home *** CD-ROM | disk | FTP | other *** search
/ Chip 2006 December / chip-cd_2006_12.zip / 12 / Hity z okladki / Kaspersky Internet Security 6.0 / kis6.0.0.303pl.msi / en_ah.loc < prev    next >
Text File  |  2006-03-24  |  17KB  |  646 lines

  1. ;------------- anti-hacker enums --------------
  2.  
  3. [Global]
  4. $Anti_Hacker=Anti-Hacker
  5. $IDS=Intrusion Detection System
  6. $Firewall=Firewall
  7. $Stealth=Stealth Mode
  8.  
  9. $FwSpecifyAddr=<b>Enter the address</b>
  10. $FwSpecifyPort=<b>Enter the port</b>
  11. $FwSpecifyIcmpCode=<b>Enter the ICMP code</b>
  12. $FwSpecifyTimeRange=<b>specify the time range</b>
  13. $FwApp=for program
  14. $FwRemAddr=Remote address
  15. $FwRemPort=Remote port
  16. $FwLocAddr=Local address
  17. $FwLocPort=Local port
  18. $FwIcmpCode=ICMP code
  19. $FwTimeRng=Time range
  20. $FwCondition=where
  21. $FwAddr=Network IP address
  22. $FwMask=Subnet mask
  23. $FwZoneState=Zone status
  24. $FwStealth=Stealth mode
  25. $FwRuleDesc=Rule description (click underlined text to edit):
  26. $Fw_Trusted_Desc    =\n   Allow any connection
  27. $Fw_NetBIOS_Desc    =\n   Allow file and printer sharing (NetBIOS)\n   Allow error reporting (ICMP)\n   Apply rules for applications and packet filtering
  28. $Fw_Untrusted_Desc    =\n   Deny file and printer sharing (NetBIOS)\n   Deny error reporting (ICMP)\n   Apply rules for applications and packet filtering
  29. $FwInternetZoneDesc    =Default settings for all other connections
  30. $FwInternetZoneAddr =Internet
  31.  
  32. AttacksBlocked=Attacks blocked:
  33.  
  34. [IDSLocalPort]
  35. 0=
  36. default=on local port $(LocalPort)\
  37.  
  38. ;------------- anti-hacker --------------
  39.  
  40. [AH_Body]
  41. Status=Status
  42. Report=Statistics
  43. Monitor=Network Monitor
  44.  
  45. [Anti_Hacker_Status]
  46. StatusIDS=Intrusion Detection System:
  47. StatusFW=Firewall:
  48.  
  49. [Anti_Hacker_Monitor]
  50. ActiveApp=Active network applications:
  51. ActiveConn=Active network connections:
  52. OpenPorts=Open ports:
  53.  
  54. ;------------- SettingsWindow.Anti_Hacker -----------
  55.  
  56. [SettingsWindow.Anti_Hacker]
  57. StartupGroup=$General
  58. IDSSettingsGroup=Intrusion Detection System
  59.  
  60. [IDSSettings_Group]
  61. EnableIDS=Enable Intrusion Detection System
  62. IDSSettings=Settings...
  63.  
  64. [Firewall_Group]
  65. EnableFW=Enable Firewall
  66. Rules=Settings...
  67.  
  68. ;------------ SettingsWindow.Anti_Hacker.IDSSettings ------------
  69.  
  70. [SettingsWindow.Anti_Hacker.IDSSettings]
  71. dlg_caption=Intrusion Detection Settings
  72. BanCheck=Ban the attacking computer for
  73. BanLabel=min.
  74.  
  75. ;------------ Anti_Hacker_Localize ------------
  76.  
  77. [Anti_Hacker_Localize]
  78. ahfwAppRuleDefName=New application rule
  79. ahfwPacketRuleDefName=New packet rule
  80. ahfwAnyActivity=Any Activity
  81. ahfwKnownIp=This address
  82. ahfwCustom=Custom...
