Farstone Firewall Version 1.
Copyright Notice No part of this publication may be copied, transmitted, stored in a retrieval system or translated into any language in any form or by any means without the express written permission of FarStone Technology, Inc. FarStone grants to you the right to use one copy of the enclosed software program (The "SOFTWARE") on a single computer.
Contents CHAPTER 1 INTRODUCTION........................................................6 1.1 WHAT IS FARSTONE FIREWALLTM? ............................................6 1.2 FEATURES AND BENEFITS ...........................................................6 CHAPTER 2 INSTALLATION..........................................................8 2.1 SYSTEM REQUIREMENTS............................................................8 2.2 INSTALLING FARSTONE FIREWALLTM ..........................................
5.1 SETTING SECURITY LEVEL .......................................................31 5.2 INTERNET LOCK SETTINGS .......................................................32 5.3 OTHER SETTINGS .....................................................................33 CHAPTER 6 UNINSTALLING .......................................................35 6.1 UNINSTALLING FARSTONE FIREWALLTM ...................................35 CHAPTER 7 APPENDIX ................................................................38 7.
Chapter 1 Introduction 5
Chapter 1 Introduction 1.1 What is FarStone FirewallTM? FarStone FirewallTM creates barriers to prevent unauthorized access to your computer from a network. FarStone FirewallTM is security software that provides you with comprehensive protection from data thieves and hackers. FarStone FirewallTM protects your computers according to pre-set security rules and lets you monitor, control and log your network activities. 1.
Chapter 2 Installation 7
Chapter 2 Installation 2.1 System Requirements • Windows 98/Me/2000/XP • 50MB of hard disk space • 256 VGA colors or higher • 32MB RAM • Intel Pentium (or compatible) 100MHz processor or better 2.2 Installing FarStone FirewallTM Step 1: Before starting the installation, close any applications that are running. Step 2: Insert the FarStone FirewallTM CD into your CD drive and run the “setup.exe” file directly to begin the installation (Figure 2-1).
Step 4: Enter your user name, company name (if applicable) and serial number (Figure 2-2). If you have purchased the CD-ROM, the serial number can be found on the back of the CD jewel case. Figure 2-2 Step 5: The Setup Wizard will suggest a folder in which to install the Farstone FirewallTM program files (Figure 2-3). If you would like to store the program files in another location, select Browse to open the file browser and select a new folder.
Figure 2-3 Step 6: Select Next to continue the installation. Step 7: Select Finish to complete the installation. You must restart your computer before using FarStone FirewallTM.
Chapter 3 Starting FarStone FirewallTM 11
Chapter 3 Starting FarStone FirewallTM 3.1 Starting FarStone FirewallTM After installation, the FarStone FirewallTM icon will be displayed on the Windows desktop. To start the FarStone FirewallTM program, double-click on the Farstone FirewallTM icon or select Start on the taskbar then Programs->FarStone FirewallTM-> FirewallTM. If Farstone FirewallTM is started for the first time, it will prompt user to setup a new user account. This account possesses administrator privileges.
3.2 Toolbar-Main Buttons Network Monitor Displays and logs the programs that are accessing your computer through the network. Application Management Allows or blocks an application from communicating over the network. Computer Group Management Allows a computer or group of computers to access your computer from the network or blocks a computer or group of computers from accessing your computer from the network. Lock Block traffic of all Internet applications except those possess time lock privilege.
Chapter 4 TM Using FarStone Firewall 14
Chapter 4 Using FarStone FirewallTM 4.1 Network Monitor To monitor a program’s network activity, select from the FarStone FirewallTM toolbar. All applications that are running will be listed in the top-right frame of FarStone FirewallTM (Figure 4-1). Figure 4-1 The information display in the top right frame includes: (1) The directory for the application. (2) The time of the connection. (3) The IP address of the computer that is accessing the network. (4) The communication port. (5) The traffic status. 4.
availability of a computer on the network. • ICMP - Internet Control Message Protocol: By using ICMP, other people can easily obtain information from your system. • Trojan Horse - Trojan horse is a program that transmits without the user’s knowledge. These types of programs often allow hackers to break into and control your system. • IGMP Packet – An IGMP Packet may result in a system crash. • Port Scanning – A port is used by protocols such as TCP and UDP to identify a communication instance (e.g.
