Six major firewalls set the right skills _ Web surfing

Source: Internet
Author: User
Norton Personal Firewall

On the left side of the main interface of the software, click the "Internet Zone control" option, go to the "Trust zone" tab in the right window, and click the "Add" button to open the "Specify Computer" dialog box. Select Use Range in the dialog box, and then enter the starting and ending addresses that allow access below.

For example, the Jelly Office IP address range is 172.22.1.2~172.22.1.253, now as long as the beginning and end of the IP address input, click the "OK" button to make the settings effective, in this section of all IP can be normal access to the strawberry computer.

Jelly hint In fact, we can not include all the IP address of this network segment, we can determine the range of IP according to the actual situation of the local area network.

Recently, Jelly received several colleagues "complaints", they are unable to use the Internet neighbors to the Strawberry shared folder to visit, Jelly on their own computer test, it is true. However, it is normal to access other computers on a strawberry computer.

But the jelly saw the strawberry's newly installed Skynet firewall, and it dawned on him. It's the firewall that's blocking everyone out of the door. The original strawberry worried about their computer virus intrusion, installed a firewall, did not expect to cause trouble to others. Should strawberry this help rookie's request, jelly to various commonly used firewall software in the local area network the correct setting has carried on the explanation.

   Skynet Firewall

The first thing to introduce is of course the Skynet Firewall (version 2.60) the "perpetrator". A setup wizard pops up after the firewall has just been installed. However, many users do not notice this setup wizard, random click on the completion of the installation (strawberry is this "big sloppy"), the result of incorrect configuration caused by network failure.

If you want to solve the network failure caused by the improper initial setting, we can reset the wizard. Click on the "System Settings" button on the main panel of the Skynet firewall, and in the System Settings window that pops up, click the "Wizard" in "Rule setting" (Figure 1) To eject the Setup wizard.


Figure 1

In the Security Level Settings dialog box, select the security level (the user in the LAN can choose "Low") and then click the "Next" button to enter the LAN Information Settings window. Check "My Computer in the local area network use", the software will automatically detect the IP address of the computer and displayed below. Next, click the "Next" button to complete the setup.

Jelly Tips We can also only allow a computer in the local area network access to their own shared data, in order to achieve the purpose of confidentiality. Click on the "IP Rule Management" button on the firewall main panel, find the rules related to LAN access in the list of IP rules that pops up and double-click it, go to the IP Rule Modification dialog box, and set it as shown in Figure 2.


Figure 2
  jiangmin Hacker Firewall

Click on the "IP rule Settings" button on the main interface of the firewall to eject the IP rule list. In this list of IP rules, you can find two IP rules related to the local area network: "Allow local computers to connect to other machines within the local area network" and "other machines in the LAN to access native (TCP)" (Figure 3).


Figure 3

If you want to modify the "other machines in the LAN to access the native (TCP)" Rule, you can click on the corresponding Edit button, open the "anti-black King Rule Settings" dialog box, in which the "Other IP address" drop-down list to select "Address range", and the local area network to add the segment can be. If you really don't want to be accessed by other users in the network, you can also set it up in the rule "other machines in the local area network access this computer."

   McAfee Firewall

In the process of installing McAfee Firewall, the software will ask us to set up the network. In the Choose Your type of network (select Network Type) window, select Office network (Office network) and click the "Next" button to enter the Network Access Settings window. If you are in the Office LAN, Jelly recommends that you select "Completely trusted my local network (fully trust me)" and then click the "Next" button to complete the setup. In this way, the firewall will be like a obedient "child", will not interfere with the operation of our LAN.

Jelly hint of course, the access in the LAN is not necessarily benign, we can set the range of IP addresses to allow access to maximize the security of mutual visits. If you want to be able to define a range of IP addresses that you can access by yourself, click on "utilities→trusted&banned ips→trusted IP Addresses" in the McAfee Firewall main window and click the "Add" button. In the pop-up trusted IP Rules window, click "An IP address range", enter the range of IP addresses below (Figure 4), and finally click the "OK" button to exit the Setup dialog box.


Figure 4
Jelly Tip You can also add the IP address of the user you want to reject in the banned IP Addresses (untrusted IP address) tab.

   Jinshan Net Dart

Jinshan Network Dart provides the access monitoring function of the LAN shared directory, which allows users to view the access to the local shared directory at any time. With this feature, users can cancel unnecessary shared directories at any time and stop other users from accessing their shared directories, as much as possible to prevent the intrusion of malicious programs and other people's "peeping".

In the main interface of Jinshan Dart, click on the "Shared Management" tab and all the current shares will be listed in the "Shared Management" window list. Select the share you want to edit, and then on the shared Management page, you can manage the shared file by clicking on the Icons "edit", "delete", "add", and so on. Also, if you want to temporarily suspend a folder's sharing, just click on the "Prohibit" button on the right side of the folder (Figure 5).


Figure 5

In addition, to be able to exchange regular visits within the local area network, we also need to make the following settings. In Jinshan Network Dart main Window menu bar click on "tools → comprehensive settings →ip settings", check the "My computer is in the Local area network" checkbox, click "OK" button to make the settings effective.

   Rising Personal Firewall

Rising personal Firewall is one of the most common firewall software users. Starting from the 2003 version, rising firewall in its rule settings to increase the LAN and wide area network discrimination. Furthermore, this discriminant allows the user to process data in a particular transmission direction.

For example, many users want to be able to open the Windows Messenger service to receive information sent by other users on the LAN, but are concerned about receiving some harassment information from the external network. At this point, we can use the rising firewall specifically for the Windows Messenger Service set access rules. Click "option → rule settings" on the menu bar of the main interface of the software to open the Rule Setup dialog box. Locate the "Prohibit Windows Messenger Service" in the list of rules to open the Modify Rule dialog box. To use the Windows Messenger feature on your local area network, simply click the down arrow next to the Data link, select LAN, and set operation to allow.

Through the above content, everyone should have mastered the above several firewall software in the LAN Security, management of the setting skills, can calmly handle due to improper firewall settings caused by the inability to exchange visits and other issues.

The installation of a variety of firewalls have a certain common ground, that is generally able to set their IP rules to find and LAN-related options, we only use and the above content similar to the operation to complete the setup.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.