  83. ahfwAllowHostTCP=Allow Any TCP activity with specific host
  84. ahfwBlockHostTCP=Block Any TCP activity with specific host
  85. ahfwAllowHostUDP=Allow Any UDP activity with specific host
  86. ahfwBlockHostUDP=Block Any UDP activity with specific host
  87. ;-- presets names --
  88. fwpnAllow All=Allow All
  89. fwpnBlock All=Block All
  90. fwpnE-Mail Client=E-Mail Client
  91. fwpnBrowser=Browser
  92. fwpnDownload Manager=Download Manager
  93. fwpnFTP Client=FTP Client
  94. fwpnTelnet Client=Telnet Client
  95. fwpnTime Synchronizer=Time Synchronizer
  96.  
  97. ;------------ SettingsWindow.Anti_Hacker.Rules ------------
  98.  
  99. [SettingsWindow.Anti_Hacker.Rules]
  100. dlg_caption=Rules: Anti-Hacker
  101. GroupCheck=Group the rules by application
  102. fwImpBadApp=Can't find application $(strVal1). Do you wish to find it manually?
  103. fwImpBadAppCaption=Settings: Cannot import rule(s)
  104.  
  105. [Anti_Hacker_Tab]
  106. AppRules=Rules for Applications
  107. PacketRules=Rules for Packet Filtering
  108. Networks=Zones
  109. WorkMode=Other
  110.  
  111. AppGrpList=tt($(AppName))
  112. AppList=tt(Application: $(AppName)\nRule name: $(Name)\nAction: $(Blocking,FwAllowBlock)\nProtocol: $(Proto,FwProtocols)\nDirection: $(Direction,FwDirection)\nRemote Ports: $(RemotePorts)\nRemoteAddress: $(RemoteAddresses)\nLocal Ports: $(LocalPorts)\nNotify: $(Warning,OnOff)\nLog: $(Log,OnOff))
  113. PortList=tt(Rule name: $(Name)\nNotify: $(Warning,OnOff)\nLog: $(Log,OnOff))
  114.  
  115. [Anti_Hacker_AppRules_Group.AppGrpList]
  116. App=Application
  117. CmdLine=Command Line
  118. Location=Folder
  119. RulesNo=Rules
  120.  
  121. [Anti_Hacker_AppRules_Branch.AppList]
  122. App=Application
  123. CmdLine=Command Line
  124. Location=Folder
  125. Name=Rule Name
  126. Action=Action
  127. Protocol=Protocol
  128. Direction=Direction
  129. RemotePorts=Remote Ports
  130. RemoteAddresses=Remote Addresses
  131. LocalPorts=Local Ports
  132. Log=Log
  133. Alert=Warning
  134.  
  135. [Anti_Hacker_PacketRules]
  136. Export=Export...
  137. Import=Import...
  138.  
  139. [Anti_Hacker_PacketRules.PortList]
  140. Name=Rule Name
  141. Action=Action
  142. Protocol=Protocol
  143. Direction=Direction
  144. RemotePorts=Remote Ports
  145. RemoteAddresses=Remote Addresses
  146. LocalPorts=Local Ports
  147. LocalAddresses=Local Addresses
  148. Log=Log
  149. Alert=Warning
  150.  
  151. [Anti_Hacker_Networks]
  152. Refind=Refresh
  153.  
  154. [Anti_Hacker_Networks.NetList]
  155. Desc=Description
  156. Network=Zone
  157. Severity=Status
  158. Stealthed=Stealth mode
  159.  
  160. [Anti_Hacker_WorkMode]
  161. Text1=Changing this setting will take effect after restarting Anti-Hacker
  162. WMGroup=Firewall Mode
  163. SafeMode=Maximum compatibility (recommended)
  164. SafeModeText=This mode provides maximum compatibility with most network applications, but it might cause an increase in response time in some network games
  165. FastMode=Maximum speed
  166. FastModeText=This mode provides minimum network gaming response time, but it might cause conflicts between Stealth Mode and some network applications like file sharing network clients
  167.  
