Sunbelt Kerio Personal Firewall User Guide
Sunbelt Kerio Personal Firewall User Guide
Sunbelt Kerio Personal Firewall User Guide
Agreement). By installing the software, you agree to accept the terms of the License Agreement. Copyright (c)
2006 Sunbelt Software. All rights reserved. All products mentioned are trademarks or registered trademarks of
their respective companies. Information in this document is subject to change without notice. No part of this
publication may be reproduced, photocopied, stored in a retrieval system, transmitted, or translated into any
language without the prior written permission of Sunbelt Software, Inc.
Sunbelt Kerio Personal Firewall User Guide
Contents
i
Sunbelt Kerio Personal Firewall User Guide
ii
Sunbelt Kerio Personal Firewall User Guide
Introduction
Welcome to the Sunbelt Kerio Personal Firewall User Guide. This guide provides in-depth
information and procedures that will not only help you to better understand Sunbelt Kerio Personal
Firewall, but also walk you through the steps needed to protect your computer or computer
network.
Section Page
Overview 1-2
Components 1-2
1-1
Sunbelt Kerio Personal Firewall User Guide
Before You Anyone, from novices to more advanced computer users, can use Sunbelt Kerio Personal Firewall
(SKPF). Novice computer users who do not have in-depth computer or networking knowledge,
Start should install SKPF in Simple mode. Advanced computer users can inistall SKPF in Advanced
mode. To learn more about Simple vs. Advanced mode, set Initial Settings, page 2-8.
Overview The Sunbelt Kerio Personal Firewall controls how computers share information through the
Internet or a local network. It also protects computers from attacks from other computers. The
Personal Firewall is especially useful for laptop computers since they are easier to compromise
because of built-in wireless access.
What is a Firewall?
Basically, a firewall is a program that protects one computer from other computers. It examines
information that tries to enter a computer from the outside (i.e. the internet), and determines if the
information is safe or harmful.
Our Solution
Potential intruders use various techniques to determine if a computer is vulnerable to attacks.
These techniques vary from a simply scanning the computer to far more sophisticated methods
such as hacking. Sunbelt Kerio Personal Firewall uses a built-in intrusion prevention system that
identifies and blocks both known and unknown attacks so you can breathe easy while surfing the
web. It really is an essential element of Internet security.
Glossary
This guide uses many technical terms. If specific terms or concepts are not clear, refer the
glossary on page 13-1, for more detailed explanations.
Online Help
In addition to the user guide, we provide extensive online help from within the Sunbelt Kerio
Personal Firewall application. Simply press F1 or the Help button at the bottom of any window
inside the configuration window to open the online help.
Components Sunbelt Kerio Personal Firewall uses several components to protect your computer.
Network Security
Network Security controls all network communication. Network Security allows you to apply two
types of rules:
• Application – permit or deny network application communication.
• Packet filter – permit or deny parts of messages.
The Personal Firewall includes set of predefined network security rules (i.e. for DNS, DHCP, etc.).
These rules are separate from user-defined rules and can be enabled or disabled at any time.
Whenever the Personal Firewall detects traffic that does not match the criteria for a rule, a dialog
box opens asking the user to permit or deny the communication. An application or packet filter rule
can also be created at that time.
Behavior Blocking
The Behavior Blocking module controls applications that are running. It controls the following types
of events:
• Running applications
• Replacing an application executable file
• Applications being run by other applications
1-2
Sunbelt Kerio Personal Firewall User Guide
In case of network traffic, you can define rules for individual applications. These rules permit or
deny certain types of communications. Again, if a communication or event does not match the
criteria for a rule, a dialog box opens and asks the user to permit or deny the communication.
1-3
Sunbelt Kerio Personal Firewall User Guide
Functions Sunbelt Kerio Personal Firewall provides the following functions and features:
and Features Stop all traffic – stops all traffic on the computer. This function can be helpful especially when
undesirable or strange network activity is detected. Traffic can be restored after the appropriate
security actions are taken.
Logging – Each firewall module creates an independent log that is stored in a text file. Logs can
be viewed in a configuration dialog. Logs can also be stored on a Syslog server.
Connections overview and statistics – The overview provides information about established
connections and ports opened by individual applications. Information on the current speed and
size of transmitted data in both directions is also provided for active connections. The overview is
automatically refreshed in predefined time intervals. Statistics show users the number of objects
blocked by the Web content filter and the number of detected intrusions during specific time
periods.
Automatic update – Regular checks are made for newer versions of the firewall. Whenever a new
version is detected, users have the option of downloading and installing it. It is also possible to
check for new versions manually.
System The following hardware and software is required to install Sunbelt Kerio Personal Firewall:
Requirements • Windows 2000 Professional, XP Home, XP Professional, and XP Media Center Edition
operating systems
• CPU Intel Pentium or 100% compatible
• 64 MB RAM
• 10 MB of free disc space
• minimal screen resolution 800x600 pixels
Note: Sunbelt Kerio Personal Firewall 4 does not run on Windows NT, Windows
2000 Server, Windows 2003 Server , 95, 98, ME, and 64 bit Versions of Windows.
1-4
Sunbelt Kerio Personal Firewall User Guide
Conflicting Sunbelt Kerio Personal Firewall might conflict with applications that are based on identical or
similar technologies. Sunbelt Software does not guarantee the Sunbelt Kerio Personal Firewall or
Software your operating system will function correctly if the following types software applications are
installed on the same operating system:
• Personal firewalls – Personal firewalls (i.e. Internet Connection Firewall — a Windows XP
component, Zone Alarm, Sygate Personal Firewall, Norton Personal Firewall, etc.) provide
similar functions to Sunbelt Kerio Personal Firewall.
• Network firewalls – Network firewalls (i.e. Kerio WinRoute Firewall, Kerio WinRoute Pro,
Kerio WinRoute Lite, Microsoft ISA Server, CheckPoint Firewall-1, WinProxy by Ositis, Sygate
Office Network, Sygate Home Network, etc.) also protect computers. It is not necessary to use
a personal firewall on a computer protected by a network firewall.
As general rule, do not combine Sunbelt Kerio Personal Firewall with other firewalls.
Styles and This guide uses the following styles and graphical references:
References
Style / Graphic Used to:
BOLD indicate a specific field, prompt, dialog, or Window (Type an IP address in the
Address field).
BOLD ITALIC indicate the action of clicking action buttons, Keys, links, menu bar items and
menu selections (OK, Close, etc.).
Italic emphasize program titles, window and web page names, key words, and “see”
references. (Open the Administrator Resource web page).
Word>Strings indicate a series of menu selections (Click View on the main menu bar; then,
select Policy>Default).
1-5
Sunbelt Kerio Personal Firewall User Guide
Installation
Now that Sunbelt Kerio Personal Firewall has been properly introduced, it is time to install it. This
chapter covers the following topics:.
Section Page
Installation 2-2
2-1
Sunbelt Kerio Personal Firewall User Guide
Before You We have a few suggestions on how you can prepare your computer before installing the personal
firewall:
Install
• Uninstall other firewall programs and restart the computer. Removing other personal firewall
programs is required before using Sunbelt Kerio Personal Firewall. To uninstall other firewall
programs, see the user documentation for those programs.
• Close all other Windows programs, including programs displayed in the Windows system tray.
Note: If you have an older version of the personal firewall, remove it before
installing the new version.
Installation Sunbelt Kerio Personal Firewall comes with a quick and easy-to-use InstallShield Wizard.
To install Sunbelt Kerio Personal Firewall
1 Make a selection:
If... ...then...
Sunbelt Kerio Personal Firewall is being insert the CD in the disk drive. The
installed from a CD, installation should start automatically. If not,
open Windows Explorer, navigate to the
CD drive; then, double-click the setup.exe
icon.
Sunbelt Kerio Personal Firewall is being double-click the icon to open the wizard.
installed from a download, open
Windows Explorer, navigate to location
where the setup.exe is saved,
2-2
Sunbelt Kerio Personal Firewall User Guide
2 Click Next. The What’s New window opens. Scroll through the list to read about the changes
between the last versions and the current one.
2-3
Sunbelt Kerio Personal Firewall User Guide
4 Make a selection:
To... ...select...
decline the license agreement, I do not accept the terms in the license
agreement; then, click Cancel. The wizard
closes.
5 Make a selection:
To... ...click...
accept the default folder (recommended), Next. The Initial firewall setting window
opens.
select a new folder in which to install the Change. The Change Folder window
personal firewall, opens. Select a new folder, click OK; then,
click Next. The Initial firewall setting
window opens.
Note: We recommend that you keep the
default selection.
2-4
Sunbelt Kerio Personal Firewall User Guide
To... ...select...
set the initial firewall settings to a basic Simple. Apply this setting if you have basic
mode where you are not required to computer skills and/or are not familiar with
supply detailed technical information, technical concepts relating to networks and
applications. See page 2-8 for more
information.
set the initial firewall settings to advanced Advanced. This setting is for more
mode, advanced computer users who are familiar
concepts like network traffic and blocking/
allowing applications. See page 2-8 for more
information.
Note: It is possible to switch to advanced mode later when you feel more
comfortable with the program and/or gain more advanced knowledge of
computer networking concepts.
2-5
Sunbelt Kerio Personal Firewall User Guide
8 Click Install to install the personal firewall on your computer. The Installshield Wizard
Completed window opens after the installation is finished.
2-6
Sunbelt Kerio Personal Firewall User Guide
10 Make a selection:
To... ...click...
restart the computer and finalize the Yes. Make sure work from any open
installation, applications is saved first; then, close all
open windows.
close the dialog box without restarting No. make sure to restart the computer later.
your computer,
Warning: If Sunbelt Kerio Personal Firewall will be used with the AVG antivirus,
AVG must be installed before the Sunbelt Kerio Personal Firewall. If Sunbelt Kerio
Personal Firewall detects the AVG antivirus when the firewall is started first time,
corresponding rules are set for the antivirus.
Caution: The following information is for advanced users and should be taken into
consideration:
• If you are using Windows XP Service Pack 2 or later, the installation program
registers Sunbelt Kerio Personal Firewall in the Windows Security Center.
During the installation, the firewall is registered as inactive.
• If the Windows firewall is running, Sunbelt Kerio Personal Firewall disables it
on startup.
2-7
Sunbelt Kerio Personal Firewall User Guide
Initial During the installation (see page 2-5) users are required to select the firewall settings that will be
Settings applied after the installation is complete and the computer is restarted. The following selections
are available:
• Simple — In simple mode, the firewall allows all outgoing communication (i.e. accessing the
web) and blocks any incoming communication (i.e. web sites or hackers trying to access your
computer). Network settings are automatically assigned to your computer and the system
security feature is disabled. This means that you will not receive alerts that ask detailed
questions that might require you to have more advanced computing and/or computer
networking knowledge. Simple mode is set by default and it is recommended for those less
knowledgeable about computer and computer networking.
If you have advanced knowlmedge of computers and/or computer networks, you can change
the settings to a more advanced mode after the installation is complete.
