What is a firewall and how to use it. What is Firewall? Firewall - how it works, in simple words

What is a firewall and how to use it. What is Firewall? Firewall - how it works, in simple words

31Oct

What is a Firewall (Firewall)

Firewall or Firewall is a computer program whose purpose is to protect your computer from viruses and. The firewall monitors network traffic entering the operating system and helps stop malware that tries to access the user's personal information. In addition, the terms Firewall and Firewall have another definition. These terms are commonly used to describe fire-resistant capital walls, which in theory should protect houses from fires in densely built areas.

What is a Firewall (Firewall) - meaning, definition in simple words.

In simple words, a Firewall is special security computer programs that constantly scan data received and sent to the Internet. Figuratively speaking, these are virtual walls that protect the computer from the dangers of the Internet: viruses, rootkits, spyware, etc. Although it's worth noting that a firewall is not the only or most reliable source of protection for your computer. As a rule, to ensure the greatest security, a firewall (Firewall) always works in conjunction with antivirus and anti-spyware software.

In most cases, the firewall is installed directly on the work machine (PC), but sometimes, as in the cases of various offices where there are many computers, the firewall is installed as a physical device ( but more on that later). Windows operating system users do not need to install a firewall themselves ( separately), since the OS initially has its own - Windows Firewall.

Firewall - how it works, in simple words.

Without going into complex technical details, the work of the Firewall can be described as follows. When a user launches an Internet-related program, such as a browser or computer game, the computer connects to the remote website and sends information about the user's computer system. However, before data is sent or received, it passes through a firewall ( firewall), where depending on the parameters set, the data will be skipped or stopped.

Figuratively speaking, in the process of its work, the firewall acts as a kind of border guard or customs officer who monitors everything that is exported and imported onto the computer. In addition, his responsibilities include checking data packets for compliance with the required parameters. Thus, a firewall can help stop existing malware such as Trojan horses and other spyware from running. In simple words, the screen simply will not transmit the data collected by these programs to the Internet. But this, of course, is all in theory, since such malicious programs are constantly being improved and learn to deceive firewalls.

What is a Hardware Firewall and how to protect your network?

A hardware firewall is a physical device that connects a computer or network to the Internet using certain advanced techniques to protect against unauthorized access. Wired routers, broadband gateways, and wireless routers all include hardware firewalls that protect every computer on the network. Hardware firewalls use different types of security to protect the network: packet filtering, stateful packet inspection, network address translation, and application-level gateways.

Packet Filtering Firewall checks all data packets sent to and from the system. It forwards data based on a set of rules defined by the network administrator. This hardware firewall inspects the packet header and filters packets based on source address, destination address, and port. If a packet does not comply with the rules or meets the blocking criteria, it is not allowed to pass through the computer or network.

Dynamic packet filtering or stateful packet inspection, this is a more complex security method. This firewall monitors where the packet came from to figure out what to do with it. It checks whether the data was sent in response to a request for more information or whether it simply appeared on its own. Packets that do not match the specified connection state are rejected.

Another way to ensure security is a network address translation (NAT) router. It hides a computer or network of computers from the outside world, presenting one to the public for Internet access. The firewall IP address is the only valid address in this scenario, and it is the only IP address presented to all computers on the network. Each computer on the internal side of the network is assigned its own IP address, valid only within the network. This security option is very effective because it allows you to use only one public IP address to send and receive information packets. Which in turn significantly minimizes the possibility of introducing malware. This hardware firewall is usually implemented on a separate computer on the network, which has the sole function of running as a . It is quite complex and is considered one of the most secure types of hardware firewalls.

Basic problems with firewalls.

There are several common problems that can arise as a result of using a firewall. The most common problem is that in addition to malware, the firewall often blocks normal traffic that we need. Some websites may have limited access or may not open because they have been misdiagnosed. Quite often, problems arise with online games, since the firewall often recognizes such traffic as malicious and blocks the programs. Based on this, it should be noted that although a firewall is a very useful thing, it needs to be configured correctly so that it does not spoil life with its prohibitions.