4.1.3 Open Logs To view the recent history of the network activities, select Log->Open to open the log file. 4.1.4 Clear Logs To clear all logs displayed in the Event Report frame, select Clear Logs on the left frame of FarStone FirewallTM interface. 4.2 Application Management By using Application Management, users can supervise the applications installed on their computers that are attempting to connect to the network.
Figure 4-3 4.2.1 Setting Access Rule for Application When an application attempts to connect to the network for the first time after FarStone FirewallTM is installed, FarStone FirewallTM will ask for permission to connect to the network (Figure 4-4). Figure 4-4 If you check the box ‘Never prompt for permission again’, FarStone FirewallTM will not ask for permission again when this application is trying to connect to the network.
window (Figure 4-5). Then select a connection access rule for this application. Figure 4-5 There are three different rules: • Inquire each time: Each time this application attempts to connect to the network, the program will ask for permission. • Allow all traffic: No restrictions for the connection of this application. • Forbid all traffic: Forbid this application from connecting to the network. 4.2.
Figure 4-6 Once the application is removed from the list, the program will ask for permission when trying to connect to the network the next time. 4.3 Computer Group Management Users can also set the connection rules for the computers on the network. By entering the computer IP addresses, you can control the connection to or from any computer on the network. Select to open Computer Group Management (Figure 4-7).
4.3.1 Add an IP Address Select Add a computer on the left frame of the Computer Group Management interface to open the dialog box (Figure 4-8). This function is also available by right-clicking on the blank space on the right frame and selecting Add an IP address from the drop menu. Figure 4-8 Enter the description and the IP address of the computer you want to add. Then, select a connection rule from the drop-down menu.
Figure 4-9 Enter the description, the starting IP and the ending IP in the text box. All computers within the entered IP section will be added into a computer list. Then, you can set a connection rule for these computers. There are two different rules: • Allow all traffic: Allows outgoing and incoming traffic from/to this computer. • Forbid all: Forbids all traffic from/to this computer. 4.3.
Figure 4-10 4.4 Internet Lock To disconnect Internet applications from network quickly, you can directly or select Options->Lock from menu bar. All press applications, except those possess time lock privilege, will be locked and can not connect to Internet. Note: An application with time lock privilege can still connect to Internet as usual after selecting Internet lock.
Figure 4-11 Select Yes radio button on the bottom of the dialog box then Ok. You can also deprive this program of the privilege by selecting NO radio button. Figure 4-12 4.5 Disconnect/Connect One of the most useful methods to protect your computer from network attacks is to disconnect from the network.
one can access your computer except you. To disable the network connection, select or select Options->Disconnect from the menu bar. You can connect to the network again by repeating the same steps. 4.6 Clear History The powerful clear tool in Farstone Firewall TM enables users to clear temporary files and history safely and quickly. Select Options->Clear Options from menu bar to open the window (Figure 4-13) and select the files you want to clear in it.
URL list stores the address of recent visited websites. 4. Auto-Match List: Auto-match list is the folder that stores the information you filled in Internet Explorer. 5. Favorites Folder: A folder contains the websites list or other folders saved by users. 6. Temporary System files: A temporary system file is a file that is created to temporarily store system information in order to free memory for other purposes, or to act as a safety net to prevent data loss when a program performs certain functions. 7.
4.7 User Account When multiple users share a Farstone FirewallTM, sometimes settings are accidentally changed. With user account, you can manage your own Firewall and prevent others from changing your settings. Note: Only Firewall administrator can manage user account. 4.7.1 Create a new account To create a new user account, select Options->User accounts from the menu bar to open Accounts management window.