Note: The only exception to Simple mode is if you use a dial-up service (as
opposed to cable or DSL) to access the internet. You will have to confirm the
dial-up numbers you use to access the internet. Also, you are always asked to
confirm a number if a new number is dialed or if a telephone number is
changed.
• Advanced — In Advanced mode, The firewall allows you to determine the levels of
communication and system security. For example, the firewall you are alerted to take an action
and whether or not a rule should be created for the action whenever an unknown
communication is detected or an unknown application is started. You can create a specific
firewall configuration for a host and a user.
If the Advanced mode is selected, Sunbelt Kerio Personal Firewall detects the active network
interfaces. For each interface, users are asked whether or not the interface is connected to a
trustworthy network. Advanced mode is recommended for experienced users and to those
who want to apply custom settings. Advanced mode is not for beginners.
Upgrading to Upgrading to a new version of Sunbelt Kerio Personal Firewall is similar to the initial installation (as
described in pages 2-2 to 2-7). it is not necessary to stop the application since it will be stopped
a New
and closed automatically by the installation program.
Version
Note: Sunbelt Kerio Personal Firewall includes a built-in automatic update
verification system, see page 2-11.
2-8
Sunbelt Kerio Personal Firewall User Guide
Uninstalling Uninstall Sunbelt Kerio Personal Firewall using the Add/Remove programs option in the Control
Panel.
the Personal
Firewall To uninstall the personal firewall
1 Click Start>Control Panel. The Control Panel window opens.
2-9
Sunbelt Kerio Personal Firewall User Guide
2 Double-click Add or Remove Programs. The Add or Remove Programs window opens.
3 Scroll down the list of programs; then, select Sunbelt Kerio Personal Firewall.
4 Click Remove. A dialog box opens. It asks you to confirm the decision to remove Sunbelt
Kerio Personal Firewall.
• Click Yes to uninstall the personal firewall.
• Click No to cancel the uninstall process.
Files that were created after the installation (configuration files, logs, etc.) are not removed. After
the personal firewall is uninstalled, these files can be either removed manually or kept for possible
reinstallation.
Note: If you are using Windows XP Service Pack 2 or later, the Sunbelt Kerio
Personal Firewall registration in the Windows Security Center is deleted and
the integrated Windows Firewall is enabled automatically after the uninstall.
2-10
Sunbelt Kerio Personal Firewall User Guide
Updating the Sunbelt Kerio Personal Firewall automatically looks for new versions each time it starts. If a
updated version is found, it can be downloaded. If the engine is not restarted; then, it will look for
current updates every 24 hours.
version
To download an updated version of the personal firewall
1 Make a selection:
To... ...click...
automatically look for program updates, Overview on the side menu, click the
Preferences tab; then, select the
Automatically check for updates box.
Sunbelt Kerio Personal Firewall will look for
updates each time your computer starts up.
If updates are found, the Update Wizard
opens.
manually check for updates, Overview on the side menu, click the
Preferences tab; then, click Check now. If
updates are found, the Update Wizard
opens.
2 Click Next to download the new version and run the installation program. Sunbelt Kerio
Personal Firewall always verifies the signature of a downloaded file. This feature ensures that
the downloaded file is original and not infected by a virus, damaged, etc.
Note: Stop the download or the installation process by clicking Cancel. If the
process is canceled, the update is not offered again through the automatic update
feature. However, it can be run manually.
2-11
Sunbelt Kerio Personal Firewall User Guide
2-12
Sunbelt Kerio Personal Firewall User Guide
Two editions of Sunbelt Kerio Personal Firewall are available: full (paid) and free (limited). This
chapter covers the following topics:
Section Page
3-1
Sunbelt Kerio Personal Firewall User Guide
Free Version Use the same installation procedure for the Free and Full versions of Sunbelt Kerio Personal
Firewall. After a 30-day trial-period you must select one of the to use. The free version contains
vs. Full limited features, whereas all features are available with the full version.
Version
Free Version
The following limitations are applied to the Free Version:
• It is available for personal, noncommercial use only.
• Web content filtering, including its logs and statistics, is not available.
• Host Intrusion and Prevention System (HIPS) is not available.
• It cannot be used at Internet Gateways.
• Logs cannot be sent to a Syslog server.
• The configuration cannot be protected by a password and it is not possible to access and
administer the firewall remotely.
Full Version
The full version of the firewall is only available after purchasing a license number and registering
the software. All features and components of the Firewall are available after registration.
Technical Support
Only email technical support is provided for issues concerning Sunbelt Kerio Personal Firewall.
Owners of multi-licences (licences for more than one user/computer) can contact our technical
support by telephone. Go to http://www.sunbelt-software.com to find detailed contact information.
Purchasing Purchase a licensed version of Sunbelt Kerio Firewall by following a few quick steps.
Sunbelt To purchase a licensed version of Sunbelt Kerio Personal Firewall
Kerio 1 Open a web browser. If the application is open, click Overview, the License tab; then click the
Personal http://www.sunbelt-software.com/kerio.cfm link in the Homepage field. The Sunbelt Kerio
Personal Firewall page opens.
Firewall
3-2
Sunbelt Kerio Personal Firewall User Guide
3 Click . The first page of the OnLineShop Secure Ordering Form opens. Make
sure a major credit card is available (American Express, Visa, or MasterCard).
3-3
Sunbelt Kerio Personal Firewall User Guide
4 Complete the form; then, click Continue at the bottom of the form. The second page of the
OnLineShop Secure Ordering Form opens.
5 Type the credit card information in the Credit Card Type, Credit Card Number, and Expiration
Date fields.
3-4
Sunbelt Kerio Personal Firewall User Guide
6 Click Process My Order. A confirmation window opens after the order is processed.
The confirmation page contains the key needed to register Sunbelt Kerio Personal firewall.
7 Make a selection:
If... ...click...
Sunbelt Kerio Personal Firewall is not the link under the license key on the
installed on the user’s computer, confirmation page, download; then, install
the application. Go to page 2-1, to read how
to install Sunbelt Kerio Personal Firewall.
a trial version of Sunbelt Kerio Personal Register on the License tab. Go to Product
Firewall is on the users computer (and the Registration, page 3-6.
OnLine Secure ordering form is being
accessed through the application),
3-5
Sunbelt Kerio Personal Firewall User Guide
Product Sunbelt Kerio Personal Firewall must be registered to enable all of the features contained within
the full version.
Registration
To register Sunbelt Kerio Personal Firewall from within the application
1 Click Overview, the License tab; then click Register. The Registration Wizard opens.
2 Type the license key in the License number field; then, click Next.
3 Type the relevant contact information in the required fields; then click Next.
3-6
Sunbelt Kerio Personal Firewall User Guide
4 Make a selection:
To... ...click...
5 Click Finish to close the wizard. The License tab now contains detailed information on the
current license.
Note: The Personal Firewall GUI component is automatically restarted after the
registration is complete. This enables all features that were not available in the
trial version.
Note: The Register button in the Product section is disabled after the license key
is registered.
The License section provides information about the current license number, date of the license
expiration and date of the last free update (subscription expiration date and time).
Make a selection:.
To... ...click...
3-7
Sunbelt Kerio Personal Firewall User Guide
Sunbelt Kerio Personal Firewall uses several components and system tray features. The
Components section of this chapter is highly technical. We recommend that basic computer users
should focus more on the System Tray Icons section. This chapter covers the following topics:
Section Page
Components 4-2
4-1
Sunbelt Kerio Personal Firewall User Guide
The Personal Firewall GUI is represented by the kpf4gui.exe file found in the installation
directory.
• Crashdump sender – This tool sends a crashdump file (assist.exe) to Sunbelt Software when
the Firewall breaks down.
• Libraries – The components above use the following dynamic libraries (DLL):
• kfe.dll — an interface of the low-level driver. This interface enables traffic between the
driver and the Personal Firewall Engine.
• gkh.dll — a module used for hot key control. This module disables the pop-up filter tempo-
rarily.
• kwsapi.dll — the interface for the Windows Security Center (used for registration of the
Sunbelt Kerio Personal Firewall and display of its status).
• KTssleay32_0.9.7.dll, libeay32_0.9.7.dll — an OpenSSL library which provides encryption
of configuration files and of communication between the Personal Firewall GUI and the
Personal Firewall Engine.
• KTiconv.dll — aniconv library which encodes and deciphers characters e.g. during Web
content filtering, logging, etc.
• KTzlib.dll — a zlib library which is used for crashdump packing.
• Fast User Switching Support – The Personal Firewall supports Fast User Switching in
Windows XP. Multiple instances of the Firewall can be open at the same time. When this
happens, the Personal Firewall Engine communicates with the instance that belongs to the
active user. After the Personal Firewall Engine service starts, the first instance opens and runs
under the account for which the Personal Firewall Engine service is running. After the user
logs in, a new instance opens, and runs with the privileges of the user who is logged in. This
instance is active until the user logs off or you switch users.
4-2
Sunbelt Kerio Personal Firewall User Guide
System Tray A shield-shaped icon is displayed in the System Tray whenever the Personal Firewall is running.
This component is started automatically by the Personal Firewall Engine. The icon also shows
Icons network activity of the computer on which the firewall is installed. Network traffic is represented by
small colored bars at the bottom of the icon:
The green bar represents outgoing traffic, the red bar incoming traffic. Right-click the icon to open
a menu providing more options.
Figure 4-3 Context menu of systray icon Sunbelt Kerio Personal Firewall
Figure 4-4 Sunbelt Kerio Personal Firewall Systray icon— Firewall disabled
When the firewall is disabled, the menu selection switches to Enable Firewall. Use it to start the
firewall.
Note: In Windows XP Service Pack 2, the current status of the Sunbelt Kerio
Personal Firewall is reported to the Windows Security Center.
Stop all traffic – Select this option to block all network traffic. In cases where network traffic that
should have been denied was permitted by mistake, use the Stop all traffic option to stop all active
connections and to prohibit its recovery. If a traffic rule has been created (using the Create a rule
for this communication option), it can be removed and the traffic can be enabled again.
Figure 4-5 Sunbelt Kerio Personal Firewall Systray icon — Stop all traffic
4-3
Sunbelt Kerio Personal Firewall User Guide
When the firewall is disabled, the menu selection switches to Enable traffic. Use it to allow network
traffic. Anytime the Personal Firewall Engine service is started, the Disable Firewall and Stop all
traffic options are set to their default modes. For security reasons, it is not recommended that you
leave the firewall disabled after the system starts up. Also, stopping all traffic might cause
problems during user login.
Configuration – Select this option to open the configuration dialog box.
About – Select this option to open the About Sunbelt Kerio Personal Firewall window. This
window provides general information about Sunbelt Kerio Personal Firewall and the versions of
the individual components.
Exit – Select this option to stop the Personal Firewall Engine service and close the Personal
Firewall (all open windows and application dialogs are closed and the icon on the Systray is
hidden). Reactivated the Firewall by selecting Start>All Programs>Sunbelt Software>Kerio
Personal Firewall 4.
