very basic question regarding zonealarm free

Discussion in 'other firewalls' started by mr mister, May 11, 2008.

Thread Status:
Not open for further replies.
  1. mr mister

    mr mister Registered Member

    Joined:
    Nov 27, 2007
    Posts:
    47
    hi
    i just installed zonealarm free,but i don't understand this
    http://www.ida.liu.se/~iislab/projects/firewall-comparison/ZoneAlarm/Zone-ProgList.gif
    what does "access trusted" mean? what does this 'trusted' refer to?
    what does "access internet" mean? is it associated with those programs which need to connect to the internet such as a browser,antivirus,instant-messenger etc ?
    what does "server trusted" mean?
    what does "server internet" mean?

    i realise that these will seem like very basic questions to many people here,but i would be grateful if someone would offer even a brief explanation to me
    thank you.
     

    Attached Files:

  2. LowWaterMark

    LowWaterMark Administrator

    Joined:
    Aug 10, 2002
    Posts:
    18,280
    Location:
    New England
    The Trusted vs. Internet columns refer to "zones". With ZA you can define the world of all computers into two primary groups: those that are trusted by you; and all the others, which then fall into the Internet zone.

    The idea is that you might have a few computers on your own network that you consider trusted, or perhaps you want to trust your ISP's DNS or Email servers, so, you don't want to have as aggresive a set of firewall rules blocking you from accessing them or them from accessing you. But, at the same time, you may want much tighter rules for all other systems in the world, i.e. those out on the Internet. So, ZA allows you to define your rules differently for Trusted vs. Internet systems.

    The "Access" column in the Programs tab is where you: allow(checkmark), block(X) or make ask(?) each program's access out of your PC. If you set a program like Firefox to checkmark under Access for both Trusted and Internet, it means that it can browse out anywhere, to local/trusted systems or any other site on the Internet, without alerting you or asking for permission.

    The Server column deals with those programs being able to be connected into by systems out on the trusted network or Internet. If you put checkmarks in the server columns for programs, outside sites can connect into those programs without any blocking or alerting. That's generally not something you want, certainly not for the Internet zone. Although if you P2P, you would need to allow incoming connections to the P2P program for others to connect into your system. That's done by setting a checkmark under Server for the P2P program only.
     
  3. mr mister

    mr mister Registered Member

    Joined:
    Nov 27, 2007
    Posts:
    47
    thank you.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.