Advanced firewall

The built-in UserGate firewall provides additional LAN protection against hacker attacks and other sophisticated types of protocol-based intrusions by blocking traffic going through particular ports (TCP, UDP, or any other Internet protocol).

Ports specified in the proxy settings (HTTP, FTP, SOCKS, etc.), as well as ports specified in Port Mapping, are included in automatically generated firewall rules (type auto).

UserGates firewall system also processes packets not processed by NAT rules. If a packet is processed by the NAT driver, it will not be processed by the UserGate firewall.

Port mapping

This function binds any port of a local Ethernet interface to a specified port of a remote host. Assigning ports is typically used for user-specific applications such as netbanking, remote control software, peer-to-peer connections, Internet-telephony, and various web-servers, when it is necessary to forward an incoming connection to a TCP-port of a local PC.

Firewall rules

UserGate Proxy service makes it easy to create a set of traffic rules. It takes just a few minutes to set up the firewall to connect a local network to the Internet. Rules are created and stored on one server, so administrators can be sure that security is not compromised by settings chosen by individual users on their local computers.

Back to Internet security

image image image

Twitter

Entensys Twitter Entensys Facebook