4-4
Sunbelt Kerio Personal Firewall User Guide
Before learning how to configure Sunbelt Kerio Personal Firewall, it is important to understand how
it behaves and interacts with users. This chapter covers the following topics:
Section Page
5-1
Sunbelt Kerio Personal Firewall User Guide
Firewall Information is transmitted through the Internet using TCP/IP protocols. TCP/IP (Transmission
Control Protocol/Internet Protocol) is the basic communication language of the Internet. It can also
Behavior be used as a communications protocol in a private network (i.e. inside a company or your home).
When you are set up with direct access to the Internet, your computer is provided with a copy of
the TCP/IP protocols. Every computer to which you send or receive messages also has TCP/IP
protocols.
TCP/IP Layers
TCP/IP has two-layers. The higher layer, Transmission Control Protocol (TCP), divides a file into
smaller chunks (packets) so the file easier to send. Each packet is numbered separately and
includes the Internet address of the destination. The individual packets for a given file might travel
by different routes through the Internet, however when they all arrive at their destination, they are
reassembled into the original file (by the TCP layer at the destination). The lower layer, Internet
Protocol (IP), manages the address part of each packet so that it arrives at the correct destination.
If you are part of a computer network, each computer with access to the internet verifies the IP
address in order to determine where to forward the message.
Inspecting the Packets
Sunbelt Kerio Personal Firewall inspects each packet; then makes a decision based on the
information acquired from the packets as well as the information from previous communications. A
log is created to record the information about each approved connection. If a packet is not a threat,
it is allowed into your computer. If it is a threat, it is filtered out. The firewall blocks all packets that
have been filtered out. The process of inspecting the packets within the message is more efficient
and more secure than basic packet filtering, which allows or blocks packets based on source and
destination addresses, ports, or protocols, not necessarily their contents.
Advanced (Learning Mode)
If Advanced (learning mode) was selected during the installation, Sunbelt Kerio Personal
Firewall provides tutorial-style pop-ups to help you make better informed decisions about whether
or not to allow a connection to the internet. You are also given the option of permanently permitting
or denying a connection. If a connection is permitted or denied permanently, a corresponding rule
is automatically created, and users are no longer prompted to permit or deny that particular
connection.
The ability to modify rules gives users more control over network traffic to and from their
computers. Only packets that meet certain criteria, or those that belong to approved connections
are allowed through the firewall.
The dialog boxes that alert users about attempted connections are set to Always on Top. For
example, if there more than one attempt to establish a connection to the internet is detected, they
are put in a queue. Users must decide to allow or deny a connection in the dialog box that is on top
before moving onto the next dialog box.
5-2
Sunbelt Kerio Personal Firewall User Guide
Connection The Connection Alert dialog box opens when Sunbelt Kerio Personal Firewall detects unknown
internet traffic. You are prompted to allow or deny the connection to the Internet, and whether or
Alert
not to create a corresponding rule.
Note: The parameters in the Network Security section define how the Personal
Firewall behaves when a network connection is detected. The Connection Alert
dialog box opens if no corresponding rule is found.
5-3
Sunbelt Kerio Personal Firewall User Guide
When an Alert dialog box opens, two sections stand out: the direction of the connection (incoming
or outgoing), and the application and remote point trying to make the connection.
Traffic direction and zone
A green stripe represents an outgoing connection (from a local computer to a general point on the
internet or trusted IP address). A red stripe represents an incoming connection (from a general
point on the internet or trusted IP address to a local computer). The remote location is shown in
parentheses. Trusted area signifies group of trusted IP addresses, Internet signifies IP address
that are not included in the Trusted area
• The first line shows the application used by the local computer. If a description is not available,
the name of a corresponding executable file is displayed. If an application has no icon, a
default system icon is used.
• The second line shows the remote point DNS (Domain Name System - See Glossary, page
13-1.) name and its IP address (in brackets).
• The remote point to which the connection is being made (in case of standard services), and
the name of the service is displayed in addition to the port number.
Place the mouse pointer over the application name to see the path to the application executable
file on your computer.
5-4
Sunbelt Kerio Personal Firewall User Guide
2 Make a selection:
To... ...click...
view more information about the <<Details. A Description box drops down. It
communication, provides more information about the
connection and the application making the
communication. Click this button again to
hide the information.
3 To create an advanced filter rule, select the Create an advanced filter rule check box.
Advanced filter rules are used to set more detailed parameters regarding incoming and
outgoing communications.
4 To manage advanced packet filter rule definitions, click Advanced filter rule.... The Network
Security - Advanced Packet Filter window opens. Advanced rules can be added, edited, or
removed anytime by opening the Personal Firewall application; then, clicking the
Applications tab under the Network Security section.
5-5
Sunbelt Kerio Personal Firewall User Guide
Application The application alert dialog boxes inform users that Sunbelt Kerio Personal Firewall detected an
Alert attempt to start an application, replace an application, or to run one application from another.
Note: Use the System Security section to define how the Personal Firewall
behaves when applications are started. The Starting, Replacing, and Launching
other application dialog boxes are opened if no corresponding rule is found.
5-6
Sunbelt Kerio Personal Firewall User Guide
Note: If the description of the application (or the file name if there is no description
available) is too long, it will be shortened to 32 characters, and three dots will be
added at the end to show that the description is incomplete.
Event Type
The orange strip contains Information on the type of event that was detected. Starting application
signifies an attempt to launch an application, Replacing application signifies an attempt to replace
an executable file for an application, and Application is launching other application signifies one
application is attempting to launch another
Place the mouse pointer over the description on the application or over the description of the
application by which it is launched to view a tool tip providing full path to the executable file of the
corresponding application.
To take action based on this alert, see To take an action regarding an alert, page 5-5.
5-7
Sunbelt Kerio Personal Firewall User Guide
Host The Intrusion Attempt Blocked dialog box warns users that Sunbelt Kerio Personal Firewall
Intrusion detected a host intrusion attempt and blocked it.
Alerts Note: The Intrusion Attempt Blocked alert is opens when there is no
corresponding exception defined for the applications involved or if the Do not
display warnings for this type of event is disabled.
Description
A description of the attempted intrusion is provided at the top of the dialog box, including
recommended response.
Event type
The blue strip contains information on the type of event that was detected.
5-8
Sunbelt Kerio Personal Firewall User Guide
In case of events that overflow the buffer, only the process where the intrusion was detected is
provided (see below).
2 Make a selection:
To... ...click...
close the dialog box, Close. The the dialog box closes.
view more information about the <<Details. A Description box drops down. It
communication, provides more technical details about the
intrusion. Click this button again to hide the
information.
5-9
Sunbelt Kerio Personal Firewall User Guide
Alerts For You can enable the Alert dialog box in rules or by running an application. This dialog box opens
when a packet that is sent or received meets the conditions of a rule. A window opens in the right
Connections bottom corner of the screen. It provides basic details about the connection. If new events that meet
with Rules the rule are detected while the dialog box is open, they are queued.
Warning: If you close the Alert dialog box, all queued alerts are removed,
regardless if they have been displayed or not.
5-10
Sunbelt Kerio Personal Firewall User Guide
Now that we have discussed how the firewall behaves, it is time to learn more about the interface
and how to configure basic parameters. This chapter covers the following topics:
Section Page
6-1
Sunbelt Kerio Personal Firewall User Guide
The Interface Use the user interface to control how Sunbelt Kerio Personal Firewall protects your computer.
There are two ways to open the user interface:
• Double-click the Sunbelt Kerio Personal Firewall icon in the System Tray
• Right-click on the icon and select Configuration from the menu.
Modules
The interface is divided into five modules, shown as side-tabs:
• Overview – list of active and open ports, statistic, user preferences.
• Network Security – rules for network communication of individual applications, packet
filtering, trusted area definitions.
• System Security – rules for startup of individual applications
• Intrusions – configuration of parameters which will be used for detection of known intrusion
types.
• Web — Web content rules (URL filter, pop-ups blocking, control over sent data)
• Logs & Alerts — logs viewing and settings
Note: The Register button is listed at the bottom with the Help, OK, Cancel, and
Apply buttons only if you have not registered your version of Sunbelt Kerio
Personal Firewall.
6-2
Sunbelt Kerio Personal Firewall User Guide
The green bar next to the chart represents current speed of outgoing traffic. The red bar shows
current speed of incoming traffic.
To work with the network traffic graph
1 Click the chart to switch between the line graph and the bar graph visual.
2 Place the mouse pointer over the chart to see statistics relating to network traffic.
• speed out (green bar) — current speed of outgoing traffic
• speed in (red bar) — current speed of incoming communication
• maximum (in+out) — the highest speed for incoming and outgoing traffic in the last 80
seconds
• minimum (in+out) — the lowest speed for incoming and outgoing traffic in the last 80
seconds
3 To block all network traffic (all connections are stopped immediately), click Stop all traffic.
This function is helpful when a communication that was supposed to be blocked was allowed
by mistake. If you stop the traffic, the text on the button changes to Enable traffic.
Note: Users can also right-click the Sunbelt Kerio Personal Firewall icon
displayed in the System tray to access the Stop/Enable traffic option.
6-3
Sunbelt Kerio Personal Firewall User Guide
Action Buttons
Buttons at the dialog bottom provide the following functions:
• Help – opens the online help for tab under a particular section
• OK – saves all changes and closes the window
• Cancel – closes the window without saving changes
• Apply – saves and applies all changes, but leaves the window open
Note: Users can only make changes to one tab at a time. If a user clicks another
tab or section, a dialog box opens. Click Yes to apply the changes or No to
continue without saving.
6-4
Sunbelt Kerio Personal Firewall User Guide
Working with The Connections tab lists active connections and open ports used by individual applications. It
also lists the applications that are actively involved in network communication and the applications
Network that are waiting for connections.
Connections
The first line represents each application's icon and name (description) – if the application does
not have an icon, the default system icon for executable files is used; if a description is not
available, the name of the file without the extension is displayed. A port is considered open when it
meets the following criteria:
• an outgoing connection is established (green background)
• an incoming connection is established (red background)
• an application is listening for connections — server mode (transparent background
Click the [+] to expand a list of details relating to the connection. Click the [-] to hide open ports
currently used by the application.
6-5
Sunbelt Kerio Personal Firewall User Guide
A key at the bottom of the tab shows the number of active connections and open ports.
3 Make a selection:
To... ...select...
expand the details for all listed items Expand all. The details for each item are
relating to the connection, show in a sub-list.
contract the details for all listed items Collapse all. The sub-list of details for each
relating to the connection, item are contracted.
determine how the name of the Full path, File name, Description from the
application is displayed, submenu next to Displayed application
name.
The application icons next to the Show icons from the submenu next to
application path, file, or description, Displayed application name.
6-6
Sunbelt Kerio Personal Firewall User Guide
Working with The Statistics tab lists system statistics for intrusion detection and Web content filtering.
Statistics
Figure 6-9 Statistics - Statistics on number of blocked intrusions and undesirable Web items
6-7
Sunbelt Kerio Personal Firewall User Guide
3 To reset all monitored statistics, click Reset all statistics. A confirmation dialog box opens.
• Click Yes to confirm the reset.
• Click No to cancel the reset.