  168. ;------------ FwZoneEdit ------------
  169.  
  170. [FwZoneEdit]
  171. dlg_caption=Zone Properties
  172. Text=Description:
  173. Text1=Subnet address:
  174. Text2=Subnet mask:
  175.  
  176. [FwZone_Group]
  177. Trusted=Trusted
  178. NetBIOS=Local network
  179. Untrusted=Internet
  180. Stealthed=Enable stealth mode
  181.  
  182. ;------------ FwAppRuleEdit ------------
  183.  
  184. [FwAppRuleEdit]
  185. dlg_caption=Edit Rules for $(AppName,objfile)
  186. UseCmdLine=Command line
  187. NameLabel=Application
  188. Browse=$Browse
  189. Preset=Preset...
  190. PDMRule=Control application content
  191.  
  192. [FwAppRuleEdit.Dlg.AppList]
  193. Name=Rule Name
  194.  
  195. ;------------ FwRuleElementEdit ------------
  196.  
  197. [FwRuleElementEdit]
  198. dlg_caption.new=New Rule
  199. dlg_caption=Edit Rule
  200. NameLabel=Rule name:
  201. PropLabel=Properties:
  202. ActionLabel=Additional action:
  203. Warning=Display warning
  204. Log=Log event
  205. ahfwErrNeedApp=Please select the application that this rule will handle.
  206. ahfwErrNeedProp=Please set values for the underlined bold items.
  207. ahfwErrNeedRuleName=Please enter a name for the rule.
  208.  
  209. ;------------ SettingsWindow.Anti_Hacker.Rules.FwProtocolEdit ------------
  210.  
  211. [SettingsWindow.Anti_Hacker.Rules.FwProtocolEdit]
  212. dlg_caption=Select Protocol
  213. Text=Please select a protocol:
  214.  
  215. ;------------ SettingsWindow.Anti_Hacker.Rules.FwIcmpMsgEdit ------------
  216.  
  217. [SettingsWindow.Anti_Hacker.Rules.FwIcmpMsgEdit]
  218. dlg_caption=Specify ICMP Packet
  219. Text=Please specify the type of ICMP messages to be filtered:
  220.  
  221. ;------------ SettingsWindow.Anti_Hacker.Rules.FwDirectionEdit ------------
  222.  
  223. [SettingsWindow.Anti_Hacker.Rules.FwDirectionEdit]
  224. dlg_caption=Select Direction
  225. Text=Please select the direction:
  226.  
  227. [Direction_Group]
  228. InboundStream=Inbound Stream
  229. Inbound=Inbound
  230. InboundOutbound=Inbound && Outbound
  231. Outbound=Outbound
  232. OutboundStream=Outbound Stream
  233.  
  234. ;------------ SettingsWindow.Anti_Hacker.Rules.FwTimeRangeEdit ------------
  235.  
  236. [SettingsWindow.Anti_Hacker.Rules.FwTimeRangeEdit]
  237. dlg_caption=Specify Time Range
  238. Text=Please specify the time range then the rule is active:
  239. From=From
  240. Till=Till
  241.  
  242. ;------------ SettingsWindow.Anti_Hacker.Rules.PortsListEdit ------------
  243.  
  244. [SettingsWindow.Anti_Hacker.Rules.PortsListEdit]
  245. dlg_caption=Firewall Rule: Edit Ports
  246. Text=Please specify the port or port range for the rule:
  247. Example=Example: 53, 8000-8080, 1900, 2234
  248.  
  249.  
  250. ;------------ SettingsWindow.Anti_Hacker.Rules.AddrsListEdit ------------
  251.  
