Security tab

Gateway SecurityInternet Connection SharingGeneral SettingsNetwork SettingsMailSafe Setting

Click the numbers to learn about specific controls, or read an introduction.

To reach this tab:

1. Go to Firewall / Main tab
2. Click the Advanced button.


Security tab (Advanced Settings dialog box)

Use the Advanced Settings dialog box to establish global network and security settings.

Related Topics

Back to top


Gateway Security

Some companies require their employees to use ZoneAlarm Pro when connecting to the Internet through their corporate gateway. When this control is selected, ZoneAlarm Pro checks for any compatible gateways and confirms that it is installed, so that gateways requiring ZoneAlarm Pro will grant Internet access.

You can leave this control selected even if you are not connecting through a gateway; it will not affect your Internet functions.

If you are on a network that uses gateway enforcement, and this control is not selected, you will not be able to access the network.

Related Topics

Back to top


Internet Connection Sharing

If you are using Internet Connection Sharing, use these controls to configure ZoneAlarm Pro to recognize the ICS gateway and clients.

Use the radio buttons to Indicate whether your computer is an ICS client, or an ICS gateway. ZoneAlarm Pro automatically detects the IP address of the ICS gateway and displays it in the Address box . This box is labeled Local Address if you are the gateway, and Gateway Address if you are the client.

Note For ICS clients running ZoneAlarm Pro to work properly, the ICS gateway must run ZoneAlarm Pro as well.

Alert forwarding

You can determine whether the alerts that occur on an ICS network will be displayed and logged on the gateway, on the client, or on both.

If you are working on a client machine, select Forward alerts from gateway to this computer to have alerts that occur on the gateway computer appear and be logged on the client computer.

If you are working on a gateway, select Suppress alerts locally if forwarded to clients if you do not want alerts forwarded from the gateway to clients to also be displayed on the gateway.

For more information, see the related topic Internet Connection Sharing (ICS).

Related Topics

Back to top


General Settings

These controls apply global rules regarding certain protocols, packet types and other forms of traffic (such as server traffic) to both the Trusted Zone and the Internet Zone.

Control

Function when selected

Block all fragments

Blocks all incomplete (fragmented) IP data packets.

Block local servers

Prevents all programs on your computer from acting as servers to the Trusted Zone. Note that this setting overrides permissions granted in the Programs panel.

Block Internet servers

Prevents all programs on your computer from acting as servers to the Internet Zone. Note that this setting overrides permissions granted in the Programs panel.

Enable ARP protection

Blocks all incoming ARP (Address Resolution Protocol) requests except broadcast requests for the address of the target machine. Also blocks all incoming ARP replies except those in response to outgoing ARP requests.

Allow VPN Protocols at high security

Allows the use of VPN protocols (ESP, AH, GRE) even when high security is applied. When this control is not selected, these protocols are allowed only at medium security.

Allow uncommon protocols at high security

Allows the use of uncommon protocols. When this control is not selected, these protocols are allowed only at medium security.

Disable Keyboard and Mouse Protection Turns off the keyboard and mouse protection feature.

Related Topics

Back to top


Network Settings

Automatic network detection helps you configure your Trusted Zone easily, so that traditional local network activities such as file and printer sharing aren't interrupted.

You can have ZoneAlarm Pro silently include or exclude every detected network in the Trusted Zone; or ask you in each case whether the newly-detected network should be added.

Note ZoneAlarm Pro detects only networks that you are physically connected to. Routed or virtual network connects are not detected.

Related Topics

Back to top


Related Topics

ICS (Internet Connection Sharing)

Back


Glossary

gateway
In networking, a combination of hardware and software that links two different types of networks. For example, if you are on a home or business Local Area Network (LAN), a gateway enables the computers on your network to communicate with the Internet.

Back

ICS (Internet Connection Sharing)
ICS is a service provided by the Windows operating system that enables networked computers to share a single connection to the Internet.

Back

act as a server
A program acts as a server when it "listens" for connection requests from other computers. Several common types of applications, such as chat programs, e-mail clients, and Internet Call Waiting programs, may need to act as servers to operate properly. However, some hacker programs act as servers to listen for instructions from their creators.

ZoneAlarm Pro prevents programs on your computer from acting as servers unless you grant server permission.

Back

Virtual Private Network (VPN)
A network that is constructed by using public wires to connect nodes. When using VPN over the Internet, encryption and other security mechanisms are used to ensure that only authorized users can access the network and the data.

Back