Categories: , // from

Not so long ago, there were people who doubted the usefulness of the Internet, saying that it was all “toys.” They were wrong. Nowadays, perhaps, no one needs to be convinced that the Internet is necessary for work. Email and chat programs make it possible to organize the work of groups, whose members are often located not only in different offices or cities, but also on different continents. Internet search servers allow you to effectively work with huge amounts of information. With the introduction of push technologies, it becomes possible to deliver operational information to users’ workstations in a matter of seconds. According to surveys conducted in the US and Canada, the number of viewers of news channels has fallen sharply over the past 1-2 years. The reason is the emergence of WWW. All news agencies (more recently including ITAR-TASS) publish information on the Internet, which, by the very nature of the WWW, has a form that is much more convenient for perception than paper or television.

However, taking advantage of all these advances comes with some responsibility. No one wants their business correspondence, accounting reports or DSP information to fall into the wrong hands. Firewall is one of the main components (if not the most important) for preventing such incidents.

What is a firewall

Firewall (synonymous with firewall) is a computer, router or other communications device that restricts access to a protected network.

Initially, a firewall is a fire-resistant wall that separates the driver in a racing car from the engine. If the engine catches fire during an accident, the driver remains unharmed.

Firewall allows you to protect a company's network from unauthorized intrusion from the Internet, while at the same time allowing users within the company to access the Internet. Many firewall systems these days also have controls, authentication, and privacy for users accessing a company's internal network from the Internet or another network; In our time, such means are becoming more and more necessary.

Without firewall protection, you shouldn’t even think about constantly connecting to the Internet. Even if you think that you have no secrets from others, there will always be people on the Internet who want to “climb” into your server, either because they want to take advantage of free resources, or simply out of curiosity (and there is nothing unnatural about this). You will soon notice that disk space is becoming scarce, and the Internet channel is overloaded.

Many organizations use a firewall not only to restrict access from the Internet, but also to protect the central computer from uncontrolled access within the organization itself or to ensure the confidentiality of information circulating within the network.

Often, a firewall combines its primary functions with a Web and FTP service, playing the role of a company’s “business card” on the Internet.

How Firewall Works

Basically, a firewall can be thought of as two mechanisms: one blocks traffic, the other allows traffic through. The firewall platform must have two or more network interfaces. By connecting one interface to one network (for example, the Internet), and the other to another (for example, to an intranet - the internal network of an enterprise), the firewall determines which packets to pass in one direction and which in the other.

Different firewall configuration schemes allow you to focus on either allowing access or denying it. For example, a firewall can be configured to allow FTP access from network A to server S located on network B, while blocking any other traffic. Or, conversely, you can allow outside access to all resources on network A except port 5432 on server S, which hosts the PostgreSQL database server, thus protecting the database from unauthorized access. Both schemes have their advantages, however, for obvious reasons, commercial organizations more often choose the first scheme.

The firewall can use a wide range of parameters to make decisions: source address, destination address, port numbers, source authentication using a DNS server, checking the logical structure of the packet and many other parameters, including cryptography.

Many firewalls include NAT (network address translation) mechanisms. When using NAT, the firewall contains a special address translation table, where each pair of intranet IP_address/port_number corresponds to its own port number on the firewall. The firewall replaces IP addresses in outgoing data packets with its own address, while replacing the port number. For incoming packets, the firewall fills the IP address field with the intranet address corresponding to the port number. At the same time, only one IP address is visible from the outside for all connections - the firewall address, which significantly complicates the task of hacking the network for attackers.

Often, a firewall is used to organize a security measure such as a DMZ (de-militarized zone). In this case, one or more computers on the network (for example, a WWW server) are connected to an additional firewall network interface. This way, the firewall can completely control access to the DMZ, and if one computer in the DMZ is attacked and falls, the organization's network as a whole remains safe.

Most users today install good antivirus programs on their computers with a built-in firewall. In this case, everyone chooses the most suitable option for themselves. There are both paid and free utilities. All of them reliably protect the system.

If you do, it is recommended to disable the Windows firewall, as it may conflict with a third-party program, block various applications, and affect Internet speed. But in other cases, deactivating the firewall can lead to malware entering the system, so doing this is highly undesirable.

