network. You can configure the firewall to allow specific application traffic from the Internet to pass through to a computer on your local network.

If the firewall has been configured to allow traffic from the Internet to pass through, the device and the allowed application are listed. If application traffic is allowed, external users on the Internet can have limited access to your local network. This access might be required in order for some programs such as game servers and messaging software to operate properly. For example, a remote game player on the Internet might need to contact the game server program that you have installed on your local network in order to play against you. Normally, the firewall blocks this communication. By changing the firewall settings, this communication is permitted to pass through a “pinhole” in the firewall. This function may be referred to as “port-mapping” or “port-forwarding” in your software program documentation.

A status message displays the firewall’s Current Settings. The default settings disallow all unsolicited inbound traffic to provide maximum protection for your local network. The Current Settings will be displayed as “Custom” if any applications have been associated with computers on your network.

The summary displays an access list showing the computers (“Devices”) on your network and the names of the Allowed Applications for each computer.

Click VIEW DETAILS to access the Firewall Details page, which shows a list of all the devices that have applications configured in the firewall and the details of these configurations.

Viewing firewall details

The Firewall Details page displays the details of all the applications allowed to pass through the firewall, and includes the following information:

Application Type. A special set of rules required by complex applications to ensure that all of the necessary data is passed correctly through the firewall.

Protocol. The Internet protocol used by the application to send and receive data. Data that is transferred over the Internet must conform to one of a number of defined standards. This column indicates the protocol used by the data for the firewall to properly forward the data to the assigned computer. An application may require multiple protocols to communicate.

Port Numbers. Some Internet protocols transfer data through specific channels or connection numbers known as ports. For example, an instant messenger application may send a message using

41

Page 47
Image 47
Wire World Of America 1800 manual Viewing firewall details