  252. [SettingsWindow.Anti_Hacker.Rules.AddrsListEdit]
  253. dlg_caption=Firewall Rule: Edit Addresses
  254. Text1=Address type:
  255. Text2=Address:
  256. Text3=Addresses List:
  257. Add=Add
  258. Edit=Update
  259. ahfwErrInvalidAddress=Cannot resolve computer IP address, possibly due to incorrectly specified computer name.
  260.  
  261. [Address_Type]
  262. Computer=Computer address
  263. Range=Range of IP addresses
  264. Subnet=Subnet address
  265.  
  266. [Address_Single]
  267. Text=Symbolic name:
  268.  
  269. [Address_Range]
  270. Text1=Begins at:
  271. Text2=Ends on:
  272.  
  273. [Address_Subnet]
  274. Text1=Subnet address:
  275. Text2=Subnet mask:
  276.  
  277. ;------------ SettingsWindow.Anti_Hacker.ResolveIp ------------
  278.  
  279. [SettingsWindow.Anti_Hacker.ResolveIp]
  280. dlg_caption=Firewall Rule: Resolving IP Address
  281. Text=Resolving IP. Please wait...
  282.  
  283. ;------------------ ReportWindow -------------
  284.  
  285. [Report_Body.StatisticsLeft.antihacker]
  286. AttacksDetected=Attacks detected:
  287. AttackLastTime=Time of last attack:
  288.  
  289. [Report_Body_AttackStatus]
  290. 0=f(BoldInfo)No attacks detected.
  291. default=f(BoldError)An attempted attack has been detected!
  292.  
  293. [Report_Body.ReportDetails.antihacker]
  294. NetAttacks=Network attacks
  295. BannedHosts=Banned hosts
  296. AppEvents=Application activity
  297. PacketEvents=Packet filtering
  298.  
  299. [Report_Body.ReportDetails.antihacker.NetAttacks]
  300. ReportTime=Time
  301. Description=Attack description
  302. Source=Source
  303. Proto=Protocol
  304. LocalPort=Local port
  305.  
  306. [Report_Body.ReportDetails.antihacker.BannedHosts.BanList]
  307. Host=Host
  308. Time=Time
  309.  
  310. [Report_Body.ReportDetails.antihacker.BannedHosts.BanList.menu]
  311. Unban=Unban
  312.  
  313. [FwReportIcon2]
  314. 0=i(info)
  315. 1=i(warning)
  316.  
  317. [FwReportIcon]
  318. 0=$(IsBlocking,FwReportIcon2)
  319. 1=i(ok)
  320.  
  321. [Anti_Hacker_PacketIsBlocking]
  322. 0=granted
  323. 1=blocked
  324.  
  325. [Anti_Hacker_PacketIsIncoming]
  326. 0=outgoing
  327. 1=incoming
  328.  
  329. [Report_Body.ReportDetails.antihacker.AppEvents]
  330. AppName=Application name
  331. RuleName=Rule name
  332. CmdLine=Command line
  333. PID=Application PID
  334. IsBlocking=Action
  335. Direction=Direction
  336. Proto=Protocol
  337. RemoteAddress=Remote address
  338. RemotePort=Remote port
  339. LocalAddress=Local host
  340. LocalPort=Local port
  341. Time=Time
  342.  
  343. [Report_Body.ReportDetails.antihacker.PacketEvents]
  344. RuleName=Rule name
  345. IsBlocking=Action
  346. Direction=Direction
  347. Proto=Protocol
  348. RemoteAddress=Remote address
  349. RemotePort=Remote port
  350. LocalAddress=Local host
  351. LocalPort=Local port
  352. Time=Time
  353.  
  354. ;------------- AntiHacker Learn Dialog -----------
  355.  
  356. [AhLearnDialog]
  357. $AlertCaption=$Anti_Hacker training
  358. DontCheck=Turn off training mode...
  359. ErrLevelChanded=$Anti_Hacker will be set to Low security mode. Are you sure?
  360. ErrCantSaveRule=Cannot save the rule
  361.  