Why do you need a firewall?

Translated from English, the word “firewall” means “wall of fire” (fire - fire, wall - wall). Indeed, this program built into Windows serves as a barrier to various worms, Trojans and other viruses. A firewall (firewall, or firewall) filters Internet traffic and passes only that allowed by the program.

It is worth noting that there are free ones, which include the built-in Windows firewall, as well as paid firewalls. In principle, the “native” version, especially starting from Windows 7, can provide high-quality protection for your computer, but if you want, you can purchase a paid program. Please remember that when installing a third-party firewall, you must deactivate the one built into Windows.

Read below about how to disable it in different versions of Windows.

Deactivating the Windows XP Firewall

You can disable the firewall in the “exps” as follows. Go to the Start menu and select Control Panel. Here you will need to go to the “Firewall” section. On the “General” tab, check the box next to the “Disable” option and click “OK.”

By the way, in Windows XP (SP 1) the firewall did not provide normal protection, and many users did not yet understand that while they were spending time on the Internet, the computer could be attacked by intruders. As a result, quite a lot of unpleasant situations happened, but with the release of SP 2 the situation improved significantly.

So now you have an idea and how to disable it on Windows XP.

Firewall Windows 7. How to deactivate?

The firewall built into the “seven” is much more reliable than its predecessors. However, as mentioned above, many users prefer to install antiviruses that have their own firewall. Most likely this is the right decision. You already know what a firewall is and how to disable it in exp. But what to do if you have the seventh version of Windows installed? In fact, you don’t need any in-depth computer knowledge, because deactivating the firewall in the “Seven” is just as easy as in Windows XP.

Click Start and then Control Panel. Select Small Icons from the Viewing Options. Go to the "Firewall" section. On the left, find the link “Turn the firewall on or off” and follow it. Set the checkboxes next to the options that deactivate the firewall.

As you can see, having learned what a firewall is and how to disable it on Windows 7, you can complete this procedure in just a minute.

Disabling the firewall on G8

If Windows 8 is installed on your device, then in order to deactivate the “native” firewall, follow these steps:

  • being on the Desktop, right-click “Start”;
  • will open where you will have to go to the “Control Panel”;
  • select the “Firewall” section (before that, install “Small icons”);
  • in the menu on the left, follow the link that allows you to activate or deactivate the firewall;
  • Set the checkboxes opposite the desired option.

Now you know what a firewall is and how to disable it on Windows 8.

Do not disable Windows' built-in firewall unless you have another program that will protect your computer from malware. Of course, the firewall sometimes gets in the way, blocking some applications, but it is configured in such a way that the risk of being attacked by an attacker is minimized.

If you have one that has its own firewall, then be sure to disable the “native” Windows firewall, as conflicts may arise.

You can install a third-party firewall if you have doubts about the standard one (which is extremely rare). However, remember that downloading such programs from sites that have a dubious reputation is highly undesirable.

Conclusion

So, you have learned what a firewall is and how to disable it in popular versions of Windows. As you can see, the sequence of actions is almost identical. Regardless of what OS is installed, you can do this operation yourself.

A firewall, or as it is also called a firewall, firewall and firewall, monitors and controls system connections between your computer, the network and the Internet in order to promptly detect and prevent attacks and intrusions. Programs of this class are especially useful in cases where it is necessary to control the Internet activity of installed applications.

No other free product makes the user more sad than a firewall. And the reason is simple, the process of finding a suitable firewall necessarily involves a process of trial and error. A good firewall should protect the system without being too intrusive or difficult to manage and configure. This review will provide you with the best free firewalls (according to this site) available today. Like all reviews, recommendations and advice are made based on the experiences of different people. Therefore, if you have ideas or interesting opinions, they are always welcome.

Note: The reader should understand that powerful firewalls with flexible rules settings always require knowledge in the field of network design. However, even in their case there must be a more or less clear way of administration.

