Firewall Configuration
Click ‘Settings’ > ‘Firewall’
- Your computer is protected against both inbound and external threats by the firewall
- It verifies that your network traffic is legitimate and protects your computer ports from hackers.
- You can specify which applications have access to the internet using the simple rules interface
- You have two options: you can opt to get alerts when the firewall detects suspicious activity or the firewall will auto-implement an action.
Set up the Firewall module
- On the CIS homepage screen, click ‘Settings.
- Click “Firewall” on the left
The following sections are available for Firewall settings:
- General Firewall Setting – These settings control the behavior of the firewall.
- Application Rules These rules control network access rights for specific applications or types of applications.
- Global Rules These rules apply to all traffic that flows through your computer.
- Rulesets – A predefined collection of firewall rules that can be applied to Internet-capable applications like browsers, email clients, and FTP clients.
- Network zones – A collection of rules that can apply to internet-capable applications such as browsers or email/FTP clients.
- Protests Predefined groups of frequently used ports that can be reused for traffic filtering rules.
Background Note: When the firewall decides whether or not to allow a connection, both global and applicable rules will be consulted. Outgoing connections – First, global rules should be consulted. Incoming Connections – The global rules should be consulted first, then the application rules. |