|
Click the numbers to learn about specific controls, or read an introduction. To reach this tab: 1. Go to Firewall / Main tab |
Use the Advanced Settings dialog box to establish global network and security settings.
Some companies require their employees to use ZoneAlarm Pro when connecting to the Internet through their corporate gateway. When this control is selected, ZoneAlarm Pro checks for any compatible gateways and confirms that it is installed, so that gateways requiring ZoneAlarm Pro will grant Internet access.
You can leave this control selected even if you are not connecting through a gateway; it will not affect your Internet functions.
If you are on a network that uses gateway enforcement, and this control is not selected, you will not be able to access the network.
If you are using Internet Connection Sharing, use these controls to configure ZoneAlarm Pro to recognize the ICS gateway and clients.
Use the radio buttons to Indicate whether your computer is an ICS client, or an ICS gateway. ZoneAlarm Pro automatically detects the IP address of the ICS gateway and displays it in the Address box . This box is labeled Local Address if you are the gateway, and Gateway Address if you are the client.
Note
For ICS clients running ZoneAlarm Pro to work properly, the ICS gateway must
run ZoneAlarm Pro as well.
You can determine whether the alerts that occur on an ICS network will be displayed and logged on the gateway, on the client, or on both.
If you are working on a client machine, select Forward alerts from gateway to this computer to have alerts that occur on the gateway computer appear and be logged on the client computer.
If you are working on a gateway, select Suppress alerts locally if forwarded to clients if you do not want alerts forwarded from the gateway to clients to also be displayed on the gateway.
For more information, see the related topic Internet Connection Sharing (ICS).
These controls apply global rules regarding certain protocols, packet types and other forms of traffic (such as server traffic) to both the Trusted Zone and the Internet Zone.
Control |
Function when selected |
Block all fragments |
Blocks all incomplete (fragmented) IP data packets. |
Block local servers |
Prevents all programs on your computer from acting as servers to the Trusted Zone. Note that this setting overrides permissions granted in the Programs panel. |
Block Internet servers |
Prevents all programs on your computer from acting as servers to the Internet Zone. Note that this setting overrides permissions granted in the Programs panel. |
Enable ARP protection |
Blocks all incoming ARP (Address Resolution Protocol) requests except broadcast requests for the address of the target machine. Also blocks all incoming ARP replies except those in response to outgoing ARP requests. |
Allow VPN Protocols at high security |
Allows the use of VPN protocols (ESP, AH, GRE) even when high security is applied. When this control is not selected, these protocols are allowed only at medium security. |
Allow uncommon protocols at high security |
Allows the use of uncommon protocols. When this control is not selected, these protocols are allowed only at medium security. |
Disable Keyboard and Mouse Protection | Turns off the keyboard and mouse protection feature. |
Automatic network detection helps you configure your Trusted Zone easily, so that traditional local network activities such as file and printer sharing aren't interrupted.
You can have ZoneAlarm Pro silently include or exclude every detected network in the Trusted Zone; or ask you in each case whether the newly-detected network should be added.
Note
ZoneAlarm Pro detects only networks that you are physically connected to. Routed
or virtual network connects are not detected.
ICS (Internet Connection Sharing)
gateway
In networking, a combination of hardware and software that links two different
types of networks. For example, if you are on a home or business Local Area
Network (LAN), a gateway enables the computers on your network to communicate
with the Internet.
ICS (Internet Connection Sharing)
ICS is a service provided by the Windows operating system that enables networked
computers to share a single connection to the Internet.
act as a server
A program acts as a server when it "listens" for connection requests
from other computers. Several common types of applications, such as chat programs,
e-mail clients, and Internet Call Waiting programs, may need to act as servers
to operate properly. However, some hacker programs act as servers to listen
for instructions from their creators.
ZoneAlarm Pro prevents programs on your computer from acting as servers unless you grant server permission.
Virtual Private Network (VPN)
A network that is constructed by using public wires to connect nodes. When using
VPN over the Internet, encryption and other security mechanisms are used to
ensure that only authorized users can access the network and the data.