Firewall shields your system from intruders and hackers by monitoring and filtering incoming and outgoing network traffic.
Any suspicious program that may be harmful to your computers or systems is blocked. Firewall protects your computers from malicious programs either from outside Internet connection or from within networks incoming into your system.
i. Configuring Firewall Protection
To configure Firewall Protection, follow these steps:
- Open Quick Heal Total Security.
- On the left pane, navigate to Protection > Wi-Fi Internet and then click the > icon for Firewall Protection .
- Turn Firewall Protection on or off by using the toggle button.
By default, Firewall Protection is turned on. - To enable monitoring of unsafe Wi-Fi Networks, select the option for Monitor Wi-Fi Networks.
If you have enabled this option and try to connect to the unsecured Wi-Fi connections, an alert will be shown. You can decide whether you want to connect to such unsecured connections.
ii. Application Access Rules
- Open Quick Heal Total Security.
- On the left pane, navigate to Protection > Wi-Fi/Internet > Application Access Rules, click Create Rule.
- Select the option to allow only trustworthy programs and set the firewall level as required.
- Trustworthy programs are those programs that are verified and their identity is known while untrustworthy programs are those ones that are not verified or are suspicious.
Malicious programs mask their identity to run a covert operation. Such programs may be harmful to the network and computers.
- Firewall security level can be set as follows:
- Low: Allows all incoming and outgoing connections.
- Medium: Monitors incoming traffic and displays the message as per suspicious behavior of an application.
- High: Monitors both incoming and outgoing traffics and displays the message as per suspicious behavior of an application.
- Block all: Blocks all incoming and outgoing connections. If you set this security level, Internet connection for all applications including Quick Heal antivirus will be blocked. For example, Quick Heal update and sending system information among other features may not work.
- Click + Add and browse to select the program files to configure the access rules. The selected program is added to the list.
- Toggle the access buttons for the listed programs to turn access on or off as required.
- Click OK.
iii. Network Settings
- Open Quick Heal Total Security.
- On the left pane, navigate to Protection > Wi-Fi/Internet > Firewall Protection > Network Settings.
- Click Configure .
- On the Newtork Settings screen, click the Traffic Rules tab.
- Click the Add button.
- In the Exception Name text box, write a rule name and then select a protocol. Click Next.
The protocol includes: TCP, UDP, and ICMP.
- Under Local IP Address, select either Any IP Address, IP Address, or IP Address Range. Type the IP Address accordingly and then click Next.
- Under Local TCP/UDP Ports, select either All Ports, Specific Port(s), or Port Range. Type the Ports accordingly and then click Next.
- Under Remote IP Address, select either Any IP Address, IP Address, or IP Address Range. Type the IP Address accordingly and then click Next.
- Under Remote TCP/UDP Ports, select either All Ports, Specific Port(s), or Port Range. Type the Ports accordingly and then click Next.
- Under Select Action, select either Allow or Deny.
- Under Network Profile, select either or a combination of the profile options such as Home, Public, Work, or Restricted.
- Click Finish.
Network Connections
You can configure network profile settings and traffic rules for applications to connect to the Internet. You can assign the profile settings to the network connection as required.
By default, the network connection, IP, status and the assigned network profile are displayed. With Network Connections, you can set a Firewall profile for network connections. Under Network Profile Settings, you can see the following settings.
Settings | Description |
---|---|
Network Profile | Home: All incoming and outgoing connections are allowed except exceptions. Work: All incoming and outgoing connections are allowed except exceptions. Public: All incoming and outgoing connections are allowed except exceptions. Restricted: All incoming and outgoing connections are blocked except exceptions. Note: The logic for network profile may be changed based on your requirement. For example, if a network environment is considered less risky, you may turn stealth mode on or off. Similarly, you may allow or block sharing of the file and printer. The default setting is ideal for required security. |
Stealth Mode | Enabling Stealth Mode hides the system in the network making it invisible to others thus preventing attacks. |
File & Printer Sharing | Allowing this option will enable you to share file and printer between other users and you. With sharing of file and printer, the files may be accessed by unauthorized entities. |
Traffic Rules
With Traffic Rules, you can allow or block network traffic. You can add exception to allow or deny incoming and outgoing communications through IP addresses and ports.
To configure a policy, follow these steps:
The following table describes the buttons and their functions.
Buttons | Description |
---|---|
Add | Helps you create an exception rule. |
Remove | Helps you delete an exception rule from the list. Select the rule and then click Delete. |
Up | Helps you move a rule upward to arrange according to your preference. |
Down | Helps you move a rule downward to arrange according to your preference. |
Default | Helps you set the rules to default settings. |
OK | Helps you save your settings. |
Cancel | Helps you cancel your settings and close the Advanced Settings dialog. |
Display Alert Message | Enabling this option will give you an alert message if any of the exception traffic rule is violated. |