ZoneAlarm Pro高安全如何設定轉送不被封鎖【求助】



贊助商連結


ivyserver
2003-01-29, 05:09 PM
我們公司使用ZoneAlarm Pro設成高安全性
發現只要"方向"為轉送的情況時
PORT不管是TCP或UDP方向轉送被封鎖
常常有不少PORT 25或110之類的尚被封鎖住
導致員工的電腦無法正確的收信與寄信
公司的E-mail也在ZoneAlarm Pro防火牆底下
除非改設中安全性才可正常
而在高安全性時,我確定有正確的加上了
UDP TCD 110 25上行跟下行都可通過,但就是沒有轉送
因為跟本沒有轉送的PORT可讓我設定
那請問一下ZoneAlarm Pro設高安全性時…
要如何讓轉送的PORT正常通過

贊助商連結


shauronglu
2003-01-30, 03:16 PM
回答過了, 請不要重複發問

煙蟲
2003-01-30, 11:39 PM
說實在小弟也不懂你的問題如何解決,只能從ZAP的HELP檔複製下來,讓你參考,另外一點,E-mail Protection這個選項應該是當你收MAIL時,去針對一些病毒,以及帶有不安全程式碼所做的保護,跟能不能收信無關.

Click the numbers to learn about specific controls, or read an introduction.

To reach this tab:

1. Go to Firewall / Main tab
2. Click the Advanced button.


--------------------------------------------------------------------------------

Security tab (Advanced Settings dialog box)
Use the Advanced Settings dialog box to establish global network and security settings.

Related Topics
Back to top


--------------------------------------------------------------------------------

Gateway Security
Some companies require their employees to use ZoneAlarm Pro when connecting to the Internet through their corporate gateway. When this control is selected, ZoneAlarm Pro checks for any compatible gateways and confirms that it is installed, so that gateways requiring ZoneAlarm Pro will grant Internet access.

You can leave this control selected even if you are not connecting through a gateway; it will not affect your Internet functions.

If you are on a network that uses gateway enforcement, and this control is not selected, you will not be able to access the network.

Related Topics
Back to top


--------------------------------------------------------------------------------

Internet Connection Sharing
If you are using Internet Connection Sharing, use these controls to configure ZoneAlarm Pro to recognize the ICS gateway and clients.

Use the radio buttons to Indicate whether your computer is an ICS client, or an ICS gateway. ZoneAlarm Pro automatically detects the IP address of the ICS gateway and displays it in the Address box . This box is labeled Local Address if you are the gateway, and Gateway Address if you are the client.

Note For ICS clients running ZoneAlarm Pro to work properly, the ICS gateway must run ZoneAlarm Pro as well.

Alert forwarding
You can determine whether the alerts that occur on an ICS network will be displayed and logged on the gateway, on the client, or on both.

If you are working on a client machine, select Forward alerts from gateway to this computer to have alerts that occur on the gateway computer appear and be logged on the client computer.

If you are working on a gateway, select Suppress alerts locally if forwarded to clients if you do not want alerts forwarded from the gateway to clients to also be displayed on the gateway.

For more information, see the related topic Internet Connection Sharing (ICS).

Related Topics
Back to top




--------------------------------------------------------------------------------

General Settings
These controls apply global rules regarding certain protocols, packet types and other forms of traffic (such as server traffic) to both the Trusted Zone and the Internet Zone.

Control
Function when selected

Block all fragments
Blocks all incomplete (fragmented) IP data packets.

Block local servers
Prevents all programs on your computer from acting as servers to the Trusted Zone. Note that this setting overrides permissions granted in the Programs panel.

Block Internet servers
Prevents all programs on your computer from acting as servers to the Internet Zone. Note that this setting overrides permissions granted in the Programs panel.

Enable ARP protection
Blocks all incoming ARP (Address Resolution Protocol) requests except broadcast requests for the address of the target machine. Also blocks all incoming ARP replies except those in response to outgoing ARP requests.

Allow VPN Protocols at high security
Allows the use of VPN protocols (ESP, AH, GRE) even when high security is applied. When this control is not selected, these protocols are allowed only at medium security.

Allow uncommon protocols at high security
Allows the use of uncommon protocols. When this control is not selected, these protocols are allowed only at medium security.

Related Topics
Back to top


--------------------------------------------------------------------------------

Network Settings
Automatic network detection helps you configure your Trusted Zone easily, so that traditional local network activities such as file and printer sharing aren't interrupted.

You can have ZoneAlarm Pro silently include or exclude every detected network in the Trusted Zone; or ask you in each case whether the newly-detected network should be added.

Note ZoneAlarm Pro detects only networks that you are physically connected to. Routed or virtual network connects are not detected.

Related Topics
Back to top




--------------------------------------------------------------------------------

Related Topics
ICS (Internet Connection Sharing)

Back


--------------------------------------------------------------------------------

Glossary
gateway
In networking, a combination of hardware and software that links two different types of networks. For example, if you are on a home or business Local Area Network (LAN), a gateway enables the computers on your network to communicate with the Internet.

Back


ICS (Internet Connection Sharing)
ICS is a service provided by the Windows operating system that enables networked computers to share a single connection to the Internet.

Back


act as a server
A program acts as a server when it "listens" for connection requests from other computers. Several common types of applications, such as chat programs, e-mail clients, and Internet Call Waiting programs, may need to act as servers to operate properly. However, some hacker programs act as servers to listen for instructions from their creators.

ZoneAlarm Pro prevents programs on your computer from acting as servers unless you grant server permission.

Back


Virtual Private Network (VPN)
A network that is constructed by using public wires to connect nodes. When using VPN over the Internet, encryption and other security mechanisms are used to ensure that only authorized users can access the network and the data.

ivyserver
2003-01-31, 10:43 AM
最初由 煙蟲 發表
說實在小弟也不懂你的問題如何解決,只能從ZAP的HELP檔複製下來,讓你參考,另外一點,E-mail Protection這個選項應該是當你收MAIL時,去針對一些病毒,以及帶有不安全程式碼所做的保護,跟能不能收信無關.

它的設定就是讓我感覺說,中安全性跟高安全性
除了可以讓我們手動修改的設定以外
好像還有些內部的設定值是我們無法去變更的