There are two types of firewalls - programs and hardware devices. Firewalls, which come in the form of programs (which are discussed in this article), are installed on your computer and run in the background to closely monitor system activity in real time. As with many security features, to avoid potential conflicts that may even involve manually deleting files from boot drives, it is recommended to install only one firewall. Hardware firewalls are usually a special device with embedded logic and filtering-optimized modules (for example, special processors whose instruction set includes operations with IP addresses). You can use software and hardware firewalls together. For example, modern routers typically include a built-in firewall and, depending on the type of router, it may not only be firmware (as device programs are called), but also partially implemented at the chip level.

Having a basic firewall has long been critical to keeping your computer safe, which is why many antivirus programs are gradually incorporating some firewall functionality. Simple firewalls, like the default Windows Firewall, allow you to restrict access to your system and personal information, silently protecting you from incoming threats. As part of the review, we will look at several basic firewalls that allow you to protect Windows a little better than a standard security tool can do, for example, they monitor attempts by programs to open outgoing connections to the Internet (this action refers to outgoing threats).

Note: The reader should understand that the standard Windows firewall provides fairly limited capabilities for protection against outgoing threats. Third-party apps usually offer a wider range of features.

Proactive firewalls offer more advanced protection, including intrusion detection and prevention systems based on the collection of statistics on program behavior and heuristic analysis, which allows them to protect the computer from a wider range of threats. These firewalls strive to create strong two-way protection, stopping not only incoming threats, but also protecting you from programs transmitting your personal information to the Internet. The disadvantage of such firewalls is that they are more difficult to use and require more money.

It is important to understand that today, having a firewall and antivirus (either separately or as a single solution) is considered the minimum required basic approach to keeping your computer safe.

Note: There is a lot of useful security information available throughout the site, such as an overview of intrusion detection and prevention programs for home use.

Tips and precautions:

  • Before installing security products, including antiviruses and firewalls, you should consider creating a full disk image. By creating such an image, you can restore your system back to its previous state in cases where, after installing and configuring protection tools, critical errors appeared in the system, for example, due to incorrect installation of components or you changed critical system settings. In addition, images allow you to cope with complex viruses or simply random conflicts in the system. For example, some system drivers may simply be incompatible with each other, causing your system to suffer. Starting with Windows Vista Ultimate, the system includes a standard backup and recovery tool, but you can also use free programs to create a disk image.
  • To verify the complete removal of third-party firewalls and other security tools, it is recommended to use uninstallers, since services, registry entries, and other system objects may remain after removal.

Basic firewalls and firewalls

Preface or a few words about the built-in windows firewall

The built-in Windows Firewall is a more common choice of users, as it allows you to protect your computer from incoming threats and does not bombard you with pop-up messages. Also, the Windows firewall does not require installation (we are talking about versions of Windows where a firewall is included by default) and practically does not conflict with other programs. In addition, many average users cannot properly respond to pop-up notifications due to a lack of basic network knowledge.

So if you need to scan your system for viruses and you do not want (need) the additional capabilities of third-party firewalls, in other words, the level of risk is very low, then Windows Firewall may be exactly the solution you need due to its simplicity and undemanding.

Alternatively, you can download a third-party firewall and replace the standard Windows firewall with the base one for easier control of outgoing connections and for additional features. Most two-way firewalls are limited to simple questions like allow or deny Internet access for unknown programs. And also, many firewalls automatically configure access to a pre-configured list of programs (often this list includes most popular applications) and save your decisions in their database. So, after some time, you will hardly see any notifications.

And as an option, you can also use proactive firewalls by first disabling heuristics and analysis in them. In addition, this option may be even more suitable, since proactive firewalls, due to their complexity, simply contain a larger list of preliminary rule templates and access settings.

This is a well-made firewall for controlling outgoing and incoming operating system connections, which is suitable for users of any level. ZoneAlarm protects the system from intrusions and also controls program access to the Internet. The firewall has an easy to understand interface. You can configure security settings to suit your own needs, including shared (public) files and printers, network settings, and more. You can even turn off the firewall if necessary (by the way, the standard Windows firewall lacks quick access to this feature). All configuration is done using simple controls (sliders and others), so in most cases you will only need a few clicks. To make it easier for users to get used to the program, when they first start, ZoneAlarm offers to scan installed programs and set access permissions/denies for them. Please note that this first scan does not always allow you to set the access correctly.

