this button will disable the eScan Firewall i.e. all the incoming and outgoing network traffic will not be monitored / filtered.
Limited Filter – Clicking on this button will enable eScan Firewall in limited mode which will monitor all incoming traffic only and will be allowed / blocked as per the conditions or rules defined in the Firewall.
Interactive - Clicking on this button will enable eScan Firewall to monitor all the incoming and outgoing network traffic and will be allowed / blocked as per the conditions or rules defined in the Firewall.
Block All button – Clicking on this button will enable eScan Firewall to block all the incoming and outgoing network traffic.
Settings – To configure the Firewall, click on the Settings button.
A. Zone Rule - This is a set of network access rules to make the decision of allowing / blocking of the access to the system. This will contain the source IP address or source Host name or IP range either to be allowed or blocked.
Buttons (to configure a Zone Rule)
  1. Add Host Name – This option enables you to add a "host" in the Zone Rule. When clicked on this button, enter the HOST name of the system, select the Zone (Trusted / Blocked) and enter a name for the Zone Rule. Click on OK button to create the Zone Rule.
  2. Add IP – This option enables you to add an IP address of a system to be added in the Zone rule. When clicked on this button, enter the IP address of the system, select the Zone (Trusted / Blocked) and enter a name for the Zone Rule. Click on OK button to create the Zone Rule.
  3. Add IP Range – This option enables you to add an IP range to be added in the Zone rule. When clicked on this button, add the IP Range (i.e. a range of IP that the Zone rule should be applied), select the Zone (Trusted / Blocked) and enter a name for the Zone Rule. Click on OK button to create the Zone Rule.
  4. Modify – To modify / change any listed Zone Rule(s), click on the Modify button.
  5. Remove - To delete any listed Zone Rule(s), click on the remove button.


B. Expert Rule – This rule is recommended for experienced users with expertise in Firewall security and networking protocols. Expert rule is based on the following below attributes:
  • Source IP Address / Host Name
  • Source Port Number
  • Destination IP Address / Host Name
  • Destination Port Number
Buttons (to configure an Expert Rule)
Add – Click on the Add button to create a new Expert Rule. In the Add Firewall Rule Window:
i. General tab – In this section, specify the Rule settings
  • Rule Name – Provide a name to the Rule,
  • Rule Action – Action to be taken, whether to Permit Packet or Deny Packet,
  • Protocol – Select the network protocol (eg.TCP, UDP, ARP etc…) on which the Rule will be applied
  • Apply rule on Interface – Select the Network Interfac on which the Rule will be applied.
ii. Source tab – In this section, specify / select the location from where the outgoing netowork traffic originates.
  • Source IP Address –
My Computer – The rule will be applied for the outgoing traffic originating from your computer.
Host Name – The rule will be applied for the outgoing traffic originating from the computer as per the host name specified.
Single IP Address – The rule will be applied for the outgoing traffic originating from the computer as per the IP address specified.
Whole IP Range – To enable the rule on a group of computers in series, you can specify a range of IP address. The rule will be applied for the outgoing traffic from the computer(s) which is within the defined ip range.
Any IP Address – When this option is selected, the rule will be applied for the traffic originating from ANY IP Addresses.
  • Source Port –
Any – When this option is selected, the rule will be applied for the outgoing traffic originating from ANY port(s).
Single Port – When this option is selected, the rule will be applied for the outgoing traffic originating from the specified / defined port.
Port Range – To enable the rule on a group of ports in series, you can specify a range of ports. The rule will be applied for the outgoing traffic originating from the port which is within the defined range of ports.
Port List – A list of port can be specified / added. The rule will be applied for the outgoing traffic originating from the ports as per specified in the list.
NOTE: The rule will be applied when the selected Source IP Address and Source Port matches together.


iii. Destination tab – In this section, specify / select the location of the computer where the incoming network traffic is destined.
  • Destination IP Address –
My Computer – The rule will be applied for the incoming traffic to your computer.
Host Name – The rule will be applied for the incoming traffic to the computer as per the host name specified.
Single IP Address – The rule will be applied for the incoming traffic to the computer as per the IP address specified.
Whole IP Range – To apply the rule on a group of computers in series, you can specify a range of IP address. The rule will be applied for the incoming traffic to the computer(s) which is within the defined IP range.
Any IP Address – When this option is selected, the rule will be applied for the incoming traffic to ANY IP Addresses.
  • Destination Port –
Any – When this option is selected, the rule will be applied for the incoming traffic to ANY port.
Single Port – When this option is selected, the rule will be applied for the incoming traffic to the specified / defined port.
Port Range – To enable the rule on a group of ports in series, you can specify a range of ports. The rule will be applied for the incoming traffic to the port which is within the defined range of ports.
Port List – A list of port can be specified / added. The rule will be applied for incoming traffic originating from the ports as per specified in the list.
NOTE: The rule will be applied when the selected Destination IP Address and Destination Port matches together.
iv. Advanced tab – This tab contains advance setting for Expert Rule.
  • Enable Advanced ICMP Processing - This is activated when the ICMP protocol is selected in the General tab.
  • The packet must be from/to a trusted MAC address – When this option is selected, the rule will only be applied on the MAC address defined / listed in the Trusted MAC Address tab.
  • Log information when this rule applies – This will enable to log information of the Rule when it is implied.


