Solved

Explain firewall settings

Posted on 2007-11-16
2
465 Views
Last Modified: 2013-11-16
Can you give a brief explaiation of what each filter is for,  and what would be affected when enabled?

(when I enabled Filter cookies i could not browse the internet)

Filter Proxy:  
Filter Cookies:  
Filter Java Applets:    
Filter ActiveX :
Filter Multicast:  
     
   
--------------------------------------------------------------------------------
 
0
Comment
Question by:tom
  • 2
2 Comments
 
LVL 12

Accepted Solution

by:
sarangk_14 earned 500 total points
ID: 20311097
You may find this document particularly useful:
http://www.informit.com/articles/printerfriendly.aspx?p=598649


Hope this helps
0
 
LVL 12

Expert Comment

by:sarangk_14
ID: 20311116
A mode general explanation of the filters you have queried about:

Filter proxy : This setting would typically allow you to channel the traffic to and from your network through a proxy server of your choice.

Filter cookies: This setting allows you to override any cookie related setting of the client web-browser. If you set the cookie filter on the firewall to block all cookies, any web-site that uses cookies would think that the user is rejecting cookies, irrespective of the settings in the web-browser.

Similarly, Java Applets and ActiveX filters allow you to control how the firewall should respond to content requiring any of them.

Hope this helps and any comments/suggestions/corrections are welcome.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question