Click on Create, then type the user name and password in the box, and then select the account type by clicking the radio box. Figure 4-15 There are two types of user account: standard user account and limited user account. Standard user shares administrator privileges as changing Firewall settings, managing application connection and setting computer group (But standard user can’t manage user account). You can also create an account with limited privileges by selecting the check boxes. 4.7.
program. This function is available only if you select Enable Password Protection in accounts management window Figure 4-16 or select Options->Switch User To switch between users, press from menu bar. Then type the user name and password in the box.
Chapter 5 Firewall Settings 30
Chapter 5 Firewall Settings From the Options menu of FarStone FirewallTM, select Settings to open the Settings window (Figure 5-1). Figure 5-1 5.1 Setting Security Level There are three security levels that can be set: • Low: FarStone Firewall will ask for permission when an application is accessing the Internet for the first time. Only computers on the local area network can access your network shares (e.g. files and printer). The computers on the Internet are denied access to these services.
access your network shares (e.g. files and printer). All ports on your computer will be unusable by others unless they have been approved. Your computer will be invisible on the network. 5.2 Internet Lock Settings You can not only lock Internet applications manually (described in 4.4), but also let Firewall lock them automatically. No changes made to computer: All applications but those possess lock time privilege will be locked if no changes made to computer for a preset time.
5.3 Other Settings Figure 5-3 • Auto-run at system startup: The program will automatically be launched when the computer starts up. • Enable Alert: An alert sound will be played when other computers or programs attack your system. You may also select the desired alert sound by selecting Browse. • Show Alert Window: A pop-up window will be displayed when other computers or programs attack your system.
Chapter 6 Uninstalling 34
Chapter 6 Uninstalling 6.1 Uninstalling FarStone FirewallTM Step 1: Close any other programs that are running. Step 2: If the FarStone FirewallTM icon is displayed in the system tray, right-click on the icon and select Close. Note: If you enabled password protection, Firewall will prompt you to enter user name and password.
F i gure 6-2 Step 5: Select Finish to complete the uninstall process (Figure 6-3).
Chapter 7 Appendix 37
Chapter 7 Appendix 7.1 Software License Agreement FARSTONE TECHNOLOGY, INC. (FARSTONE) END-USER LICENSE AGREEMENT FOR FARSTONE FIREWALLTM, HEREAFTER REFERRED TO AS THE "SOFTWARE" PLEASE READ CAREFULLY. THE USE OF THIS "SOFTWARE" IS SUBJECT TO THE "SOFTWARE" LICENSE TERMS OF FARSTONE AND OTHER LICENSORS WHOSE SOFTWARE MAY BE BUNDLED WITH THIS PRODUCT. BY YOUR USE OF THE "SOFTWARE" INCLUDED WITH THIS PRODUCT, YOU AGREE TO THE LICENSE TERMS REQUIRED BY THE LICENSOR OF THE "SOFTWARE" AS SET FORTH BELOW.
B. Multiple User License: This Agreement grants you, the Licensee, a License to: Make one copy of the "Software" in machine-readable form solely for back-up purposes, provided you reproduce FarStone's copyright proprietary legends. You must acquire and dedicate a License for each separate computer on which any part or portion of the "Software" is installed or run.
reasonable precautions to preclude access of unauthorized persons to the "Software". G. Term: This License shall continue for as long as you use the "Software". However, it will terminate if you fail to comply with any of its terms and conditions. You may terminate the License at any time by destroying the "Software" (including the related documentation) together with all copies or modifications in any form.
NOT LIMITED, AS TO NON-INFRINGEMENT OF THIRD PARTY RIGHTS, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow the exclusion of implied warranties or limitations on how long an implied warranty may last, so the above limitations may not apply to you. This warranty gives you specific legal rights and you may also have other rights, which vary from state to state.
Should any provision of this Agreement be declared unenforceable in any jurisdiction, then such provision shall be deemed severable from this Agreement and shall not affect the remainder hereof. FarStone reserves all rights in the “Software” not specifically granted in this Agreement. 7.2 Technical Support & Product Upgrade Please contact your retailer, or use our online support system at www.farstone.com. For your convenience, you will find answers to frequently asked questions on our website at www.