  362. [AhLearnDialog_Caption]
  363. 6 =TCP connection
  364. 17=UDP packet
  365.  
  366. [AhLearnDialog.Dlg]
  367. Info=$(Direction,FwDirectionReport) $(Proto,AhLearnDialog_Caption)
  368. Action=Action
  369.  
  370. [AhLearnDialog.Info]
  371. AppIcon=$(AppName,moduleicon)
  372. AppName=$(DisplayName)
  373. RemoteHost=Remote address:
  374. RemotePort=Remote port:
  375. LocalPort=Local port:
  376.  
  377. [AhLearnDialog.Action]
  378. Allow=&Allow
  379. Block=&Block
  380. Edit=Edit rules
  381. Rule=Remember this action
  382.  
  383. [AhLearnDialog.Details]
  384. AddInfo           = Connection properties
  385. $Description      = Description:
  386. $Connection       = Connection:
  387. $Direction        = Direction:\t\t\t
  388. $Protocol         = Protocol:\t\t\t
  389. $RemoteAddr       = Remote address:\t\t
  390. $RemotePort       = Remote port:\t\t
  391. $LocalPort        = Local port:\t\t
  392. $ProcessInfo      = Process information:
  393. $ProcessName      = Process name:\t\t
  394. $ProcessId        = Process ID:\t\t
  395. $AppFile          = Application file:\t\t
  396. $CmdLine          = Command line:\t\t
  397. $ManufacturerInfo = Manufacturer information:
  398. $Manufacturer     = Manufacturer:\t\t
  399. $AppVersion       = Application version:\t\t
  400. $FileVersion      = File version:\t\t
  401.  
  402. ;------------- AhNewNetworkDialog -----------
  403.  
  404. [AhNewNetworkDialog]
  405. $AlertCaption=$Anti_Hacker: New Network
  406. Info=New Network Found
  407. Action=Select network type
  408. Adapter=Adapter
  409. Ip=Ip
  410. Subnet=Subnet
  411. Trusted=Trusted network (allow any connection)
  412. NetBIOS=Local network (enable file and printer sharing)
  413. Untrusted=Internet (disable file and printer sharing)
  414. Stealth=Stealth Mode
  415.  
  416. ;------------- AhAppChangedDialog -----------
  417.  
  418. [AhAppChangedDialog]
  419. $AlertCaption=$Anti_Hacker
  420.  
  421. [AhAppChangedDialog.Dlg]
  422. Info=File Changed
  423. Action=Action
  424.  
  425. [AhAppChangedDialog.Info]
  426. ProcessName=Process name:
  427. ProcessId=Process ID:
  428. Manufacturer=Manufacturer:
  429. AppVersion=Version:
  430.  
  431. [AhAppChangedDialog.Action] 
  432. Info=Executable file has been changed. Should the program be granted network access?
  433. Allow=Allow
  434. Deny=Deny
  435.  
  436. [ah_Notify_PacketProto]
  437. 1=ICMP packet ($(IcmpCode,FwIcmp))
  438. 2=IGMP/RGMP packet
  439. 3=GGP packet
  440. ;4=IP in IP encapsulation
  441. 6=TCP packet
  442. 9=IGRP packet
  443. 17=UDP packet
  444. 47=GRE packet
  445. 50=ESP packet
  446. 51=AH packet
  447. 53=encrypted IP packet
  448. default=packet (protocol $(Proto))
  449.  
  450. ;------------- AntiHacker Baloon Messages -----------
  451.  
  452. [NotifyFwRules_Text]
  453. 1=$(AppName,objfile) was $(Proto,FwBaloonMsg.AppEventDesc) the address $(RemoteHostName,FwRemAddr), in accordance with the user defined rule '$(RuleName)',\nthe remote port is $(RemotePort)\nthe local port is $(LocalPort)
  454. 0=The $(Direction,FwDirectionReport) $(Proto,ah_Notify_PacketProto) $(Direction,FwBaloonMsg.PacketDir) was $(IsBlocking,FwBlocked) in accordance with the user defined rule '$(RuleName)'$(Proto,FwBaloonMsg.PacketPorts)
  455.  
