2011

Table Of Contents
Traffic going through VPN connections is filtered differently than traffic going
through other network connections. If the connection is a VPN, click the arrow
from the VPN column and select Yes.
In Expert View, two additional columns are displayed:
Stealth Mode - whether you can be detected by other computers.
To configure the Stealth Mode, click the arrow from the Stealth Mode column
and select the desired option.
DescriptionStealth option
Stealth Mode is on. Your computer is not visible from
both the local network and the Internet.
On
Stealth Mode is off. Anyone from the local network
or the Internet can ping and detect your computer.
Off
Your computer cannot be detected from the Internet.
Local network users can ping and detect your
computer.
Remote
Generic - whether generic rules are applied to this connection.
If the IP address of a network adapter is changed, Acronis Internet Security
modifies the network type accordingly. If you want to keep the same type, click
the arrow
from the Generic column and select Yes.
16.3.1. Network Zones
You can add allowed or blocked computers for a specific adapter.
A trusted zone is a computer that you fully trust. All traffic between your computer
and a trusted computer is allowed. To share resources with specific computers in
an unsecured wireless network, add them as allowed computers.
A blocked zone is a computer that you do not want to communicate at all with your
computer.
The Network Zones table displays the current network zones per adapter.
To add a zone, select the adapter and click Add Zone. A new window will appear.
Proceed as follows:
1. Select the IP address of the computer you want to add.
2. Select the action:
Allow - to allow all traffic between your computer and the selected computer.
Deny - to block all traffic between your computer and the selected computer.
Firewall
106