View Full Version : Firewall
Нужен Firewall в котором етсь возможность закрыть входяшие или исходащие с ip опдереленного порта.
Последний outpost не предлогать, перемороченый какой то.
встроенный фаерволл win7 =))) аутпост кстати вполне себе простой если вот именно 1 правило сделать.
Kirby <> No Excuses
23.12.2009, 06:21
Целый firewall на такую фигню? А обойтись малой кровью никак ? - Скажем блокировкой через тот же router или PG?
Если нет, то советую ZoneAlarm Suite там сразу весь комплекс firewall + antivir + лекарство. Танец с бубном, как в случае с Outpost, на предмет совместимости, удастся избежать. ZoneAlarm Suite ловит и останавливает многое, на твердую 4.
http://isohunt.com/torrent_details/90154485/ZoneAlarm?tab=summary
А вот использовать встроенный firewall или того хуже 2 firewall-а я б не советовал, - чревато.
вопрос был конкретен. закрыть некий ip с неким портом простейшим способом. а не устроить защиту чего-либо от каких-либо атак. встроенный фаерволл с этим справляется на ура. впрочем, как ни странно, он давно справляется вообще почти со всем, если вырубить нетбиос наружу. мифы легкой пенетрации винды _очень_ сильно преувеличены. оно было реально дырявое в стародавние времена, и то, в основном, средствами, которые требовали нахождения атакуещего в одном ethernet сегменте с целью.
http://personalfirewall.comodo.com/
http://personalfirewall.comodo.com/download_firewall.html
Comodo Firewall + Antivirus + Defense
бесплатный, юзаю уже года четыре. Хороший :) Модули можно отключать, т.е. оставить только фаервол, например. Гибкая настройка.
Мне нужно, выбрать ip адрес или приложинеи, кликнуть по нету и поставить галочку блокировать входящие на порт или вообще входящие, а исходящие пропускать.
В аутпосте я вообще не разобрался, он какойто перемороченый для пользователя который его первый раз видит.
виндус фаервол нихуя не блокирует, я делаю правило apply и хуй, всеравно пакеты ко мне идут.
Фаервол в котором настройка заключается в передвижении шкалы Сильная, Средняя, Маленькая защиты вообще зачем предлогаете?
Мне надо просто закрыть входящие у приложения, Роутера нет, wtf is PG ?
Ушел ковырять зонеаларм
Зонеаларм не разрешил даже vpn запустить, очень афигенный фаервол...
я нашел какойто, сейчас запустят игровые сервера и буду пробовать.
Рекомендую роутер поставить, они сейчас копейки стоят.
ipfw :)))))
Kerio winroute еще, но он не очень подходит для домашней машины.
попробуй Комодо, про который я писал - там можно создавать правила
http://img69.imageshack.us/img69/6333/comodof.th.jpg (http://img69.imageshack.us/i/comodof.jpg/)
http://img34.imageshack.us/img34/7934/comodo1u.th.jpg (http://img34.imageshack.us/i/comodo1u.jpg/)
ЗЫ: кстати, можно и русский язык интерфейса поставить
ну так хвастайся на чем остановил свой выбор?
Kirby <> No Excuses
25.12.2009, 21:25
На всякий случай, инструкции:
ZoneAlarm Internet Security Suite will work on any LAN connection with firewalls and proxies. Typically, no additional configuration is needed for ZoneAlarm to work on a LAN.
Making your computer visible on your local network
If you cannot see the other computers on your local network, or they cannot see you, it is possible that ZoneAlarm Internet Security Suite is blocking the NetBIOS traffic necessary for Windows network visibility. To make your computer visible to the others on your local network:
Add the network subnet (or, in a small network, the IP address of each computer with which you're sharing the network) to your Trusted Zone.
Set the Trusted Zone security level to Medium, and the Internet Zone security level to High.
This configuration allows trusted computers to access your shared files, but blocks all other machines from accessing them. Note: ZoneAlarm Internet Security Suite will detect your network automatically and display the New Network alert. You can use the alert itself to add your network subnet to the Trusted Zone.