  456. [FwBaloonMsg.AppEventDesc.TCP.AllowIn]
  457. 1=blocked against accepting
  458. 0=allowed to accept
  459.  
  460. [FwBaloonMsg.AppEventDesc.TCP.AllowOut]
  461. 1=blocked against connecting to
  462. 0=allowed to connect to
  463.  
  464. [FwBaloonMsg.AppEventDesc.UDP.AllowIn]
  465. 1=blocked against receiving
  466. 0=allowed to receive
  467.  
  468. [FwBaloonMsg.AppEventDesc.UDP.AllowOut]
  469. 1=blocked against sending
  470. 0=allowed to send
  471.  
  472. [FwBaloonMsg.AppEventDesc.TCP]
  473. $TCPAllowIn=$(IsBlocking,FwBaloonMsg.AppEventDesc.TCP.AllowIn) an incoming connection from
  474. $TCPAllowOut=$(IsBlocking,FwBaloonMsg.AppEventDesc.TCP.AllowOut) an outgoing connection to
  475. 1=$TCPAllowIn
  476. 4=$TCPAllowIn
  477. 2=$TCPAllowOut
  478. 5=$TCPAllowOut
  479.  
  480. [FwBaloonMsg.AppEventDesc.UDP]
  481. $UDPAllowIn=$(IsBlocking,FwBaloonMsg.AppEventDesc.UDP.AllowIn) an incoming UDP packet from
  482. $UDPAllowOut=$(IsBlocking,FwBaloonMsg.AppEventDesc.UDP.AllowOut) an outgoing UDP packet to
  483. 1=$UDPAllowIn
  484. 4=$UDPAllowIn
  485. 2=$UDPAllowOut
  486. 5=$UDPAllowOut
  487.  
  488. [FwBaloonMsg.AppEventDesc]
  489. 06=$(Direction,FwBaloonMsg.AppEventDesc.TCP)
  490. 17=$(Direction,FwBaloonMsg.AppEventDesc.UDP)
  491.  
  492. [FwBaloonMsg.PacketPorts]
  493. 06=,\nthe remote port: $(RemotePort)\nthe local port: $(LocalPort).
  494. 17=,\nthe remote port: $(RemotePort)\nthe local port: $(LocalPort).
  495. default=.
  496.  
  497. [FwBaloonMsg.PacketDir]
  498. $PacketDirIn=from the remote address $(RemoteHostName,FwRemAddr) to the local address $(LocalHostName,FwLocAddr)
  499. $PacketDirOut=from the local address $(LocalHostName,FwLocAddr) to the remote address $(RemoteHostName,FwRemAddr)
  500. 1=$PacketDirIn
  501. 4=$PacketDirIn
  502. 2=$PacketDirOut
  503. 5=$PacketDirOut
  504.  
  505. ;------------- Network Monitor -----------
  506.  
  507. [AntiHackerStatisticsWindow]
  508. dlg_caption=$Anti_Hacker Network Monitor
  509. AppTab=Established Connections
  510. PortsTab=Open Ports
  511. HostsTab=Traffic
  512.  
  513. [AhStatApp]
  514. ShowConnections=Show connections
  515. ShowPorts=Show open ports
  516.  
  517. [AhStatApp.AppList]
  518. App=Application
  519. CmdLine=Command line
  520. Proto=Protocol
  521. Direction=Direction
  522. LocalIP=Local address
  523. LocalPort=Local port
  524. RemoteIP=Remote address
  525. RemotePort=Remote port
  526. Duration=Duration
  527. BytesRecieved=Received
  528. BytesSent=Sent
  529.  
