Eight network firewall main function introduction

Source: Internet
Author: User
Tags mail firewall

First, Proud Shield firewall

Log in as administrator to install the KFW program after WINDOWS2000/XP, and then restart loading core program after completion. The first boot KfW will eject the Setup wizard, typically using the default settings.

1. Firewall Rule setting

Double-click the taskbar icon to eject the main interface, the KFW firewall has built-in 42 rules, including 20 standard security rules and 22 rules for the main Trojan program, these rules can ensure system security. Double-click any rule to edit it. KfW also provides 5 security levels, generally used in, advanced can, in addition, can also be based on online security conditions to dynamically set rules, such as the wave of virus in the Internet can be added to 5554, 1068, 445, such as the interception of ports.

2. Application rules

The KfW firewall can set rules for the application, which is useful against Trojans. Whenever a new program wants to access the Network, KfW pops up a confirmation box, which also controls the packets that are sent to and from the application, and sets the trace on the packet.

3, packet filtering and recording

The KFW firewall has professional-level package content logging capabilities to give you a deeper understanding of the structure of the various attack packs. Real-time packet address, type filtering can prevent Trojan intrusion and scan for dangerous ports. For example, filtering blue Code virus attack packets, but also to prevent the ICQ, QQ panic attacks.

4, Network Port list

The Network Ports List window for the KfW firewall lists all applications using network ports and the ports they use. In addition to the above features, the IP translation database can also display the corresponding geographic location of the IP address.

Second, Agnitum Outpost Firewall

Agnitum Outpost Firewall is a dapper network firewall software, it can from the system and application two levels, network connection, advertising, content, plug-ins, mail attachments and attack detection of multiple aspects of protection, prevention from Cookies, ads, e-mail viruses, backdoor , Spy software, decryption master, the harm of advertising software.

1. Application rules



Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.