The first time after installation, you will have to monitor and adjust the actions of ZoneAlarm to make sure that all programs have a sufficient level of Internet access. But, pop-ups are very simple and are presented in an "allow/deny" format with a checkbox to remember the selected action. Even novice users can easily figure it out (the name of the programs will also be indicated in the message).

You can set the program control level that suits you. Low level involves learning mode (the firewall remembers all programs that use the network), disabling protection and a minimum number of pop-up windows. The middle level assumes that any access to a trusted network or the Internet will be done with permission. High level is not provided in the free version of ZoneAlarm. You can set any of the levels at any time. Using the "Smart Defense Advisor" module, Firewall will suggest the most commonly accepted option for non-rule programs by users around the world. You don't have to use this module (although it will be very useful for beginners).

Setting up Internet zones includes a trusted zone, which implies a local network with shared files, printers, etc., and an Internet zone for access from the network. Each zone has a simple control format of 3 options: "no security" (firewall disabled), "medium" (exchange/sharing of resources such as files and printers) and "high" (allows use of the network, but blocks someone on the network accessing your system). Medium level is recommended for home networks with more than one operating system, and for cases where devices (routers, routers) require this. A high level is recommended for single machines with Internet access (for example, there is only one computer at home and there is no internal network), as well as for public places where you are going to access the network (WiFi in restaurants and so on).

Overall, ZoneAlarm Free offers basic two-way protection with stealth mode and anti-phishing protection. However, the firewall lacks heuristic and behavioral modules, as well as the ability to allow/block access between programs.

It is worth noting that from version to version, the firewall becomes a little lighter in terms of functionality. Perhaps this is only a temporary dynamic, but still.

It will be a good choice for those who aim to use the built-in Windows firewall. Despite its name, the program is compatible with Windows XP and higher. In a few words, Windows 10 Firewall Control allows you to more conveniently and simply configure blocking and application access to the Internet in the standard Windows firewall. This firewall also adds a better way to manage outgoing connections. It is based on the Windows Filtering Platform, which also powers the standard firewall. Therefore, unlike most other firewalls, the application does not install any drivers on the system. The user interface is made very simple and clear. It displays only what the program can do, i.e. a block with settings to “allow/deny” access and nothing more.

There are three modes in total - “normal”, “allow all” and “disable all”. The latter mode completely disables access to applications, regardless of firewall settings. The "allow all" mode is self-explanatory, meaning unhindered Internet access for all applications (similar to turning off the firewall). If you do not need to test something, then normal mode is recommended - Internet access for programs will be provided depending on individual settings.

In normal mode, when the program tries to access the Internet for the first time (after installing W10), a pop-up window will appear with information about the application, publisher, etc. You can allow or deny access either one-time or permanently. If you select the first option, the next time you start the program the window will appear again.

In addition to pop-up windows for selecting Windows 10 Firewall Control actions, small windows also appear in the lower right corner of the screen with access information (access blocked/allowed, etc.). These notifications can be turned off in Settings.

That's basically all this firewall can do. The disadvantages include the fact that you will have to configure access for all your applications, from the browser to the antivirus, which can be somewhat annoying in its routine. However, Windows 10 Firewall Control allows for much easier and more convenient control over the built-in Windows firewall than the operating system offers.

It is a lightweight firewall that is based on the standard Windows firewall. It is completely free of pop-ups, so this firewall may be ideal for those who need a "set it up and go do other things" solution. The installer for this program weighs only about 1 MB. Installation is simple, but, unfortunately, does not include the ability to select the installation location. After installation, the firewall runs in the background with an icon in the system tray. All program functions are accessible only from the system tray - there is no “main window” interface in it. In the pop-up menu, the user can select the necessary items, in particular, firewall mode, general network activity, add/exclude applications/processes and call up a dialog with firewall settings.

