Firewall Protection

Print Friendly, PDF & Email

Firewall shields your system from intruders and hackers by monitoring and filtering incoming and outgoing network traffic.

Any suspicious program that may be harmful to your computers or systems is blocked. Firewall protects your computers from malicious programs either from outside Internet connection or from within networks incoming into your system.

i. Configuring Firewall Protection

To configure Firewall Protection, follow these steps:

  1. Open Quick Heal Total Security.
  2. On the left pane, navigate to Protection > Wi-Fi Internet and then click the > icon for Firewall Protection .
  3. Turn Firewall Protection on or off by using the toggle button.
    By default, Firewall Protection is turned on.
  4. To enable monitoring of unsafe Wi-Fi Networks, select the option for Monitor Wi-Fi Networks.

    If you have enabled this option and try to connect to the unsecured Wi-Fi connections, an alert will be shown. You can decide whether you want to connect to such unsecured connections.

ii. Application Access Rules

  1. Open Quick Heal Total Security.
  1. On the left pane, navigate to Protection > Wi-Fi/Internet > Application Access Rules, click Create Rule.
  1. Select the option to allow only trustworthy programs and set the firewall level as required.
  • Trustworthy programs are those programs that are verified and their identity is known while untrustworthy programs are those ones that are not verified or are suspicious.

    Malicious programs mask their identity to run a covert operation. Such programs may be harmful to the network and computers.

  • Firewall security level can be set as follows:
    • Low: Allows all incoming and outgoing connections.
    • Medium: Monitors incoming traffic and displays the message as per suspicious behavior of an application.
    • High: Monitors both incoming and outgoing traffics and displays the message as per suspicious behavior of an application.
    • Block all: Blocks all incoming and outgoing connections. If you set this security level, Internet connection for all applications including Quick Heal antivirus will be blocked. For example, Quick Heal update and sending system information among other features may not work.
  1. Click + Add and browse to select the program files to configure the access rules. The selected program is added to the list.
  1. Toggle the access buttons for the listed programs to turn access on or off as required.
  1. Click OK.

iii. Network Settings

    Network Connections

    You can configure network profile settings and traffic rules for applications to connect to the Internet. You can assign the profile settings to the network connection as required.

    1. Open Quick Heal Total Security.
    2. On the left pane, navigate to Protection > Wi-Fi/Internet > Firewall Protection > Network Settings.
    3. Click Configure .

    By default, the network connection, IP, status and the assigned network profile are displayed. With Network Connections, you can set a Firewall profile for network connections. Under Network Profile Settings, you can see the following settings.

    Settings Description
    Network Profile Home: All incoming and outgoing connections are allowed except exceptions.
    Work: All incoming and outgoing connections are allowed except exceptions.
    Public: All incoming and outgoing connections are allowed except exceptions.
    Restricted: All incoming and outgoing connections are blocked except exceptions.
    Note: The logic for network profile may be changed based on your requirement. For example, if a network environment is considered less risky, you may turn stealth mode on or off. Similarly, you may allow or block sharing of the file and printer. The default setting is ideal for required security.
    Stealth Mode Enabling Stealth Mode hides the system in the network making it invisible to others thus preventing attacks.
    File & Printer Sharing Allowing this option will enable you to share file and printer between other users and you. With sharing of file and printer, the files may be accessed by unauthorized entities.

    Traffic Rules

    With Traffic Rules, you can allow or block network traffic. You can add exception to allow or deny incoming and outgoing communications through IP addresses and ports.

    To configure a policy, follow these steps:

    1. On the Newtork Settings screen, click the Traffic Rules tab.
    2. Click the Add button.
    3. In the Exception Name text box, write a rule name and then select a protocol. Click Next.

      The protocol includes: TCP, UDP, and ICMP.

    4. Under Local IP Address, select either Any IP Address, IP Address, or IP Address Range. Type the IP Address accordingly and then click Next.
    5. Under Local TCP/UDP Ports, select either All Ports, Specific Port(s), or Port Range. Type the Ports accordingly and then click Next.
    6. Under Remote IP Address, select either Any IP Address, IP Address, or IP Address Range. Type the IP Address accordingly and then click Next.
    7. Under Remote TCP/UDP Ports, select either All Ports, Specific Port(s), or Port Range. Type the Ports accordingly and then click Next.
    8. Under Select Action, select either Allow or Deny.
    9. Under Network Profile, select either or a combination of the profile options such as Home, Public, Work, or Restricted.
    10. Click Finish.

    The following table describes the buttons and their functions.

    Buttons Description
    Add Helps you create an exception rule.
    Remove Helps you delete an exception rule from the list. Select the rule and then click Delete.
    Up Helps you move a rule upward to arrange according to your preference.
    Down Helps you move a rule downward to arrange according to your preference.
    Default Helps you set the rules to default settings.
    OK Helps you save your settings.
    Cancel Helps you cancel your settings and close the Advanced Settings dialog.
    Display Alert Message Enabling this option will give you an alert message if any of the exception traffic rule is violated.
Was this page helpful?