Print

Previous

Next

Zones provide Application Control as outbound protection

Whenever a program requests access permission or server permission, it is trying to communicate with a computer or network in a specific Zone. For each program you can grant or deny the following permissions:

  • Access permission for the Trusted Zone.
  • Access permission for the Public Zone.
  • Server permission for the Trusted Zone.
  • Server permission for the Public Zone.

By granting access or server permission for the Trusted Zone, you enable a program to communicate only with the computers and networks you have put in that Zone. This is a highly secure strategy. Even if a program is tampered with, or given permission accidentally, it can only communicate with a limited number of networks or computers.

By granting access or server permission for the Public Zone, however, you enable a program to communicate with any computer or network, anywhere.

Note - Advanced users can specify the ports and protocols a particular program can use, the hosts it can access, and other details. For more information, see Creating an expert rule for a Program.

See Also

Firewall zone basics

 
©2011 Check Point Software Technologies Ltd. All rights reserved. Some features are only in premium products