Set up of router

Discussion in 'LnS English Forum' started by Escalader, May 8, 2007.

Thread Status:
Not open for further replies.
  1. Escalader

    Escalader Registered Member

    Joined:
    Dec 12, 2005
    Posts:
    3,710
    Location:
    Land of the Mooses
    How does LnS deal with routers?

    I mean does it do what ZA does and assume the router should be in the "trusted zone" or is it treated as outside your PC and thus should be treated just like any other device on the internet?

    On outbound control is it variable security depending on the program or is it a macro setting for all programs?

    Sorry for being a newbie so answer when you feel like it...:oops:
     
  2. Climenole

    Climenole Look 'n' Stop Expert

    Joined:
    Jun 3, 2005
    Posts:
    1,640
    Hi Escalader :)

    Like this:
    https://www.wilderssecurity.com/showthread.php?t=9474

    A router is treated as it is: a device connected ton the PC and exchanging packets with this PC.

    Shortly, there is 2 kind of packets : IGMP and UDP packets.

    A router is a local device not an internet device. All comunications between the PC and the router are done locally only. This is controlled via the rules parameters such as the local IP addresses of this device... ( The MAC addresses may also be used.)

    Here's the Non-routable IP over Internet:

    10.0.0.0 - 10.255.255.255

    169.254.0.0 - 169.254.255.255

    172.16.0.0 - 172.31.255.255

    192.168.0.0 - 192.168.255.255

    240.4.0.0 - 255.255.255.254 , range reserved by the IANA

    127.0.0.0 -127.255.255.255 reserved for local loopback.

    The four first IP addresses rande nay be use for local communication PC to router. The range depends on the brand and version of the router.

    There is no such things. LNS is a rules set firewall.
    The packets exchanged beteween the PC and internet are filtered via rules interpreted from the first in the list to the last...

    Each packet (incomming or outgoing) is examinded by the firewall and compared to each rules fronm the first in the list. When all criterias of the rules are matched by the examined packet, this rule is apply. If no rule at all correspond the last and mandatory rule block everythings...

    A rule set may look like this (one of my experimental rule set: normally less complex...) :
     

    Attached Files:

  3. Climenole

    Climenole Look 'n' Stop Expert

    Joined:
    Jun 3, 2005
    Posts:
    1,640
    Hi

    Please remark that the vast majority may used a more simple rule set.
    New rules for specific needs are already created and avalaible to import...
    (It looks complex but it's not.)

    Do not hesitate to aks questions...
     

    Attached Files:

Thread Status:
Not open for further replies.