Internet Security Systems Desktop Protector Computer Hardware User Manual


 
Appendix B: Configuration Tabs
70
The Firewall Tab
Introduction Use the Firewall tab to choose how tightly Desktop Protector controls access to your
system.
Note: If your computer is reporting intrusion events to ICEcap Manager and local
configuration editing has been disabled, you cannot set any options on the Firewall tab
from the local system.
Protection level
settings
You can choose one of these four protection levels:
For information about how to choose your protection level, see Setting Your Protection
Level on page 34.
Current Protection
Level
If you are using adaptive protection to automatically switch protection levels based on
network traffic, this field identifies the protection level your computer is currently using.
This is not always the same as the protection level you selected manually. For more
information, see Using Adaptive Protection on page 35.
Enable Auto-
Blocking
When this option is selected, Desktop Protector automatically blocks intruders when they
attempt to break into your system. To stop auto-blocking, clear this option. Attacks are
still reported and logged, but not automatically blocked.
If Auto-Blocking is not selected, you must manually block intruders to protect your
system.
Allow Internet File
Sharing
Internet or Windows file sharing allows you to share files with others across the Internet
or over a LAN. For example, you can connect to your system the Internet and upload or
download files.
Clear this check box to do the following:
prevent systems from connecting to your system and accessing your shares over the
Internet or network
make your system unavailable to all systems on a local network, so if you are on a
network, you should select this option unless you do not share files among systems.
Note: This option modifies the firewall setting for TCP port 139. If you select this option,
Desktop Protector accepts communications on port 139; if you disable this option,
Level Description
Paranoid All ports are blocked to incoming traffic.
Nervous All system ports are blocked, and TCP application ports 1024
through 6635 are blocked.
Cautious All system ports are blocked, but all application ports that you
have not explicitly blocked are open.
Trusting Keeps all ports open and unblocked, allowing all inbound traffic.
This is the default setting.
Table 20: Protection levels