The firewall settings dialog box is also quite modest. General settings, with the ability to set a password to protect settings. A section that specifies applications that are allowed to connect to the network. There is also a "Detect" function that will try to detect known applications so that the user does not have to add programs manually. In addition, TinyWall can recognize related processes of one application. For example, if you have a program that runs several processes, then by adding the program to the white list, all open related processes will also have access to the Internet.

It should be noted that when adding a program to the exclusion list, the application is not limited to UDP and TCP traffic. Depending on the nature of the program, it may be more prudent to limit it to, for example, only "outgoing" traffic.

The Special Exceptions tab allows the user to set additional parameters. In particular, choose to allow or block access for system services. If you are not very computer savvy, it is recommended to leave the settings as they are. On the maintenance tab, you can import/export settings, check for versions, and also go to the developer page.

Overall, TinyWall is a lightweight firewall that is a good choice for those looking for an unobtrusive and easy to manage firewall.

Firewalls and firewalls with intrusion detection and prevention systems

Preface or a few words about firewalls with intrusion detection and prevention systems

The following firewalls and firewalls provide better network protection and also support various options for intrusion detection and prevention systems. Every firewall comes with default settings, so very few adjustments may be required depending on the user's needs

The firewalls in this section require more knowledge and time from the user to set up and become familiar with than basic firewalls, but they provide a higher level of protection.

When choosing a suitable firewall, you should not rely on publicly available independent testing and other statements, since during testing the effectiveness is checked at maximum settings, while most users have a simpler level of protection (after all, you want to use the Internet, and not sit in trench with access to one site). Therefore, most firewall developers strive to ensure maximum “friendliness” of functionality, sometimes with a lower level of security settings (disabling monitoring of some indicators).

Please take these circumstances into account.

This is a solid firewall for those users looking for a full-featured security package. This product is mostly intended for experienced and tech-savvy users. Its intrusion detection system is called "Defense+" and matches or even exceeds the capabilities of paid products. Komodo firewall provides quite a lot of control and settings, which will especially appeal to curious and restless users whose task is to ensure the maximum level of security.

Comodo includes protection against buffer overflow attacks and a lightweight sandboxing option that allows you to check unknown applications and program installations to see how their launch will affect the computer's operating system. Using a sandbox limits the negative effects of malware. Komodo contains a long list of known, trusted applications, but if an unknown application tries to gain access through the firewall, Comodo will first restrict the program and ask you what to do with it. In addition, all the functionality to control ports, protocols and configurations will be at your disposal.

During installation, you will have three options to install the firewall - "firewall only", "firewall with an optimal set of proactive protection" and "maximum proactive protection" (i.e. "Defense+", as mentioned earlier). After installation, Comodo automatically selects "Safe Mode", which will result in numerous pop-up notifications for applications that are not included in the list of trusted programs. If you select allow/deny and choose to remember the response, Comodo will create and save a custom rule for the application, which you can always edit from the general list.

If you select Clean PC Mode, Defense+ will automatically mark all applications on your drive as safe. Please note that if there is a virus among the programs, it will also be considered safe, so use this function carefully and only in cases where you are really confident in the safety of the programs. However, these applications will still be monitored, albeit at a minimal level - checking Comodo protected objects (registry and COM interface), monitoring established rules, etc. Any files you add will be automatically added to the review list, flagged as potentially unsafe, and running them will result in pop-up messages as if you were using Safe Mode, until you set rules.

Comodo reduces the frequency of alerts by automatically identifying programs as safe based on Internet access rules. However, you can further reduce the number of Defense+ alerts using one or more methods:

  • Immediately imply your answer as "remember answer" for all warnings. In other words, when any application is launched for the first time, the answer will immediately be assumed to be a permanent solution. However, you must use this setting carefully, as from time to time applications need to temporarily grant or deny access
  • Add programs to lists of safe or trusted files
  • Use clean computer mode. It is recommended to first make sure that the programs on your disk do not contain viruses and Trojans

Overall, Comodo Firewall is a powerful firewall with a lot of flexible settings, which is perfect for providing a high level of protection. However, it is aimed at those users who have some knowledge of Windows device and networking. Beginner users are strongly advised not to use this firewall.

