Who's There? Firewall Advisor
User's Guide

Main Window

This chapter assumes that you are familiar with the material presented in Basic Concepts. This chapter describes the main window, shown in Figure 1 below. This window gives an overview of the data in the firewall's log file, and is always present while Who's There? is running.

The major components of the main window are:

Each component is discussed in its own section below.

Figure 1. Who's There? main window, access history

 

Data filters

You can control which firewall log lines are processed, using the popup menus in the upper left of the main window. See Figure 2 below.

Figure 2. View selection popup menus

The log lines to be processed can be specified:

The risk level assigned to a particular service is based solely on the particular service, and doesn't take into account other risk-related factors, such as those discussed in Investigating Accesses. Note that rating a service as high risk does not mean the service is inherently risky, only that a breach of security to that service could have serious results for the user. Stated risk levels represent Open Door's best analysis, but cannot be guaranteed to be correct. The risk levels selected with the risk level data filter are indicated in the risk levels popup menu by one or more risk icons.

high
medium
low
unknown

Table 1. Risk rating icons

Changing filter settings can change the number of log lines that Who's There? displays. The actual number of lines displayed is indicated at the bottom of the main window, along with the total number of lines in the log file.

 

Data view tabs

Using the tabs across the top of the main window, the way in which the data is viewed can be changed:

Figure 3. Tabs controlling the data view

Each type of view is covered in the following sections.

 

Access history detail

This is the view shown in Figure 1 above. In this view, lines from the log file are simply displayed, without summary. Each line usually corresponds to one attempt to access a service on the firewall machine, but can correspond to more than one such attempt if Don't show duplicates is checked. Only the lines selected by the data filter popups are displayed. The default columns are:

There are four other columns that can be displayed:

We should clarify a few of the above columns. When a user on another machine tries to access a service on your machine, they send one or more packets from their machine to yours. The IP address of their machine is the source IP address (column IP address) and the port from which they send the packets is the source port (column Src Port). The IP address of your machine is the destination IP address (column Dst IP Address) and the port to which they send the packets is the destination port (column Port), representing the service (column Service) which they are trying to access. Normally, out of these five columns, only three are of concern: IP address (who is trying to access your machine?), Port (what port are they trying to access?) and Service (what's the name of the service associated with the port). For example, say someone on a machine with an IP address of 10.0.0.27 tries to contact Personal File Sharing on your machine, which has an IP address of 192.168.1.222. The column values would read as follows:

Columns can be resized by dragging the right edge of a column header, and moved by dragging the column header. If you wish to omit certain columns, or add others, see Display Preferences.

There are two menu commands associated only with the Access history detail:

Sorting is controlled as described in the section on sorting.

 

Summary by service

This view, shown below in Figure 4, groups the data in the upper pane by service. Only the lines selected by the data filter popups are displayed. The lower pane displays summary information about each of the IP addresses that attempted to access a service selected in the upper pane.

Figure 4. Main window, summary by service

The columns in the upper pane are:

The columns in the lower pane are:

The horizontal divider between the upper and low panes can be moved by dragging the dot in the center of the bar. For example, in Figure 4 Windows Sharing is selected. The upper pane shows that there were no allowed attempts and 4 denied. In the lower pane, for each address from which access was attempted to Windows Sharing, we see a summary of allowed and denied attempts, and the most recent attempt. Sorting is controlled as described in the section on sorting. Columns in either pane can be resized by dragging the right edge of a column header, and moved by dragging the column header.

 

Summary by IP address

This view, shown below in Figure 5, groups the data in the upper pane by IP address. Only the lines selected by the data filter popups are displayed. The lower pane displays summary information about each of the services to which access was attempted from the IP address selected in the upper pane.

Figure 5. Main window, summary by IP address

The upper pane displays summary information about accessing IP addresses. The columns are:

The lower pane displays information about services to which access was attempted by the IP address selected in the upper pane. The columns are:

The horizontal divider between the upper and low panes can be moved by dragging the dot in the center of the bar. For example, in Figure 5 the IP address 192.168.1.7 is selected. The upper pane shows that there were no allowed attempts and 2 denied. In the lower pane, for each service to which access was attempted from 192.168.1.7, we see a summary of allowed and denied attempts, and the most recent attempt. Sorting is controlled as described in the section below on sorting. Columns in either pane can be resized by dragging the right edge of a column header, and moved by dragging the column header.

 

Sorting the data

Sort columns used in the upper and lower panes are independent. To sort by a given column, click on the column's heading. The current sort column is indicated by a blue heading. In Figure 5 above, the upper pane is sorted by IP address, and the lower pane by Port.

The sort sense (ascending or descending) is specified by the sort triangle at the right edge of the selected column heading. Who's There? applies the same meaning to the sort triangle as does the Finder. That is, ascending order is used when the triangle points up, descending when the triangle points down. The default sort order for each column is that which is most likely to be useful. Thus, the default sort order for accesses denied (and allowed) is descending, but for host names is ascending. The sort sense is toggled by clicking the sort triangle.

 

Action buttons

The action buttons are located in the upper right of the main window.

Figure 6. Action buttons

Note that each button will be active only if it makes sense for the selected item in the main window. For example, in Figure 4 only the Service info button is enabled, since the active selection is that of a service. Likewise, in Figure 5, the Service info button is not enabled, since the active selection is that of an IP address.

For details of the Who's There? dialog, please see Who's There? Dialog.

 

Extra information on services

Beyond what's in the Service Info pane of the Who's There? dialog, additional information on most services is available in Internet Security for Your Macintosh. If you select a service in any of the following three ways:

you can then request further information on the service by choosing "View eBook" from the Book menu, or typing Cmd-E. You can also click the eBook button in the Service Info dialog. Who's There? will display additional information on the service, if any, in your default browser. See Figure 7.

Figure 7. eBook entries on port 548

A list of relevant passages is displayed on the left, with the text of passages displayed on the right. If there is nothing in the book that corresponds to a service, you'll see a list of passages that relate to unknown services.

Exporting data

You can export to a text file the information displayed in any of the three views of the main window. Choose Export from the File menu, and specify a file name and location. Only the data actually displayed will be exported.


Back to Table of Contents
Back to Getting Started
Forward to Who's There? Dialog