Modify – This button will enable to change or modify any Expert Rule.
Remove – This button will delete a rule from the Expert Rule.
Default Rules – This button will load / reset the rules to the Default settings present during the installation of eScan. This will remove all the settings defined by user.
Up and Down Arrows – The UP and DOWN arrow button will enable to move the rules up or down as required and will take precedence over the rule listed below it.
Other options on Right Click on any rule
Enable Rule / Disable Rule –When clicked on this option this will either enable or disable the selected rules. The option toggles between Enable and Disable rule.


C. Application Rule – This rule is based on the Programs / Application(s) that is permitted / denied to access the Internet or any Network services. For e.g. Internet Explorer.
Buttons (to configure an Application Rule).
  1. Add – To add a new Application rule click on the Add button and browse and locate the executable file and select the action to be taken i.e. either Permit or Deny.
  2. Remove – This button will delete a rule from the Application Rule.
  3. Default Rules - This button will load / reset the rules to the Default settings present during the installation of eScan. This will remove all the settings defined by user.
To change / modify actions on a particular Application rule, you can right click on the applications.
Other options on Right Click on any rule
Ask –When the selected application is executed, eScan Firewall will prompt whether to allow this application to be permited / denined. (Rule Color code – Gray).
Permit - When the selected application is executed, eScan Firewall will allow this application to run. (Rule Color code – Green).
Deny - When the selected application is executed, eScan Firewall will stop this application from running. (Rule Color code – Red).
Process Properties – This will display the properties of the selected process / executable file.
Process Details – This will provide the online detail of the selected process / executable file.


D. Trojan Rule – This rule is based on predefined rules set by MicroWorld on the basis of our database and research of various Trojans that exploits the Network Services like accessing a system in the network. This rule is similar to settings in the Expert Rule.
NOTE: This feature was available only prior to eScan version 10.0.968.374 and have been removed after this version.
E. Trusted MAC Address – This section contains the information of the MAC address of the system. A MAC address (Media Access Control address) is a hardware address that uniquely identifies each node of a network. The Trusted MAC address list will be checked alongwith the Expert Rule only when "The packet must be from/to a trusted MAC address" option is checked and the action will be as per specified in the rule. (refer to the Advance Tab of the Expert Rule).
Buttons (to configure the Trusted MAC Address)
  1. Add – To add a MAC address click on this button. Enter the MAC address to be added in the list for eg. 00-13-8F-27-00-47
  2. Edit – To modify / change the MAC Address click on this button.
  3. Remove – To delete the MAC Address click on this button.
  4. Clear All – To delete all the listed MAC Address click on this button.


F. Local IP List – This section contains a list of Local IP addresses.
Buttons (to configure the Local IP List)
  1. Add – To add a Local IP address click on this button.
  2. Remove – To remove a Local IP address click on this button.
  3. Clear All – To clear all the Local IP address in the list click on this button.
  4. Default List – To load the default list of IP address click on this button.


Other Buttons
Clear Alert Cache - This option will clear / delete all the information stored by the Firewall cache
Show Application Alert – Selecting this option will display an eScan FireWall Alert displaying the blocking of any application as defined in the Application Rule.


Reports section

Statistics
  • Inbound Traffic Allowed – Displays the number of allowed incoming traffic.
  • Outbound Traffic Allowed - Displays the number of allowed outgoing traffic.
  • Inbound Traffic Blocked - Displays the number of blocked incoming traffic.
  • Outbound Traffic Blocked - Displays the number of blocked outgoing traffic.
a. View Current Network Activity – This will display all the network activities including Active connections and Established Connections. This will contain the information of the process, protocol, local address and the remote address and the status of each network connection.
b. View Summary – Clicking on this option can create a Summary / Detailed report.

A Summary report will consist of information of the rules that has been invoked and applied by the Firewall. Rules like Application Rule, Expert Rule, Zone Rule, Trojan Rule. A Detailed report will consists of information of the rules including the Network Activity. The report also consists of Graphical reports.

c. View Report – Clicking on this option will display the Incoming and Outgoing traffic which is Allowed or Blocked.


Enforcement of Firewall Rules

Any Network packets that are received / sent on or from a Network Interface, eScan Firewall will first check the rules in the following order:

1^st^ – Trojan Rules
NOTE: This feature was available only prior to eScan version 10.0.968.374 and have been removed after this version.
2^nd^ – Zone Rules
3^rd^ – Expert Rules
4^th^ – Application Rules



Glossary

Main Feature Index