Protector 52 – January 2020- This is a new function that allows to easily block an application, protocol or website. The function is available through menu Application Block. The page that opens shows a list of applications, domains or protocols grouped by category and their current status: blocked or not. To block an application, click on the icon, and it will turn into the Blocked state. When all the changes have been done, in order to apply them, the Protector routing must be restarted. To remind about this, a warning appears on the top of the page. Firewall & Web Filter UpdatesThis function is a high level interface to the Firewall and the Web Filter. However, the changes done here are not visible in the Firewall or Web Filter setting pages.
Access to the applications will be denied on the whole Protector's network, typically 192.168.1.0/24, with no exceptions. If you need to create exceptions for a computer or a subnet, or a -Network adapters configuration Most of the Protector appliance models ae provided with multiple network adapters. It is now possible to configure all the available network adapters, besides the main ones eth0 and eth1, and eth2, that is the network adapter dedicated to DMZ. This function is available through menu Network Setup > Network Adapter Settings. The adapters from eth3 upwards can be configured in Tab Other Network Adapters. If your Protector appliance is not provided with configurable network adapters apart from eth0, eth1 and eth2, a message appears to inform you about this event. All the configurable network adapters, starting from eth3, are listed in this page. For each adapter, you can specify an IP address, a subnet mask and a description. When you are done configuring all the adapters, press OK at the bottom pf the page and then, restart the Protector routing clocking on the warning that appears on the top of the page.
When you are done configuring an adapter, the Protector warns you about the fact that there is no static routing for the new subnet through that network adapter. To create it, click on the link that appears on the information message. For example, for the above settings, you may want to create the following static routing. If you want the new subnet be isolated from the others, you may avoid creating a static routing. The Protector automatically creates the firewall rules to allow the new subnet access the Internet. |