6-8
Sunbelt Kerio Personal Firewall User Guide
Setting Set user preferences and advanced firewall parameters in the Overview section on the
Preferences tab.
Firewall
Preferences
Figure 6-12 Check for new version — New version is not available
6-9
Sunbelt Kerio Personal Firewall User Guide
3 Make a selection:
To... ...select...
set the firewall to automatically check for Automatically check for updates.
updates,
check for beta releases of new versions, Check for beta release. Beta versions are
versions of a program that are still being
developed and tested. Therefore, they might
operate smoothly and bugs may occur. Use
the Select this option to participate in
product testing.
generate a file that contains debugging Generate crash dump (useful when
information if the application crashes, reporting problem to Sunbelt Software).
In the event of a crash, a file containing
information relating to the crash is created,
and the Assist utility is launched. This utility
analyzes the crashdump file and decides
whether it has anything in common with
Sunbelt Kerio Personal Firewall. If the crash
is related to the firewall, the Assist Utility
provides Sunbelt Software with information
relevant to the crash to we can provide an
detailed analysis of the problem.
Note: Any received information will be used only for Sunbelt Kerio Personal
Firewall debugging. It will not be used for another purpose nor it will be passed on
to other parties.
6-10
Sunbelt Kerio Personal Firewall User Guide
Configuration
Sunbelt Kerio Personal Firewall enables users to import and export application configurations to
and from XML files. The option to import and export configuration files helps the firewall back-up,
recover and restore important application parameters.
To back up and restore application configuration files
1 Select Overview; then, click the Preferences tab.
2 Make a selection:
To... ...click...
open and restore configuration files, Import. Select the file to import from the
Source file selection window; then, click
Open. A confirmation dialog box opens if
the import was successful. Click OK.
backup the current configuration files, Export. Select folder in which to store the
file from the KPF 4.x file selection window;
then, click Save. A confirmation dialog box
opens if the import was successful. Click
OK.
Password Protection
It is possible to configure Sunbelt Kerio Personal Firewall so that it can be accessed only through
password authentication (only authorized users are then allowed to modify settings). In such case,
unauthorized users are allowed only to view the configuration; a password is required to make
changes.
Users can set a system password from the Preferences tab. If password protection is enabled, a
password is required to make any changes in the firewall configuration. We recommend that
authorized users logout using the Logout button after making changes so unauthorized users
cannot modify the configuration. It is also possible to log out from the menu accessed by right-
clicking the icon in the System Tray.
6-11
Sunbelt Kerio Personal Firewall User Guide
To set a password
1 Select Overview; then, click the Preferences tab.
2 Select the Enable password protection check box. The KPF - change password dialog box
opens.
3 If a password was set previously, type it in the Old password field. If not, this field is grayed
out.
4 Type the new password in the New password field; then, retype it in the Retype password
field.
5 Click OK to set the password, or click Cancel to close the dialog box without setting a
password. If the password was set successfully, a confirmation dialog box opens. Click OK.
Note: Only users with an authorized password can administer Sunbelt Kerio
Personal Firewall form a remote location. If the Enable password protection option
is disabled, remote administration cannot be enabled. The option is greyed out.
6 To all the this computer to be administered from a remote location, select the Allow remote
administration of this computer check box.
6-12
Sunbelt Kerio Personal Firewall User Guide
Remote Administration
Users can administer Sunbelt Kerio Personal Firewall from a remote location. All settings and
functions can be accessed from a remote computer.
To access Sunbelt Kerio Personal Firewall from a remote computer
1 Select the Overview section; then click the Preferences tab.
2 Select the Enable password protection check box. The Change Password dialog box opens.
Type the password information in the appropriate fields; then click OK.
3 Select the Allow remote administration of this computer check box.
4 Make a selection:
If... ...then...
Sunbelt Kerio Personal Firewall 4.x is select Remote Firewall Administration from
installed on the remote computer, the Sunbelt program group; then, run it.
6 To redirect alerts and notifications to the remote computer, select the Redirect events to this
session check box. After a successful connection the host name or IP address is displayed in
the header of the configuration window.
7 Click Connect to establish connection with the remote computer.
6-13
Sunbelt Kerio Personal Firewall User Guide
After successfully connecting to the firewall, the Sunbelt Kerio Personal Firewall icon in the
System tray has an R, symbolizing the remote connection. Right-click the icon to open a menu that
provides the following functions:
• Disable firewall – Select this options to deactivate the firewall (all security functions are
disabled).
• Stop All traffic – Select this option to stop incoming and outgoing traffic.
• Configuration – Select this option to open the user interface and configure necessary
settings.
• About – Select this option to view information about the individual versions of Sunbelt Kerio
Personal Firewall components as well as license information.
• Disconnect – Select this option to disconnect from the remote Firewall and close the interface
on the computer from which the remote access was granted.
Note: The following functions are not available for remote connections:
• Stop all traffic (this function would block connection of the Personal
Firewall Engine with the Personal Firewall GUI operating on the remote
host)
• Logout (users must be authenticated to be allowed to administer the
firewall remotely and they will be logged out automatically when
disconnected from the Personal Firewall Engine)
• Exit (the Personal Firewall Engine service cannot be closed remotely; the
Personal Firewall GUI running on the remote host can be closed using the
Disconnect option).
Preferred language
Users can select preferred language for the Sunbelt Kerio Personal Firewall user interface.
To set a preferred language
1 Select Overview; then, click the Preferences tab.
2 Select a language from the Preferred language drop-list.
3 Click OK or Apply. Close the interface; then re-open it. Notice that the new language is used.
The Personal Firewall Engine detects which language versions are available; then, populates the
Preferred language drop-list with the available versions.
Preferred language also affects the language in the help file. If a corresponding help file for the
language is not found, Sunbelt Kerio Personal Firewall uses the English version of the help file.
6-14
Sunbelt Kerio Personal Firewall User Guide
Network Security
Defining the network communication rules is one of the most important parts of the Sunbelt Kerio
Personal Firewall configuration. This chapters covers the following topics:
Section Page
Rules 7-2
7-1
Sunbelt Kerio Personal Firewall User Guide
What is The Network Security section controls all incoming and outgoing communication to and from your
computer or computer network. Sunbelt Kerio Personal Firewall includes a set of predefined
Network network security rules (i.e. for DNS, DHCP, etc.). These rules are separate from user-defined rules
Security? and can be enabled or disabled at any time.
How are When a communication is detected, individual modules apply rules in a pre-defined order. If the
communication meets the criteria for a rule, a corresponding action is taken. If one rule is applied
Rules
to a communication, no more rules are applied. Rules for individual Sunbelt Kerio Personal
Applied? Firewall modules are applied in the following order:
1 Intrusion detection system (IDS)
2 Network traffic Inspection (automatically lets in/out packets which belong to permitted
connections),
3 Internal rules for Sunbelt Kerio Personal Firewall components — i.e. permission to access a
web server in order to check and download new versions of the program
4 Advanced packet filter rules
5 Predefined network security rules
6 Application rules
Note: If individual firewall components are disabled, corresponding rules are not
applied. Internal firewall rules cannot be switched off.
7-2
Sunbelt Kerio Personal Firewall User Guide
Application View and modify Application rules on the Applications tab under the Network Security section.
Rules Note: The following information is for cases when Sunbelt Kerio Personal Firewall
is in Advanced mode. In the Simple mode, all outgoing traffic is allowed and all
incoming communication is denied for any application (both for trusted zones and
the Internet) and rules are not automatically created.
Note: Users cannot edit icons and descriptions of applications in Sunbelt Kerio
Personal Firewall.
Trusted, Internet In/Out – Lists the settings for how applications behave during a connection.
Select one of the following actions for each zone and direction:
• permit – allows the connection
• deny – blocks the connection
• ask – asks the user to permit or deny the connection. Anytime a new connection is detected,
an alert dialog box opens and ask the user to make a decision.
Note: Rules can be edited in the Connection Alert dialog using the Create a rule
for this communication option. If this option is selected, the default Ask action is
switched to an action selected by the user.
Log – Lists whether or not communication that meet the rule is logged into the Network log.
Alert – Lists whether or not an alert connection that meets the rule is detected.
Use the Edit button to edit a selected rule. Use the Remove button to remove a selected rule. Use
the Refresh button to refresh the rule list.
7-3
Sunbelt Kerio Personal Firewall User Guide
Defining Rules
Only one rule can be defined for each application. The order in which the rules are defined is not
important.
To configure basic application rules
1 Click Network Security; then click the Applications tab.
2 Make a selection:
To... ...select...
enable the Network Security Module, Enable Network security module check box.
remove a rule from the list, a rule on the list; then, click Remove. A
confirmation dialog box opens:
• Click Yes to remove the rule.
• Click No to cancel the removal.
3 Make a selection for new rules and refreshing the current list:
To... ...click...
add, edit, insert, or remove an advanced Packet filter.... The Network Security -
packet filter rules and/or IP group, Advanced Packet Filter dialog box opens.
7-4
Sunbelt Kerio Personal Firewall User Guide
3 Make a selection:
To... ...select...
set the permissions for connections from Deny, Ask User, or Permit from the
a trusted area, Incoming connection drop-list under the
Connections from/to trusted area section.
set the permissions for connections to a Deny, Ask User, or Permit from the
trusted area, Outgoing connection drop-list under the
Connections from/to trusted area section.
set the permissions for connections from Deny, Ask User, or Permit from the
the Internet, Incoming connection drop-list under the
Connections from/to Internet section.
set the permissions for connections to the Deny, Ask User, or Permit from the
Internet, Outgoing connection drop-list under the
Connections from/to Internet section.
log communications that meet this rule to the Log communication to network log
the network log, check box.
enable the Alert dialog box for the Show alert to user check box.
connections meeting this rule,
7-5
Sunbelt Kerio Personal Firewall User Guide
Default Rule
The Another application rule (the default rule) is always located at the end of the list of application
rules. This rule applies to network traffic that does not match any other rule. The default rule is
highlighted in the rule list. It cannot be removed.
Note: You can set actions in the Any other application rule in order to switch
between firewall modes:
• If at least one ask action is in the rule, the firewall works in the Advanced
mode. Whenever unknown traffic is detected, you are asked to take an action;
the traffic is handled according to your decision.
• If only the permit and/or deny actions are set for zones and directions, the
firewall works in Simple mode. If unknown traffic is detected, a corresponding
action is taken without asking the user.
The default rule is also used as a template for new rules that are automatically
created after you click Permit or Deny on an Alert dialog box.
2 Make a selection:
To... ...select...
list an application by its path, name, or Displayed application name; then, one of
description, the following from the sub-menu:
• Full path
• File name
• Description.
Use the Show icon option to enable/disable
application icons before the application
name or description.
7-6
Sunbelt Kerio Personal Firewall User Guide
3 Do one of the following to update the permissions under the Trusted or Internet columns:
• left-click to switch between the Permit, Deny and Ask actions.
• right-click to open a context menu and select an action.
Packet Filter Packet filter rules allow you to define advanced rules for specific network communication. You can
define the local application and traffic direction, protocol, remote IP addresses, and remote and
Rules
local ports.
