Quick links:
Product Overview
Installation
Settings and Administration
ADSL
SIP Support
Telephone ports
Network
Firewall
Wireless
VPN
Misc
Licenses
Troubleshooting
Some applications and protocols you currently use may require some sort of support to be able to work seamlessly behind the firewall. If you have trouble making your applications work behind the firewall it is likely that you have to do some change of the configuration in the security profile (High, Low or AltConf) you are using.
The Internet Gate firewall works like a barrier to protect your computer or private network. Generally, applications that are initiated from the inside LAN are considered to be less “dangerous” than application attempts that are reaching the Internet Gate from the outside (WAN). Consequently, the security profile High (and AltConf) allows a few applications (“surf”, e-mail) to be used from the inside going out, but none at all from the outside. The profile Low is a bit less strict as it allows all applications (using TCP and UDP) started from the inside but still none from the outside. Thus, despite its name, Low is still a fairly safe profile.
These are the quite tight settings by factory, and they may be changed as the user opens up “holes” in the firewall, typically port numbers that allow applications to be initiated from the inside, and possibly also servers on the LAN to be accessed from the outside. It is good policy to stick to the more strict High or AltConf profiles, possibly adapting AltConf profile to one's needs. One can keep the Low as a more open profile that can be switched to temporarily when troubleshooting or when trying to run an application that does not work under the High or AltConf restrictions.
Switching between security profiles is quick and easy, using the ALT
frontpanel key. See also here about the security profiles.
Opening up the firewall should be done with care.
If you have problems running an application or service behind the firewall:
DENY
and that seem to relate to your application's attempt. Read the port number in the Dest. column of the log, and also the protocol name in the Proto/Type column (TCP or UDP).DENY
entries in the log. Take notice of the protocol and (destination) port numbers in those entries, and try to verify that the entries really are resulting from requests to the desired application.
It is potentially more “dangerous” to enter port redirections (from outside-to-inside) than just opening up ports/protocols from the inside.
For some applications that don't have a built-in support in the Internet Gate, none of the above measures might be sufficient. In these cases, an IP redirection or an Additional rule can be considered. This is generally for the more experienced user.
If you have used the firewall log for experimenting as described above, please remember to shut it off again on the log configuration page.