Navigation:  Settings > Firewall >


Previous pageReturn to chapter overviewNext page

Here you can specify whether, when and how the firewall should query users when programs request a connection to the Internet or network.

Define rule: If the firewall detects a connection being made to the network, an information box appears in which you specify how to proceed for this particular application. Specify here precisely how to proceed in terms of allowing or forbidding network access:


Per Application: This enables you to specify general authorisation or denial of network access by the currently selected application on any port and using any transfer protocol (e.g. TCP or UDP).


Per Protocol/Port/Application: The application requesting network access is only permitted to go online with the requested transfer protocol and on the specified port. If the same application requests an additional network connection on another port or using a different protocol, the query will appear again, allowing you to create another rule for it.


Per application, if at least __ inquiries are pending: There are some applications (e.g. Microsoft Outlook) that simultaneously use several ports when querying a network or simultaneously use different protocols. Since this, for example, would cause several queries in the Per Protocol/Port/Application setting, you can specify here that applications should receive general enabling or refusal for network use as soon as you have allowed or denied connection by the user.

Unknown server applications: Applications that are not yet managed using a rule in the firewall may be handled in a different manner. The time of the inquiry lies within a certain latitude. If the server application goes to "on receipt", this means that it is waiting for a connection request as if on standby. Otherwise the query is only generated when the actual connection request is made.

Check for unprotected networks: Of course, a firewall can only function properly if all the networks accessed by the computer it is protecting can also be detected and monitored by it. Therefore you should always have this check enabled for unprotected networks.

Repeat application queries: You can bundle recurring requests for connection of an application. This way, queries do not keep appearing during connection attempts for which you have not yet specified a rule, but rather only in e.g. 20-second intervals or some other period of time defined by you.