Filter Rules
Rules for packet filter can be defined as follows:
• Manually – Open the Advanced Packet Filter dialog where packet filter rules can be viewed,
edited and removed (for details see below).
• Automatically – the Connection Alert dialog box pops-up when a connection does not meet a
rule; if the Create an advanced filter rule option is selected, a packet filter rule is created
instead of a standard rule.
Note: Packet filter rules do not distinguish between trusted area and the
Internet (an IP address, subnet, IP group, etc. are always specified in the
rule).
7-7
Sunbelt Kerio Personal Firewall User Guide
The Filter Rules tab lists the rules for advanced packet filters. The rules are listed in the order
in which they will be applied when a connection is detected. The first rule that the traffic meets
is applied. The rules are applied from top to bottom.
Packet filter rules can also be classified by groups. If a rule is in a group, it does not affect how
rules are applied. Rules that are part of a group are for reference only. Rule groups are
displayed on the left of the Filter Rules tab.
3 Make a selection:
To... ...click...
edit an existing rule, Edit. The Filter rule dialog box opens.
add a new rule, Add. The Filter rule dialog box opens.
insert a rule above an item on the list, Insert. The Filter rule dialog box opens.
select a rule in the list; then,
remove a rule from the list, Remove. The rule is deleted from the list.
refresh the current list of rules, Refresh. The list of rules returns to it’s
original state. For example, if you deleted a
rule without clicking Apply, the rule is added
back to the list.
7-8
Sunbelt Kerio Personal Firewall User Guide
Use the scroll bar to view more information about the rules.
4 Click on a group name to view the list of rules included in the group. The following two groups
are predefined and they cannot be removed:
• All rules (“parent group”) — includes all packet filter rules.
• Default — includes all rules which have not been added into another group.
Note: Groups of rules cannot be created nor removed explicitly. New groups
can be created by entering a new group name during a rule definition. Groups
are removed automatically when the last rule is removed.
7-9
Sunbelt Kerio Personal Firewall User Guide
7-10
Sunbelt Kerio Personal Firewall User Guide
To... ...select...
add a description or name for the new the Description field; then type the
rule, description or name. We recommend typing
a brief rule description (purpose, application
name, etc.). This description is for reference
only. The name of the local application is
inserted for rule that are automatically
generated.
add the location of the application to the location from the Application drop-list,
which the rule is applied, or click Browse, then select the application
from the Application selection dialog box.
You can also type the location manually. if
you leave this field blank, a general rule will
be created and applied to all applications.
assign the new rule to a group, the group from the Group drop-list.
log communications that meet the criteria the Log to network log check box.
for rule in the network log,
enable an alert dialog box when network the Show alert to user check box.
traffic meets the criteria for this rule,
7-11
Sunbelt Kerio Personal Firewall User Guide
To... ...click/select...
add parameters for a protocol to which the Add. The Filter rule - protocol dialog box
rule will be applied, opens. See To add filter rule protocol
parameters, page 7-15.
edit parameters for a protocol to which the Edit. The Filter rule - protocol dialog box
rule will be applied, opens.
To... ...click/select...
add a single port or port range, Add. Select Add port or Add port range from
the drop-list. The Filter rule - port dialog
box opens. See To add local port settings,
page 7-17.
edit a single port or port range, a port or port range; then click Edit. The
Filter rule - port dialog box opens.
delete a single port or port range, a port or port range; then, click Remove.
7-12
Sunbelt Kerio Personal Firewall User Guide
To... ...click/select...
add a remote port, IP address, or IP Add; then make a selection from the drop-
group, list:
• Add port
• Add port range
• Add address
• Add address range
• Add address / mask
• Add IP group
The Filter rule - port dialog box opens.
edit a remote port, IP address, or IP a item from the list, click Edit; then make a
group, selection from the drop-list:
• Add port
• Add port range
• Add address
• Add address range
• Add address / mask
• Add IP group
The Filter rule - port dialog box opens.
remove a remote port, IP address, or IP a item from the list; then, click Remove.
group,
7-13
Sunbelt Kerio Personal Firewall User Guide
8 Make a selection regarding the direction of the communication and an action to take when a
network communication meets the rule:
To... ...select...
apply the rule to incoming and outgoing Both under the Direction section. This is
network connections, the default selection.
apply the rule only to incoming network Incoming under the Direction section.
connections,
apply the rule only to outgoing network Outgoing under the Direction section.
connections,
permit a network communication that Permit under the Action section. This is the
meets the rule, default selection.
7-14
Sunbelt Kerio Personal Firewall User Guide
Protocol Parameters
Use the following procedure to set protocol parameters for the rule. Typically, a single protocol is
used for traffic (i.e. TCP or UDP), however, some applications use multiple protocols concurrently
(i.e. TCP and UDP using the same ports). If the Protocol is left empty, the rule is applied to any
protocol. If an application uses TCP and UDP protocols at various ports, two different packet filter
rules must be defined.
To add filter rule - protocol parameters
1 Click Network Security; then click the Applications tab.
2 Click Packet Filter.... The Network Security - Advanced Packet Filter window opens.
3 Click Add. The Filter rule dialog box opens.
4 Click Add under the Protocol section. The Filter rule - protocol dialog box opens.
5 Select the type of protocol from the Name drop list. The number (specifying the protocol in the
IP packet header) automatically populates the Number field, and a description for the rule
populates the Description field. See the Glossary, page 13-1, for complete definitions.
• TCP – Transmission Control Protocol
• UDP – User Diagram Protocol
• ICMP– Internet Control Message Protocol
• IGMP – Internet Group Management Protocol
If you select the ICMP protocol, the Types field appears below the Description field.
7-15
Sunbelt Kerio Personal Firewall User Guide
To use more than the general ICMP protocol, click Select to open the Filter Rule - protocol
[ICMP types] dialog box.
Select the check box(es) next to the protocol types; then click OK. You return to the Filter rule
- protocol dialog box. The numbers relating to the protocols, are listed in the Types field. If
more than one protocol is selected, the numbers are separated by commas.
6 Click OK to add the Protocol.
7-16
Sunbelt Kerio Personal Firewall User Guide
To edit a rule
1 Click Network Security; then click the Applications tab.
2 Click Packet Filter.... The Network Security - Advanced Packet Filter window opens.
3 Click Edit. The Filter rule dialog box opens.
4 Edit the necessary parameters; then click OK.
7-17
Sunbelt Kerio Personal Firewall User Guide
IP Groups
IP groups enable packet filter rules to be easily defined. Use the groups to specify the Remote
entry in the dialog for packet filter rule definition. IP groups can be viewed and defined in the IP
Group tab of the Advanced Packet Filter dialog box.
Is enabled
Select or clear this option to enable or disable the item. This option is identical to the matching field
next to the item name in the IP Groups tab. If the Is enabled is cleared, the item is not active. This
means that it is not included in the group.
7-18
Sunbelt Kerio Personal Firewall User Guide
Group name
Name of the group to which the item will be included. Specify the item using one of the following
methods:
• select a name from the menu — the item will be added to this group
• enter a new group name — this group will be created automatically and the item will be added
to the new group
Type
Type of the new item:
• Host — IP address of one computer
• Address range — define the First and Last address to specify IP range
• Address / mask — subnet defined by an IP address and mask
• Address group — another IP address group (IP addresses can be embedded into each other)
7-19
Sunbelt Kerio Personal Firewall User Guide
Predefined Sunbelt Kerio Personal Firewall contains several predefined rules. These rules are independent
from individual applications; they are applied globally. Decide whether individual predefined rules
Rules will be used or not.
To manage predefined network security
1 Click Network Security; then the Predefined tab to view a list of the predefined rules for
network traffic.
Predefined rules cannot be added or removed. However you can set actions relating to
Trusted areas and the Internet for each rule.
2 To switch between permit and deny, click on the action (under Trusted or Internet) for the rule.
3 To enable or disable (respectively) predefined rules for network communication, select or clear
the Enable predefined network security option. If this option is not selected, predefined rules
are ignored and Sunbelt Kerio Personal Firewall only uses application and advanced packet
filter rules.
4 To restore actions for predefined rules to default values, click Set to defaults.
Predefined Rules
Brief descriptions for the predefined network security rules are listed below.
Internet Group Management Protocol
The IGMP used to subscribe groups of multicast users. This protocol is disabled by default
because can be misused easily. Do not to enable this protocol unless you run applications that use
multicast technologies (typically for transmitting audio or video data through the Internet).
Ping and Tracert in, Ping and Tracert out
Programs Ping and Tracert (Traceroute) trace routes in a network to detect response of a remote
computer. This is achieved through ICMP (Internet Control Message Protocol) messages.
First, a possible attacker tests if an elected IP address responds to control messages. Blocking
these messages makes your computer invisible and reduces the chances of possible intrusions.
All incoming Ping and Tracert messages (from the Internet) are blocked by default. However,
these messages are allowed from the trusted area (i.e. an administrator can test availability of a
7-20
Sunbelt Kerio Personal Firewall User Guide
computer by the Ping command). Outgoing Ping and Tracert messages are permitted for both
areas. These methods are usually used to verify network connection functionality or availability of
a remote computer.
Other ICMP packets
Rules for other ICMP messages (i.e. redirections, destination is not available, etc.)
Dynamic Host Configuration Protocol
DHCP is used for automatic definition of TCP/IP parameters (IP address, network mask, default
gateway, etc.).
Warning: DHCP denial might cause that network connection of your computer will
not work if TCP/IP parameters are defined through this protocol.
7-21
Sunbelt Kerio Personal Firewall User Guide
Trusted Area Sunbelt Kerio Personal Firewall application rules uses two types of IP groups: trusted area and the
Internet. Separate actions for incoming and outgoing traffic can be defined for each area. Trusted
area is a user-defined IP group. Addresses that are not defined as trusted are automatically added
to Internet zone.
Click Network Security; then, the Trusted area tab to define a trusted area.
Figure 7-20 Network security / Trusted area section — Trusted area definition
Trusted areas can include any number of IP addresses, IP address ranges, subnets or networks
connected to a particular interface. It is possible to specify an interface on which particular IP
addresses are permitted for each item (protection from false IP addresses).
The Trusted area includes the predefined Loopback item. This item cannot be removed. It is a
local loopback address and it is always considered trusted.
To add/edit a trusted area
1 Click Add or Edit. The Zone definition dialog box opens.
2 Type a description for the area in the Description field. This field is for reference only. It is
recommended to provide description of the IP range, network, etc.
3 Select an adapter (interface) for which the IP addresses are used. This function protects users
from false IP addresses — whenever a packet with a trusted address is received from an
adapter that is not connected into the particular network, the packet is not trusted.
Select Any if you do not want Sunbelt Kerio Personal Firewall to check adapters from which
packets with a particular IP address were sent.
7-22
Sunbelt Kerio Personal Firewall User Guide
4 Select the type of item the address represents for the Address type drop-list.
• Computer — a particular IP address of a computer (or a network device)
• IP address / mask — subnet defined by IP address and mask of the network
• IP address / range — IP range defined by first and last IP address
• All addresses — any IP address
Advanced Use the Advanced tab to set more advanced network security parameters.
settings
Note: The gateway mode and the advanced logging cannot be combined. In the
gateway mode, these packets are automatically let in (they are addressed to other
hosts).
