Application Support Problems

Some applications and protocols you currently use may require some sort of support to be able to work seamlessly behind the firewall. If you have trouble making your applications work behind the firewall it is likely that you have to do some change of the configuration in the security profile (High, Low or AltConf) you are using.

The Internet Gate firewall works like a barrier to protect your computer or private network. Generally, applications that are initiated from the inside LAN are considered to be less “dangerous” than application attempts that are reaching the Internet Gate from the outside (WAN). Consequently, the security profile High (and AltConf) allows a few applications (“surf”, e-mail) to be used from the inside going out, but none at all from the outside. The profile Low is a bit less strict as it allows all applications (using TCP and UDP) started from the inside but still none from the outside. Thus, despite its name, Low is still a fairly safe profile.

These are the quite tight settings by factory, and they may be changed as the user opens up “holes” in the firewall, typically port numbers that allow applications to be initiated from the inside, and possibly also servers on the LAN to be accessed from the outside. It is good policy to stick to the more strict High or AltConf profiles, possibly adapting AltConf profile to one's needs. One can keep the Low as a more open profile that can be switched to temporarily when troubleshooting or when trying to run an application that does not work under the High or AltConf restrictions.

Switching between security profiles is quick and easy, using the ALT frontpanel key. See also here about the security profiles.

:!: Opening up the firewall should be done with care.

Making it work

If you have problems running an application or service behind the firewall:

:!: It is potentially more “dangerous” to enter port redirections (from outside-to-inside) than just opening up ports/protocols from the inside.

:?: For some applications that don't have a built-in support in the Internet Gate, none of the above measures might be sufficient. In these cases, an IP redirection or an Additional rule can be considered. This is generally for the more experienced user.

:!: If you have used the firewall log for experimenting as described above, please remember to shut it off again on the log configuration page.