Sharing files and printers across a local network
To configure ZoneAlarm Internet Security Suite for secure sharing:
Add the network subnet (or, in a small network, the IP address of each computer with which you're sharing the network) to your Trusted Zone.
Set the Trusted Zone security level to Medium. This setting allows trusted computers to access your shared files.
Set Internet Zone security level to High. This setting makes your computer invisible to non-trusted machines.
Note: ZoneAlarm Internet Security Suite will detect your network automatically and display the New Network alert. You can use the alert itself to add your network subnet to the Trusted Zone.
Internet Connection Sharing (ICS)
If you are using Windows' Internet Connection Sharing (ICS) option, or a third-party connection sharing program, you can protect all of the computers that share the connection from inbound threats by installing ZoneAlarm Internet Security Suite on the "gateway" machine only. However, to receive outbound (Program Control) protection, or to see alerts on the client machines, you must have ZoneAlarm Internet Security Suite installed on each client machine as well.
Tip: Before you configure ZoneAlarm Internet Security Suite, use your ICS software to set up the gateway and client relationships . If you use hardware such as a server or router, rather than a host PC, to perform Internet connection sharing, do not follow the steps below.
On the ICS gateway machine:
Go to Main tab of the Firewall panel.
Click Advanced.
Under Internet Connection Sharing, select This computer is an ICS gateway.
In the combination box, select or type the IP address of the gateway machine.
Select Suppress alerts locally if forwarded to clients if you do not want to see alerts that are forwarded to a client.
Note: that if you do not install ZoneAlarm Internet Security Suite on the client machines, all alerts will be displayed on the gateway. For best security, make sure the security level for the Internet Zone is set to High. Make sure outgoing DNS and DHCP are allowed for the Internet Zone at High security.
On the ICS client machines:
Go to Main tab of the Firewall panel.
Click Advanced.
Under Internet Connection Sharing, select This computer is a client of an ICS gateway running ZA Pro.
In the combination box, select or type the IP address of the gateway machine.
Select Forward alerts from gateway to this computer if you want alerts occurring on the gateway machine to be displayed on this client.
VPN (Virtual Private Network)
If you run a VPN client, ZoneAlarm Internet Security Suite examines outgoing packets before encryption and incoming packets after decryption. This inspection prevents malicious traffic from making its way into the VPN tunnel from your computer. It also prevents any malicious traffic that might arrive on your computer via the VPN tunnel from doing any damage.
To configure ZoneAlarm Internet Security Suite to protect VPN traffic:
Add the elements listed below to your Trusted Zone
Your VPN server or VPN concentrator
All of the LAN and WAN subnets that interact with the internal network to which you want access.
Any servers that you will need to make use of through the VPN but which are not on your internal network, such as DNS, POP, or SMTP servers.
RADIUS or TACACS servers (if applicable).
If you receive a firewall alert caused by a blocked attempt to access your loop back address (127.0.0.1), add the loop back address to the Trusted Zone, and make sure there is no proxy software running on your computer.
In the Security tab (Advanced Settings dialog box), select Allow VPN protocols at high security.
If your VPN uses protocols other than GRE, ESP and AH, select Allow uncommon protocols at high security.
Connecting through a proxy server
To enable your computer to connect to the Internet through a proxy server, add the proxy to your Trusted Zone Configuring ZoneAlarm Internet Security Suite with your mail server ZoneAlarm Internet Security Suite is configured to work with Internet-based mail servers using POP3 and IMAP4 protocols, when you give your e-mail client privileges to access the Internet.
Some mail servers, like Microsoft Exchange, include collaboration and synchronization features that might require you to trust the server in order for those features to work.
To configure ZoneAlarm Internet Security Suite for mail servers with collaboration and synchronization features:
Add the network subnet or the IP address of the mail server to your Trusted Zone.
Set the Trusted Zone security level to Medium. This setting allows mail server collaboration features to work.
Set Internet Zone security level to High. This setting makes your computer invisible to non-trusted machines.
P.S: Всё переводить лень, но если нужна какая часть, обращайтесь.
Powered by vBulletin® Version 4.1.10 Copyright © 2024 vBulletin Solutions, Inc. All rights reserved.