The former commercial firewall is now free without restrictions. This proactive, multi-layered security solution includes behavioral blocking technology that monitors and checks for viruses, spyware, malware, process and application security, the registry, and more along with standard firewall protection. Private Firewall can certainly be called a multifunctional firewall with an intrusion detection and prevention system.

The program's user interface may seem a little confusing and cumbersome. There are a lot of customizable options, so sometimes it can feel a bit lacking in sorting. Of course, each section contains quite a lengthy reference with explanations, but still. The training mode allows you to allow all program actions within 180 seconds, which is ideal for quickly setting up rules for newly installed programs (no need to create dozens of rules for each port, protocol and address). However, be prepared that the first launch of the firewall may lead to blocking of a number of seemingly well-known programs.

You can set different security levels (high, low, and custom) for your internal network and the Internet. In other words, for example, if you have a couple of computers or a printer on your home network, then there is no point in limiting them in the same way. You will also have three profiles at your disposal - Home, Office and Remote. You can set the appropriate settings for each and easily switch as needed, especially useful for laptops. Another useful feature is that you can block outgoing mail in one click, which is convenient when you have launched an email client and don't want the application to send emails randomly or on a schedule.

Overall, Private Firewall is a fairly effective firewall that has fairly good ratings on the Internet. However, the graphical interface and ease of use will be more appreciated by tech-savvy users. A beginner will simply be confused.

The firewall is a good choice for users who want flexible security settings without compromising ease of use. Its interface is carefully organized and retains its functionality (it can be easily navigated by ordinary users). For example, alerts are simplified but just as functional, so you can quickly and easily set up rules or apply actions. In addition, the firewall remembers all responses in pop-up messages without the need to create additional rules, notifies you of all configured rules in training mode, and notifies you of all automatically applied rules, for example, for browsers when changing versions.

The free version lacks many of the additional features of the paid version, such as the ability to disable an active connection. However, there are plenty of opportunities. You can choose 5 levels of protection, ranging from completely blocking connections to allowing all actions, including the average manual learning mode "Rules Wizard". In addition, the Outpost firewall controls various dangerous application activities, including memory injection, driver loading, and access to critical system objects (registry, files). Also, the Outpost database includes quite a lot of pre-configured rule templates, so setting up Internet access for applications will most often consist of a couple of mouse clicks.

The installer will ask you if you want the firewall to train for a week (using auto-learning mode and manual training "Rules Wizard"). In this mode, the firewall will automatically set rules for known safe applications.

Overall, Outpost Firewall Free is a good choice for those looking for a balance of functionality and interface.

The firewall differs from its counterparts in that it comes with additional security modules, namely the registry, pop-up blocker and parental controls - something like a packaged solution. Firewall is less customizable than the previous firewalls listed in the review, but many standard sections are still available. Three levels of protection - off (turns off the firewall), custom (allows you to configure rules for connections) and high (blocks all connections). Each section in the program interface is designed quite cleanly. Alerts generally provide clear and concise information.

The registry protection module provides control and security of the registry for modifications, with the ability to configure specific sections. The Parental Control module, as the name suggests, limits the available list of sites, but you need to manually add each site. The module problem is in logic. You can only allow certain websites, you cannot just block individual sites. The pop-up blocker monitors browser behavior and blocks pop-up ads and more. All three of these additional modules can be disabled individually. AVS Firewall also comes with a monitoring utility so you can check the amount of network traffic passing through for each application.

During the installation of this firewall, the installer automatically installs the AVS Software browser. Unfortunately, there is no option to opt out, but after installation you can remove it separately without any consequences for the firewall.

Overall, AVS Firewall is a pretty good firewall that will appeal to those who need to provide more security than in the case of basic firewalls, and who do not want to delve too deeply into the specifics of the network design.

Note: AVS Firewall is no longer supported by the manufacturer.

Other firewalls and firewalls for Windows

Although it is rare to see older operating systems, such as 98 or Me, they still should not be left unprotected, especially if they are not hidden behind other systems with firewalls. Therefore, if for some reason you use them, then here is a small list of firewalls and firewalls for Windows 95-2000. Please note that these firewalls are no longer supported by the manufacturers and may contain errors or lead to problems that, most likely, no one except you will consider. However, having an opportunity is better than not having one.