7-23
Sunbelt Kerio Personal Firewall User Guide
Boot time Sunbelt Kerio Personal Firewall's network traffic low-level driver protects computers even when
the firewall is not running. This type of protection provides security for your computer at startup,
Protection during product updates, or when the Personal Firewall Engine service is not launched for any
reason.
This function is enabled by default. It can be disabled or enabled in the firewall's GUI whenever
necessary.
If Boot time protection is enabled, Sunbelt Kerio Personal Firewall's network traffic low-level driver
behaves as follows:
• Only outgoing traffic is allowed and all incoming traffic is blocked upon startup. This implies
that the server is always protected, however, its services are not available in this mode.
• If the Personal Firewall Engine does not start within in 5 minutes of the operating system
startup, the driver is switched to the mode when it allows any traffic. This behavior ensures
that communication with the server is not blocked in case the Personal Firewall Engine cannot
be started for any reason.
• After the Personal Firewall Engine starts, the firewall permits and denies traffic in accordance
with the defined network security rules.
• When the operating system is shut down (or being restarted), the firewall's driver blocks any
incoming or outgoing traffic. This behavior ensures that the server is protected even when the
Personal Firewall Engine service has stopped, but the network subsystem is not active.
• When the Sunbelt Kerio Personal Firewall service is stopped, the driver is switched to the
mode where it permits all network traffic.
7-24
Sunbelt Kerio Personal Firewall User Guide
Detecting If the Advanced mode of the firewall is selected as default during the installation, the Sunbelt Kerio
Personal Firewall automatically detects active network interfaces of the computer on which it is
New Network installed. After each new interface is detected, you are asked whether the interface is connected to
Interfaces a trustworthy network.
The name in the Name field is name of a corresponding network adapter. Below it is the IP
address of this adapter and the mask of the network to which it is connected. Name of the
interface can be edited (it is recommended that you provide a short and apt description, e.g.
Network card, Internet line, etc.). ID of the adapter detected at the corresponding controller is used
as the name by default.
if you click Yes, it is, the subnet to which the interface is connected adds the IP address to the
group of trustworthy IP addresses (Trusted area). If you click No, it isn't, it is considered as a part
of the Internet.
• Anytime, group of trustworthy IP addresses can be edited. Whenever any other interface is
added or enabled or an interface is connected to a new subnet, Sunbelt Kerio Personal
Firewall detects it and the New network interface dialog is opened.
• As to dial-ups, the telephone number which is being dialed is displayed. User can enable or
disable this connection.
• Sunbelt Kerio Personal Firewall finds out whether the telephone number has been changed
since the dial-up was dialed the last time (this protects users from undesirable change of dial-
up configuration).
7-25
Sunbelt Kerio Personal Firewall User Guide
Checking Sunbelt Kerio Personal Firewall can detect and block changes to dialed telephone numbers. This
protects users from their dial-ups being redirected to high-price services. Connections can be
Dialed redirected without informing the user (for example by an ActiveX object on a Web page). If a
Telephone change is detected, Sunbelt Kerio Personal Firewall asks user to accept or reject the change. If
Numbers the change is rejected, the line is hung-up immediately.
How it works
As soon as an unknown connection is attempted, an alert asks the user whether or not the
interface is connected to a trustworthy network (as in case of a new network adapter. The dial-up
is considered as an interface in the Network security section.
If you click Yes, a dialog box opens. Set the interface parameters relating to the dial-up number.
7-26
Sunbelt Kerio Personal Firewall User Guide
The following options are available for the Dialup number item:
• Ask — whenever a number is dialed, Sunbelt Kerio Personal Firewall asks you to accept or
reject this number. If accepted, the firewall remembers the number. Otherwise, the line is
hung-up immediately. If the new number is accepted, the Always use this number alternative is
selected automatically and the number is saved.
• Always use this number — this option tell the firewall that the dial-up number is not to be
changed. Whenever a change is detected, the New dial-up number dialog box opens and the
user is asked to accept or reject the change.
The Dial-up number item provides the new telephone number (the number that is currently set
for the dial-up connection).
Click Yes, continue so that Sunbelt Kerio Personal Firewall accepts the number, or No, to hang
up to reject the change.
• Do not monitor number change — the firewall ignores changes to the dial-up number and
always permits the line to be dialed. This option can be used in cases such as testing.
Warning: This option is not secure (the firewall does not detect possible
changes of the dial-up number) and it is not recommended to use it for the
default dial-up connection!
7-27
Sunbelt Kerio Personal Firewall User Guide
Sunbelt Kerio Personal Firewall includes predefined rules that allow network communication for
specific cases (i.e. license registration, product update, etc.). These rules also allow some
applications (system components) to startup. Internal firewall rules are applied prior to user-
defined rules. Internal rules cannot be disabled nor modified. This chapter covers the following
topics:
Section Page
8-1
Sunbelt Kerio Personal Firewall User Guide
Internal Internal network traffic rules enable network traffic between individual firewall components during
local or remote administration, Sunbelt Software registration, or check for new versions. Internal
Network network traffic rules are not displayed in Personal Firewall user interface.
Traffic Rules
Remote configuration
This rule allows a remote Personal Firewall GUI to connect to the Personal Firewall Engine. If
remote administration is enabled, connections from any host are permitted. If not, only a
connection from local host is enabled.
Note: This rule allows only local connections (i.e. connections to the Personal
Firewall Engine installed on the same computer). In case of remote
administration, the Personal Firewall GUI is considered as a standard network
application and network traffic policy is applied.
DNS Queries
This rule allows Sunbelt Kerio Personal Firewall components to send DNS queries to any DNS
server. DNS queries are used to map host names that will be displayed in the Personal Firewall
GUI, resolve destination IP addresses when accessing a remote administration, etc.
8-2
Sunbelt Kerio Personal Firewall User Guide
Update checker
This rule allows access to servers where new versions of Sunbelt Kerio Personal Firewall can be
downloaded.
Note: The server is not specified since various servers can be used for this
purpose.
Rem.
Condition Application Direction Protocol Rem. port
address
The Personal Firewall automatically resolves the connection between the IP address and the port
proxy server.
Product registration
This rule allows Sunbelt Kerio Personal Firewall license registration on a corresponding server.
The Personal Firewall automatically resolves the connection between the IP address and the port
proxy server.
8-3
Sunbelt Kerio Personal Firewall User Guide
Syslog
If logging to the Syslog server is enabled, this rule allows the Personal Firewall Engine to connect
to the Syslog server.
IP address and port of the Syslog server specified in the Syslog section of the Settings tab.
System The rules listed below allow various components of the operating system to startup. Internal
system security rules are listed in this section. These rules cannot be removed, however, users
Security
can set actions for them (logging, notices, etc.).
Rules
Some of these internal rules are applied only in certain versions of Windows operating systems
(some system components differ in individual versions).
Rules for Operating System components
The following symbols are used in the description of system component rules to define file path:
• WIN_DIR — the main directory of the Windows operating system (typically, C:\WINNT for
Windows NT/2000, C:\WISK33lzNDOWS for other versions)
• SYS_DIR — system directory of Windows (typically, C:\WINDOWS\SYSTEM for Windows 98/
Me, C:\WINNT\SYSTEM32 for Windows NT/2000, and C:\WINDOWS\SYSTEM32 for
Windows XP)
Rules which are common to all versions of Windows
8-4
Sunbelt Kerio Personal Firewall User Guide
8-5
Sunbelt Kerio Personal Firewall User Guide
AVG If the AVG antivirus is detected when the Sunbelt Kerio Personal Firewall is started first time
(immediately after the installation or after the kpf.cfg configuration file is removed), the following
Component rules that allow network traffic for the antivirus components are automatically added to the Network
Rules security/ Applications section.
• The first rule allows the AVG E-mail Scanner component to communicate with mail servers. All
data between the mail client and servers passes through E-mail Scanner.
• The second rule enables automatic updates of the AVG and virus database at corresponding
servers.
User can change the rules for the AVG. If these rules are removed, Sunbelt Kerio Personal Firewall
treats the AVG communication as an unknown communication.
Warning: If you really use AVG, we recommend you not to remove these rules.
The removal might block automatic update (the antivirus would not be able to
detect new viruses), or problems with email might arise.
8-6
Sunbelt Kerio Personal Firewall User Guide
Intrusion Detection
Sunbelt Kerio Firewall uses three systems to prevent network intrusions and malware installation,
as well as behavior monitoring. This chapter covers the following topics:
Section Page
Intrusions 9-2
9-1
Sunbelt Kerio Personal Firewall User Guide
Intrusions Use the three systems in the Intrusions section protect your computer against harmful intrusions:
• Network intrusion prevention system (NIPS) — this system recognizes and blocks various
types of network intrusions by blocking network connections that might be used to transfer
dangerous data.
• Host intrusion detection and prevention system (HIPS) — this system recognizes and
blocks malware used by intruders or viruses to run malicious codes.
• Behavior Blocking — this system monitors application behavior, such as an application being
started by another process or modified application.
9-2
Sunbelt Kerio Personal Firewall User Guide
Network Sunbelt Kerio Personal Firewall detects and blocks many types of network intrusions. It uses an
internal intrusion database that is automatically updated each time a new version of the firewall is
Intrusion installed or updated. This is one reason you should update Sunbelt Kerio Personal Firewall after
Prevention receiving an alert that an update is available.
System The Sunbelt Kerio Personal Firewall uses the Network Intrusion Detection and Prevention System
(NIPS) (NIPS) to scan network traffic and block attacks based on a database of known attack signatures.
Note: NIPS rules are stored in the config\IDSRules subdirectory of the installation
directory (C:\Program Files\Sunbelt\Personal Firewall 4\config\IDSRules by
default).
NIPS Parameters
NIPS parameters enable you to set specific actions for high, medium, and low priority intrusions,
as well as whether or not the intrusions will be recorded in the NIPS log.
To enable NIPS and set NIPS parameters
1 Click Intrusions. The Main tab opens. See Figure 9-1 Intrusions on page 9-2.
2 Select the Enable Network Intrusion Prevention System (NIPS) check box.
3 Click Advanced. The Intrusion Prevention System Settings dialog box opens.
9-3
Sunbelt Kerio Personal Firewall User Guide
4 Make a selection:
To... ...select...
set an action for critical intrusions that Permit or Deny from the Action drop-list
could seriously damage your computer, under High Priority Intrusions. We
recommend setting the action to Deny.
set an action for medium intrusions like Permit or Deny from the Action drop-list
blocked services or connections, under Medium Priority Intrusions. We
recommend setting the action to Deny
set an action for low-level intrusions like Permit or Deny from the Action drop-list
errors, invalid formats, etc., under Low Priority Intrusions. We
recommend setting the action to permit. You
do not want to block necessary services.
record high, medium, and low priorities to the Log to NIPS log check box under the
the NIPS log, High, Medium, and Low priority Intrusion
sections.
record the results of port scans to the the Log to NIPS log check box under the
NIPS log, Port scan section. Port Scans are attacks
that detect open ports on a particular
computer. Attack to open ports cannot be
blocked, they can only be detected. Closed
ports are blocked automatically.