  530. [AhPortsTab.PortsList]
  531. App=Application
  532. CmdLine=Command line
  533. Proto=Protocol
  534. LocalIP=Local address
  535. LocalPort=Port
  536. Duration=Duration
  537.  
  538. [AhHostsTab.HostsList]
  539. Host=Host
  540. ip=IP address
  541. BytesRecieved=Received
  542. BytesSent=Sent
  543.  
  544. [AhStatApp.AppList.menu]
  545. CreateRule=Create a rule
  546. Disconnect=Drop this connection
  547.  
  548. ;------------- Fw Common Sections  -------------
  549.  
  550. [ShowUnknownIfEmpty]
  551. <empty>=<unknown>
  552. default=$(@)
  553.  
  554. [FwProtocols]
  555. 0=IP
  556. 1=ICMP
  557. 2=IGMP/RGMP
  558. 3=GGP
  559. ;4=IP in IP encapsulation
  560. 6=TCP
  561. 9=IGRP
  562. 17=UDP
  563. 47=GRE
  564. 50=ESP
  565. 51=AH
  566. 53=encrypted IP
  567. default=unknown protocol ($(Proto))
  568.  
  569. [FwBlocked]
  570. 0=allowed
  571. default=blocked
  572.  
  573. [FwAllowBlock]
  574. 0=Allow
  575. default=Block
  576.  
  577. [FwAllowsBlocks]
  578. 0=allows
  579. default=denies
  580.  
  581. [FwDirection]
  582. 1=in
  583. 2=out
  584. 3=both
  585. 4=in stream
  586. 5=out stream
  587.  
  588. [FwDirectionReport]
  589. 1=Inbound
  590. 2=Outbound
  591. 3=Both
  592. 4=Inbound
  593. 5=Outbound
  594.  
  595. [FwInOut]
  596. 1=Inbound
  597. 2=Outbound
  598. 3=Inbound & Outbound
  599. 4=Inbound (stream)
  600. 5=Outbound (stream)
  601.  
  602. [FwRuleEnabled]
  603. 0=<b>Rule is temporary disabled</b>.\n
  604.  
  605. [FwRuleLog]
  606. 0=$(Warning,FwRuleWarning)
  607. 1=$(Warning,FwRuleWarningWithLog)
  608.  
  609. [FwRuleWarning]
  610. 1=<b>The user will be notified when the rule is applied</b>.
  611.  
  612. [FwRuleWarningWithLog]
  613. 0=<b>The event will be logged when the rule is applied</b>.
  614. 1=<b>When the rule is applied the event will be logged and the user will be notified</b>.
  615.  
  616. [FwProtoConnection]
  617. 6=connection
  618. default=packet
  619.  
  620. [FwZoneSeverity]
  621. #Fw_fwnzTrusted=Trusted
  622. #Fw_fwnzNetBIOS=Local network
  623. #Fw_fwnzUntrusted=Internet
  624.  
  625. ;------------- FWLevelGroup -----------
  626.  
  627. [FWLevelBlockAll]
  628. HeaderText=Block All
  629. BodyText=Prevent my computer from accessing\nthe Internet or local network.\nAll connection attempts will be blocked.
  630.  
  631. [FWLevelRejectNotFiltered]
  632. HeaderText=High Security
  633. BodyText=Block all connections\nnot permitted by the rules.\nThe training prompt will not appear.
  634.  
  635. [FWLevelAskUser]
  636. HeaderText=Training Mode
  637. BodyText=The training prompt appears if any\napplication attempts to connect to the local\nnetwork or the Internet.
  638.  
  639. [FWLevelAllowNotFiltered]
  640. HeaderText=Low Security
  641. BodyText=Allow network activity of all applications\nexcept those explicitly prohibited by\nuser-defined application rules.
  642.  
  643. [FWLevelAllowAll]
  644. HeaderText=Allow All
  645. BodyText=All network activity is allowed.
  646.