|
Firewall Policy Overview
ReaSoft Network Firewall allows you to create your network security policy based on Firewall Policy rules. There are two types of Firewall Policy rules: Access Rules and Redirect Rules. Firewall Policy rules together with Network rules completely define the access policy of clients (including the ReaSoft Network Firewall host) to resources in other networks.
What is a firewall A firewall is a complex software system that is designed to control client access from one network to another. You can use a firewall to specify which information resources clients can use. It protects computers and servers on your network against malicious access. A set of rules that permit or deny access from one network to another constitute a Firewall Policy. To ensure protection against malicious access, ReaSoft Network Firewall performs Stateful packet inspection (the ACC technology). Stateful inspection provides enhanced security by keeping track of the state of network connections over a period of time. Only packets matching a known connection state will be allowed by the firewall; others will be rejected. How firewall rules work ReaSoft Network Firewall uses Firewall Policy rules (Access and Redirect) and Network rules to completely specify the rules of client access from one network to another. While processing a connection request, ReaSoft Network Firewall checks Network rules and Firewall Policy rules to decide if the access is forbidden or not. Network rules and Firewall rules are arranged in the form of ordered lists (chains). Once a connection request is received, ReaSoft Network Firewall first checks Network rules to determine the type of network relationship (NAT or Route). If no connection between networks is specified, the connection will be blocked. If it finds the network relationship rule, ReaSoft Network Firewall checks Firewall Policy rules one by one to determine if the administrator allows this connection. If there is a permitting rule set for the connection in the list of Firewall Policy rules, it will be allowed. The list of Firewall rules contains one built-in rule that blocks the entire traffic. This rule is located at the very end of the list. If there is no permitting rule set for the connection, the last default rule will be applied to it and it will be blocked. Example
Create a Firewall Policy rule |
|
affordable and business-ready solutions
For fastest service you can purchase ReaSoft Network Firewall from our secure online store:
ReaSoft Network Firewall additional info
News-list:
product updates, new releases
|
reaConverter Online
Downloads
ReaSoft Store
Technical Support
Contact Us
Site Map
Copyright © 2001-2024 ReaSoft Development.
All rights reserved. Use of this website signifies your agreement to the Online Privacy Policy. |