5 Click Details.... The IPS details dialog box opens. It lists the possible intrusions. Click Close
to return to the Intrusion Prevention System Settings dialog box.
The IPS Details dialog box lists describes the type of attack and where you can find more
information.
6 Click OK to save the parameters and return to the Main tab.
9-4
Sunbelt Kerio Personal Firewall User Guide
Host Host Intrusion Prevention System (HIPS) targets applications or viruses trying to harm your
computer. Disabling harmful applications helps protect you from security leaks in applications
Intrusion and running on the server.
Prevention
Buffer Overflow
System
A buffer is an area on your computer reserved for temporarily storing information while it is waiting
(HIPS) to be transferred between locations (either on your computer or between your computer and
another device).
Buffer Overflow
Buffer overflow is when a process attempts to store more data in a buffer than there is memory
allocated for it. The extra data overwrites adjacent memory locations. Buffer overflows can cause
processes to crash or produce incorrect results. They can be triggered by applications or viruses
designed to execute malicious code or to make the program operate in an unintended way.
Code Injection
Code injection is a technique used to insert malicious code into a running computer process. This
can be done either locally or remotely through the web. Locally means that an application writes
malicious code into another application's address space; when run, it appears as if the host
application is responsible. The malicious code is executed using a trustworthy process.
HIPS configuration
HIPS parameters enable you to limit and control the size of buffers and prevent code injection.
To enable HIPS and set HIPS parameters
1 Click Intrusions. The Main tab opens. See Figure 9-1 Intrusions on page 9-2.
2 Select the Enable Host Intrusion Prevention System (HIPS) check box.
3 Click Advanced. The Host Intrusion Prevention System - Advanced Settings dialog box
opens.
9-5
Sunbelt Kerio Personal Firewall User Guide
a disable codes from executing in case of Block buffer overflow code execution
buffer overflow, check box.
log code executions attempted during Log attempts to HIPS log check box.
buffer overflow to the HIPS log,
disable alert windows that would notify Don’t show any alerts for this event type
you if a code attempts to execute during check box.
buffer overflow,
5 To specify an executable to which a buffer overflow alert will not apply, click Exceptions....
The Buffer Overflow Exceptions dialog box opens. See to add an exception to buffer
overflow parameters, page 9-7.
6 Make a selection under Code injection:
block malicious code form being injected Block executable code injection check
into running processes, box.
log code injection attempts to the HIPS Log attempts to HIPS log check box.
log,
disable alert windows that would notify Don’t show any alerts for this event type
you if a code attempts inject itself into a check box.
running process,
7 To specify an executable to which a code injection alert will not apply, click Exceptions.... The
Code Injection Exceptions dialog box opens. See to add an exception to code injection
parameters, page 9-8.
Code injection technology is used by various legitimate applications — these applications will
not function correctly. Sunbelt Kerio Personal Firewall allows to define exceptions, i.e. list of
applications which can use this technology. Exception for an application can be defined in the
Code injection exceptions dialog (opened by the Exceptions option) where a relevant
executable file can be browsed.
8 Click OK to save the parameters and return to the Main tab.
9-6
Sunbelt Kerio Personal Firewall User Guide
2 Make a selection:
To... ...click...
edit an existing item, Edit... after selecting an item from the list.
The Edit Buffer Overflow Exception dialog
box opens. Click Browse... to search for
then select an item; then click OK.
remove an existing item, Remove. The item is removed from the list.
3 Click OK. You return to the Host Intrusion Prevention System - Advanced Settings dialog
box.
9-7
Sunbelt Kerio Personal Firewall User Guide
2 Make a selection:
To... ...click...
edit an existing item, Edit... after selecting an item from the list.
The Edit Code Injection Exception dialog
box opens. Click Browse... to search for
then select an item; then click OK.
remove an existing item, Remove. The item is removed from the list.
3 Click OK. You return to the Host Intrusion Prevention System - Advanced Settings dialog
box.
9-8
Sunbelt Kerio Personal Firewall User Guide
Application Sunbelt Kerio Personal Firewall controls all applications used in the operating system, regardless
of whether or not they use network communication. This control enables it to immediately detect
Behavior when an application is infected by a new virus or attacked by malware. This differs from anti-virus
Blocking (AV) software in that AV software usually takes some time to detect a virus; then, it must find an
appropriate virus database.
Application behavior Blocking Configuration
Use Application Behavior Blocking to set behavior blocking parameters that enable you to control
applications on your computer.
To enable application behavior blocking an set blocking parameters
1 Click Intrusions. The Main tab opens. See Figure 9-1 Intrusions on page 9-2.
2 Select the Enable Application Behavior Blocking check box.
3 Click Advanced. The Application Behavior Blocking dialog box opens.
Rules in the Main tab define how the firewall will behave in the following situations:
• When application is about to start – the action is taken at the time the application launches.
• When application has been modified – the action is taken at the time an application’s
executable file is modified. Each time an application is started and exited, Sunbelt Kerio
Personal Firewall creates a snap shot of the application parameters. The next time it starts
the application, it creates a new snap shot and compares it to the previous one.
• When application is about to launch another application – the action is taken when another
application is started by a application that is already running.
One of the following options can be set for each of the situations
• automatically permit the action — Sunbelt Kerio Personal Firewall does not block application
startup (it accepts change of the executable file)
• use existing behavior blocking rules or ask me — a behavior blocking rule for a particular
application will be used (if it exists) or user will be asked
9-9
Sunbelt Kerio Personal Firewall User Guide
4 Click the Applications tab to view and edit rules for startup and change of particular
applications.
These rules are created when your respond to alerts. After permitting or denying a
communication alert, a rule for that application is added to this list. You cannot create rules on
this tab, only edit or remove them.
5 Make a selection:
To... ...select...
edit an application rule, a rule from the list; then, click Edit. The
Behavior Block for [name of app] dialog
box opens. See procedure below.
remove an application from the list, a rule from the lit; then, click Remove.
9-10
Sunbelt Kerio Personal Firewall User Guide
3 Make a selection:
To... ...select...
set the behavior of the application when it Permit, Ask user, or Deny from the When
starts, this application is starting drop-list.
set the behavior of the application if it Permit, Ask user, or Deny from the When
starts after being modified, starting modified application drop-list.
set the behavior for the application of it Permit, Ask user, or Deny from the When
starts another application, this application is launching another
drop-list.
record communications to the behavior the Log to Behavior log check box.
log,
make sure the user see an application the Show alert to user check box.
alert,
4 Click OK. You return to the Application Behavior Blocking dialog box.
If you want to make quick changes to the actions for an application, there are two other ways to
available to make those changes:
• Click an action under the Modifying or Launching others headings; then, toggle through the
permit, deny and ask options.
• Right-click an action; then, make a selection from the context menu
9-11
Sunbelt Kerio Personal Firewall User Guide
Use Web Content Flittering to block ads, set privacy parameters, and establish which web sites
meets exceptions to the blocking rules. This chapter covers the following topics:
Section Page
10-1
Sunbelt Kerio Personal Firewall User Guide
Ad Blocking, Use the Ad Blocking tab to set the parameters need to filter advertisements, pop-ups, and web
content.
Privacy and
Site To configure ad blocking, privacy, and site exception parameters
Parameters
block pop-ups and pop-under windows, Block pop-up and pop-under windows
check box under the Popups section. A
pop-under window is one that opens under
the active browser window.
temporarily override the pop-up and pop- Temporarily override by pressing down
under blocking using the Ctrl or F12 key, the [key name] Key check box under the
Popups section. Select the Ctrl or F12 from
the drop-list.
block visual basic scrips, Block VBScripts check box under the Web
content section.
10-2
Sunbelt Kerio Personal Firewall User Guide
Warning: The F12 key may cause a conflict with the Microsoft debugger. If
you use the Microsoft Visual Studio, we recommend using the Ctrl key.
Note: The java and VB script options might cause problems displaying of
some pages. If so, define special rules for such page in the Exception Sites
tab, or disable the Block pop-up and pop-under windows option, and use
another method to filter ads (i.e. the Block advertisements option).
filter cookies from third-party servers, Filter foreign cookies check box under
Cookies.
filter cookies that send information each Filter persistent cookies check box under
time a web site is visited, Cookies.
temporary cookies that are only used Filter session cookies check box under
when a user opens a particular page, Cookies.
block the URL address of the page from Deny servers to trace web-browsing
which the user opened the current page check box under Referer.
so that your browsing habits cannot be
easily monitored,
block your private information form being Block private information check box under
sent through forms on web pages, Private Information; then, click Set.... The
Blocked private information dialog box
opens.
To... ...select...
edit a web server for which special filter a web server from the list; then, click Edit.
rules will be defined,
remove a web server, a web server from the list; then, click
Remove.
9 Click OK to save the information and close the Sunbelt Kerio Personal Firewall window, or
click Apply to save the information and keep the window open.
10-3
Sunbelt Kerio Personal Firewall User Guide
2 To add a server to the list, click Add.... See To add a web server to the advertisement blocking
list, below.
3 Make a selection:
To... ...select...
edit a web server, a web server from the list; then, click Edit.
remove a web server, a web server from the list; then, click
Remove.
10-4
Sunbelt Kerio Personal Firewall User Guide
Site Exceptions for individual Web servers are helpful especially when the general content filter rules
cause certain Web pages or some of their items to not function properly (i.e. new windows cannot
Exceptions be opened, it is not possible to login through an email address, etc.). Sometimes they are
completely blocked.
Before you define a rule exception for a server, consider carefully whether the server is trustworthy
or not, and the types of objects (scripts, cookies, private data) that are required for smooth
functionality. The Exception tab includes one predefined rule. This rule allows automatic Microsoft
updates and allows updates from windowsupdate.microsoft.com.
To add a site exception
1 Click Web; then the Site exceptions tab.
2 Click Add.... The Edit exception site dialog box opens.
10-5
Sunbelt Kerio Personal Firewall User Guide
Logs store the history of module: Network, System, Intrusions and Web. The other logs (Error,
Warning and Debug) store information about Sunbelt Kerio Personal Firewall processes. This
information can help the Sunbelt technical support team to solve possible problems with the
firewall. This chapter covers the following topics:
Section Page
11-1
Sunbelt Kerio Personal Firewall User Guide
Viewing Logs Log files are stored in the logs in a subdirectory where Sunbelt Kerio Personal Firewall is installed
(typically C:\Program Files\Sunbelt\Personal Firewall 4\logs). The file has the .log extension (i.e.
and Alerts network.log). An index file is included in each log. This file has the .idx extension (i.e.
network.log.idx).
To view module logs and set logging parameters
1 Click Logs & Alerts. The Logs tab opens.
2 Click a module tab at the bottom to view information specific to that module.
3 To re-order the log items in a particular list, click a column heading.
For technical reasons (data size), complete log files are not downloaded to the disc. Only the part
that will be viewed is downloaded. Therefore, the following difficulties may occur:
• Logs display slowly.