  • Sygate Personal Firewall (Windows 2000/XP/2003) [no longer supported]
  • NetVeda Safety.Net (Windows 95/98/Me/NT/2000/XP, requires registration) [no longer supported]
  • Filseclab Personal Firewall (Windows 95/98/Me/NT/2000/2003/XP 32-bit) [no longer supported]

Any operating system must have at least some kind of protection. Windows has two security features: a firewall and Windows Defender. The concept of “firewall” itself has several meanings, but in this material the firewall option will be discussed.

What is a firewall?

Firewall (firewall) is a firewall in Windows that prevents unauthorized access to a computer from the Internet and local networks, as well as prohibiting or allowing applications to connect to the network.


In simple words, a firewall is a wall or a closed door that only opens to those who are allowed to. In Windows, restrictions are usually placed on software that communicates with the Internet. Now we have understood the concept of a “firewall,” but how to configure it correctly to provide protection for your computer?

How to set up a firewall (firewall) on Windows 10?

In offices, this is done by the system administrator, so it would be a good idea to have the skills to configure security software. At home, anyone can change the computer settings as they want, but within reason.


Setting up a firewall after installing Windows 10 is very simple. First, you need to figure out how to enable or disable protection, since problems with the firewall cause various critical errors that can be fixed by simply disabling or enabling the protective function.


One way to access the firewall settings is as follows:


  • We use the following key combination on the keyboard: Win + I. Then go to the “Updates and Security” section;

  • Go to the “Windows Defender” subsection on the left;

  • Click on the button on the right “Open Windows Defender Security Center”;

  • In the open window, select the “Firewall and network security” option.

There is a new interface here where the settings are a bit confusing for a newbie. If you don’t like the layout of the functions, you can, of course, return to the old, familiar interface, as shown in Windows 7 and 8. To do this, click on the search on the taskbar and enter “Firewall”, selecting the result.


When you are in the firewall window, in the tenth version of the system you can see two items - “Private network” and “Public network”. Both of these options contain options to disable the firewall for the connected network. Here you can block all incoming connections by checking the box.


To allow programs to connect to the network through a firewall, you need to find the “Allow applications through a firewall” item below. A window will open where changes to the parameters will be made after clicking the “Change parameters” button.


If the checkbox is checked, software exchange via the network is allowed. Typically, permissions are set only for Microsoft applications. If there are problems with the firewall, there is an option to resolve them " Troubleshoot network connection". Use it whenever possible.


By going to the “Notification Settings” section, you can see options that allow you to display notifications about blocked programs in the system. If you have configured the settings incorrectly, you can “Restore Defaults”. This option is on the main screen.

How to add a program to an exception in the firewall?


  1. In the main firewall window, go to “Firewall notification settings”;

  2. Click on the “Virus and threat protection settings” option;

  3. Go to the “Exceptions” section and click on the button in the “Adding and removing exceptions” item;

  4. Now click the “Add exception” button and select the element that is not malicious in your opinion. You can add files, entire folders, specific file types, and processes.

Additional firewall features

You can enable or disable the following features in Anti-grayware and anti-malware settings:


  • Real-time protection - if you disable this protection, it may lead to the active operation of those programs that have been blocked.

  • Cloud protection – allows you to protect data in the cloud.

  • Automatic sending of samples – data about detected malicious components is sent to Microsoft servers.

The remaining settings have already been discussed above.

Setting up a firewall on Windows 7 and 8

If you have outdated versions of operating systems, setting up the firewall is a little different:


  1. Open the firewall from Control Panel.

  2. The necessary settings are located on the left side of the window, and access to them is faster than in Windows 10.

  3. To enable the firewall, click on the “Turn Windows Firewall on or off” option button. Immediately after this, check the “Enable...” checkboxes.

  4. You can also immediately reset settings to default, enable application communication in the firewall, and configure notifications.

Firewall Security Rules

In the window on the left, go to the “Advanced options” option. A window will immediately open where you can configure rules for incoming and outgoing connections for applications.

views