Originariamente inviato da Arks
Kerio 2.1.5 e' ottimo per quello che fai,ma anche Sygate potrebbe.
Comunque io p.es. saro' sempre grato a 2.1.5 perche' attraverso questo firewal ho appreso cosa significhi fare Advanced Rules.
metodo:
I have also used kpf 2.1.5 before and am still using it in a Win98 partition. In fact, I have learned how to write advanced rules using kpf at first.
What I have learned in the case of kpf can be easily applied to SPFPro with minor modifications. However, let me say that my approach is to write rules that apply strictly to specific IP addresses (ranges of IP addresses in most cases), protocols, port numbers, traffic direction, and applications or services. Each rule is suggested by the firewall itself each time it asks you whether it may or may not go to a site for which no specific instructions exist, i.e. when it is placed in 'ask' mode.
I never adopt rules from external sources. Here is an example of why:
quote:
allow ICMP Type 0 incoming # And receive the replies
In theory this is harmless because you can get a ping in reply only when you ping first. In practice, a ping reply can be spoofed and a wholesale rule as the above would allow spoofed pings in from any and all sources. Hardly a worthwhile objective for any firewall.
Kpf 2.1.5 allows one to write rules on the fly, i.e. by clicking 'make an appropriate rule' followed by 'customize rule' and then sellecting the remote IP address and port number. Unfortunately, SPFPro does not allow this. As a result the process of writing advanced rules becomes more cumbersome.
The way I suggest is as follows: Write two advanced rules first. The first blocking all ICMP traffic. The second blocking all traffic. All other advanced rules you write subsequently will be placed in between these two rules.
With these two rules in place connect to the internet (and attempt to visit some website if you start with a blank home page). Of course no connection will be made. Next disconnect from the internet, go to the traffic log and identify the blocked outgoing connection. In all probability, it will be UDP traffic to your ISP's primary DNS server. Write an advanced rule allowing this traffic (UDP) to the IP address shown, in the direction shown (outgoing - later you will have to modify this to 'both ways' but let us get to it when the firewall itself tips you) and for the application /service shown. Place this rule above the 'deny all' rule, i.e., the second of the two rules you created initially.
Next connect to the internet again. Now the traffic that was earlier blocked (UDP to your ISP's primary DNS server) will go through but something else (UDP traffic from your ISP's primary DNS server) will be blocked. Write a new advanced rule (or better edit the previous rule to allow 'two-way' traffic) to allow this traffic and place it above the 'deny all' rule. Continuing in this manner, you will eventually complete your ruleset that allows you to visit the websites you normally visit and nothing else.
There are a lot of ramifications to this basic procedure. For example, a lot of sites you normally connect to employ not a single IP address but a range of IP addresses. You can use the excellent free utility Whois View (
http://www.whoisview.com/products/w...view_online.php)
to discover the relevant IP address range from the single IP address you see in your traffic log and modify your advanced rule accordingly. Eventually you will find it convenient to untick your 'deny all' rule at the end of your ruleset. For the moment though let it stay in effect to cut off all extraneous traffic.
If you carry this out to the end, you will construct your own ruleset applicable to you and your needs and guaranteeing more security than the wholesale settings most users rely on, in my opinion at least.