• When re-ordering the columns only the part of the log that is being viewed is displayed. The
items re-ordered again to view another part of the log.
Note: The Error, Warning and Debug logs are not available from the Sunbelt Kerio
Personal Firewall user interface. They can only be viewed only as files.
11-2
Sunbelt Kerio Personal Firewall User Guide
Context Set basic parameters for the Logs & Alerts section using the context menu.
Menu To set basic parameters using the context menu
1 Click Logs & Alerts. The Log tab opens.
2 Right-click inside the tab to open a context menu providing options for a particular log:
3 Make a selection:
To... ...select...
determine how the application names are Displayed application name; then select one
listed, of the following from the sub-menu:
• Full path – full path to the application's
executable file
• File name – name of the application's
executable
• Description – description of the
application (if it is not available, name of
the executable without the extension is
displayed)
• Show icons – display the application or
system icon for an application.
list the computer by name instead of IP Resolve address. If a name is not found, the
address, IP address will be listed.
Note: Some logs do not provide all of the items mentioned above, i.e. network
communication is not displayed for the System log. Therefore Resolve address,
Resolve port and Resolve protocol functions are not available.
The Displayed application name and Resolve address/port/protocol options are
applied globally. Their settings influences all logs, the Overview>Connections
section, Connection alert and Starting/Replacing application dialogs, and the Alert
window.
11-3
Sunbelt Kerio Personal Firewall User Guide
Log Options Use the Settings tab to set general log parameters and options.
4 Click OK to save the settings and close the Sunbelt Kerio Personal Firewall window, or click
Apply to save the settings and keep the window open.
11-4
Sunbelt Kerio Personal Firewall User Guide
Network Log The Network tab lists information on network traffic that meets an application or packet filter rule.
Traffic is not logged unless the Log communication to network log option is enabled. The Network
log provides the following information:
Note: Both a description the applications and the full paths to their executable
files are saved into the log file. Therefore, you can switch between the two
items and select which one is displayed.
11-5
Sunbelt Kerio Personal Firewall User Guide
NIPS Log The NIPS tab lists information about detected network intrusions. The NIPS log lists the following
information:
11-6
Sunbelt Kerio Personal Firewall User Guide
HIPS Log The HIPS tab lists information about detected attacks to applications. Blocked attacks are
highlighted in red.
11-7
Sunbelt Kerio Personal Firewall User Guide
Behavior Log The Behavior tab lists information about running applications that meet the corresponding rules in
Application Behavior Blocking in the Intrusions section. The Behavior log provides the following
information:
11-8
Sunbelt Kerio Personal Firewall User Guide
Web Log The Web tab lists information about objects blocked by the Web content filter. This log is not
configurable. The Web log provides the following information:
11-9
Sunbelt Kerio Personal Firewall User Guide
Debug, Error, The Error, Warning and Debug logs are not available from the Sunbelt Kerio Personal Firewall's
user interface — they can only be opened as files in the Logs sub-directory of the directory where
Warning Sunbelt Kerio Personal Firewall is installed (typically C:\Program Files\Sunbelt\Personal Firewall
Logs 4\logs). the file itself has the .log extension (e.g. error.log).
Debug Log
The Debug log lists detailed information on all processes of Sunbelt Kerio Personal Firewall.
Error Log
The Error log list errors that seriously affect Sunbelt Kerio Personal Firewall functionality (i.e. the
Firewall Engine cannot start).
Warning Log
The Warning log lists less important errors (i.e. an error detected when a new version verification
is performed, etc.).
11-10
Sunbelt Kerio Personal Firewall User Guide
Open-source libraries
12-1
Sunbelt Kerio Personal Firewall User Guide
Glossary
Application protocol
Application protocols are transmitted in packets of TCP or UDP protocol. They are used for
transmission of user (application) data. In addition to standard application protocols which are
available (i.e. SMTP, POP3, HTTP, FTP, etc.), application programmers may use a custom (non-
standard) method for communication.
Buffer
A region of memory reserved for use as an intermediate repository in which data is temporarily
held while waiting to be transferred between two locations or devices. For instance, a buffer is
used while transferring data from an application, such as a word processor, to an input/output
device, such as a printer.
Cookie
Information in text format that the server stores at a client (Web browser). It is used for later
identification of a user when the same server/site is opened again. Cookies can be misused for
monitoring which sites have been visited by a user, or they can be used for visit counter.
DHCP
Acronym for Dynamic Host Configuration Protocol. A TCP/IP protocol that enables a network
connected to the Internet to assign a temporary IP address to a host automatically when the host
connects to the network. See also IP address, TCP/IP. Compare dynamic SLIP.
DNS
Acronym for Domain Name System. The hierarchical system by which hosts on the Internet have
both domain name addresses (such as bluestem.prairienet.org) and IP addresses (such as
192.17.3.4). The domain name address is used by human users and is automatically translated
into the numerical IP address, which is used by the packet-routing software. DNS names consist of
a top-level domain (such as .com, .org, and .net), a second-level domain (the site name of a
business, an organization, or an individual), and possibly one or more sub-domains (servers within
a second-level domain). See also domain name address, IP address. 2. Acronym for Domain
Name Service. The Internet utility that implements the Domain Name System. DNS servers, also
called name servers, maintain databases containing the addresses and are accessed
transparently to the user. See also Domain Name System (definition 1), DNS server.
Firewall
A tool (usually a software product) for protection from intrusions and from data outflow. Two basic
firewall types are available:
• network firewall — protects computers of a network. Usually, it is used as a gateway (router)
through which the particular network is connected to the Internet.
13-1
Sunbelt Kerio Personal Firewall User Guide
• personal firewall — protects one computer (user's workstation). Unlike network firewalls, it can
match network communication with a particular application, change its behavior accordingly to
interaction with users, etc.
Note: In this guide the word firewall represents Sunbelt Kerio Personal Firewall.
IDS
Acronym for Intrusion Detection System. A type of security management system for computers
and networks that gathers and analyzes information from various areas within a computer or a
network to identify possible security breaches, both inside and outside the organization. An IDS
can detect a wide range of hostile attack signatures, generate alarms, and, in some cases, cause
routers to terminate communications from hostile sources.
ICMP
Acronym for Internet Control Message Protocol. A protocol used for transmission of control
messages. Several types of such messages are available, such as a report that the destination is
not available, redirection request or response request (used in the PING command).
IGMP
Acronym for Internet Group Membership Protocol. A protocol used by IP hosts to report their host
group memberships to any immediately neighboring multicast routers.
IP
Acronym for Internet Protocol. A a protocol transmitting all Internet protocols in its data part. The
header of this protocol provides essential routing information, such as source and destination IP
address (which computer sent the message and to which computer the message should be
delivered).
Port
The most essential information in TCP and UDP packet is the source and destination port. The IP
address identifies a computer in the Internet, whereas a port identifies an application running on
the computer. Ports 1-1023 are reserved for standard services and the operating system, whereas
ports 1024-65535 can be used by any application. In a typical client to server connection, usually
the destination port is known (connection is established for this port or UDP datagram is sent to it).
The source port is then assigned by the operating system automatically.
PPTP
Acronym for Point-to-Point Tunneling Protocol. An extension of the Point-to-Point Protocol used
for communications on the Internet. PPTP was developed by Microsoft to support virtual private
networks (VPNs), which allow individuals and organizations to use the Internet as a secure means
of communication. PPTP supports encapsulation of encrypted packets in secure wrappers that can
be transmitted over a TCP/IP connection. See also virtual network.
TCP
Acronym for Transmission Control Protocol. Used for reliable data transmission through so called
virtual channel (connection). It is used as a transmission protocol for most application protocols,
such as SMTP, POP3, HTTP, FTP, Telnet, etc.
TCP/IP
TCP/IP is a general term for protocols used in communication over the Internet. Data is divided
into data items called packets within individual protocols. Each packet consists of a header and a
data part. The header includes routing information (i.e. source and destination address) and the
data part contains transmitted data.
The Internet protocol stack is divided into several levels. Packets of lower protocols encapsulate
parts of higher-level protocols in their data parts (i.e. packets of TCP protocol are transmitted in IP
packets).
13-2
Sunbelt Kerio Personal Firewall User Guide
UDP
Acronym for User Datagram Protocol. A protocol without a connection. This implies that it does not
create any connection and data is transmitted in individual messages (so called datagrams). UDP
does not warrant reliable data delivery (datagrams can be lost during transmission). However,
unlike transmission through TCP protocol, it provides faster data transmission (it is not necessary
to establish connections or provide reliability control, confirmation is not demanded, etc.). UDP
protocol is used especially for transmission of DNS queries, audio files, video files, or other types
of streaming media which promote speed over reliability.
VPN
Acronym for Virtual Private Network. Nodes on a public network such as the Internet that
communicate among themselves using encryption technology so that their messages are as safe
from being intercepted and understood by unauthorized users as if the nodes were connected by
private lines. 2. A WAN (wide area network) formed of permanent virtual circuits (PVCs) on
another network, especially a network using technologies such as ATM or frame relay.
13-3
Sunbelt Kerio Personal Firewall User Guide
Index
1-1
Sunbelt Kerio Personal Firewall User Guide
L parameters
Log ad blocking 10-2
behavior 11-8 privacy 10-2
debug 11-10 site exception 10-2
error 11-10 Predefined Rules
HIPS 11-7 manage 7-20
network 11-5 Purchasing and Product Registration 3-1
NIPS 11-6 free vs full version 3-2
warning 11-10 purchasing SKPF 3-2
web 11-9 Registration 3-6
Log Options R
set 11-4 References 1-5
Logging Paramters S
set 11-2 Site Exceptions
Logs and Alerts 11-1 add 10-5
viewing 11-2 Statistics 6-7
M viewing statistics for specific time frame 6-8
Module Logs Styles 1-5
view 11-2 Styles and references 1-5
N System Requirements 1-4
Network Connections 6-5 System Security Rules 8-4
manage options 6-6 System Tray Icons 4-3
Network Intrusion Prevention System 9-3 U
Network Log 11-5 Uninstalling SKPF 2-9
Network Security 7-1 Upgrading 2-8, 2-11
advanced settings 7-23 V
application rules 7-3 Viewing Logs and Alerts 11-2
boot-time protection 7-24 W
detecting new network interfaces 7-25 Warning Log 11-10
how rules are applied 7-2 Web Content Filtering 10-1
packet filter rules 7-7 ad blocking parameters 10-2
Predefined Rules 7-20 privacy parameters 10-2
rules 7-2 site exception parameters 10-2
trusted area 7-22 site exceptions 10-5
verifying dialed numbers 7-26 Web Log 11-9
what is it? 7-2 Web Server
NIPS Log 11-6 add to advertisement blocking list 10-4
O
Overview 1-2
P
Packet Filter Rules
adding a rule 7-10
inside 7-9
IP groups 7-18
manually define 7-7
proper functionality 7-9
protocol parameters 7-15
1-2