Establishing connection – detection

The Firewall detects each newly-created network connection. The active firewall mode determines which actions are performed for the new rule. If Automatic mode or Policy-based mode is activated, the Firewall will perform predefined actions with no user interaction.

Interactive mode displays an informational window that reports detection of a new network connection, supplemented with detailed information about the connection. You can opt to allow the connection or refuse (block) it. If you repeatedly allow the same connection in the dialog window, we recommend that you create a new rule for the connection. To do this, select Create rule and remember permanently and save the action as a new rule for the Firewall. If the firewall recognizes the same connection in the future, it will apply the existing rule without requiring user interaction.


Please be careful when creating new rules and only allow connections that you know are secure. If all connections are allowed, then the Firewall fails to accomplish its purpose. These are the important parameters for connections:

Remote sideOnly allow connections to trusted and known addresses.

Local applicationIt is not advisable to allow connections for unknown applications and processes.

Port number – Communication on common ports (e.g., web traffic – port number 80) should be allowed under normal circumstances.

In order to proliferate, computer infiltrations often use the Internet and hidden connections to help them infect remote systems. If rules are configured correctly, a Firewall becomes a useful tool for protection against a variety of malicious code attacks.