Solved

Explain firewall settings

Posted on 2007-11-16
2
468 Views
Last Modified: 2013-11-16
Can you give a brief explaiation of what each filter is for,  and what would be affected when enabled?

(when I enabled Filter cookies i could not browse the internet)

Filter Proxy:  
Filter Cookies:  
Filter Java Applets:    
Filter ActiveX :
Filter Multicast:  
     
   
--------------------------------------------------------------------------------
 
0
Comment
Question by:tom
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 12

Accepted Solution

by:
sarangk_14 earned 500 total points
ID: 20311097
You may find this document particularly useful:
http://www.informit.com/articles/printerfriendly.aspx?p=598649


Hope this helps
0
 
LVL 12

Expert Comment

by:sarangk_14
ID: 20311116
A mode general explanation of the filters you have queried about:

Filter proxy : This setting would typically allow you to channel the traffic to and from your network through a proxy server of your choice.

Filter cookies: This setting allows you to override any cookie related setting of the client web-browser. If you set the cookie filter on the firewall to block all cookies, any web-site that uses cookies would think that the user is rejecting cookies, irrespective of the settings in the web-browser.

Similarly, Java Applets and ActiveX filters allow you to control how the firewall should respond to content requiring any of them.

Hope this helps and any comments/suggestions/corrections are welcome.
0

Featured Post

Manage your data center from practically anywhere

The KN8164V features HD resolution of 1920 x 1200, FIPS 140-2 with level 1 security standards and virtual media transmissions at twice the speed. Built for reliability, the KN series provides local console and remote over IP access, ensuring 24/7 availability to all servers.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
A 2007 NCSA Cyber Security survey revealed that a mere 4% of the population has a full understanding of firewalls. As business owner, you should be part of that 4% that has a full understanding.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question