Connection rules |
On the screen, you can set up the rules for connections of this application to certain IP addresses and ports. Creating a rule 1.To create a new rule, tap in the section. You can add allowing or blocking rules depending on the selected option: • – to add a blocking rule. • – to add an allowing rule. 2.In the opened window, enter a valid IP address in the field (in the a.b.c.d format), an IP addresses range (in the a1.b1.c1.d1-a2.b2.c2.d2 format) or a network (in the a.b.c.0/n format, where n is a number from 1 to 32) or leave this field blank (in this case entering the port is obligatory). Enter the valid port in the field or leave it blank (in this case entering the IP address is obligatory). If you leave one of the fields blank, the rule will be valid for all the IP addresses or ports respectively. Tap to save the rule. If you have selected the option, but have added no addresses to the list, the application will block all connections. 3.To edit an existing rule, tap and hold it, then tap . You can also add allowing and blocking rules viewing the applications logs or the list of current Internet connections. Deleting connection rules •To delete a rule, tap and hold it, then tap . •To clear all rules for a certain application: 1.Select this application from the list (see Figure 22). 2.In the application menu, select . 3.In the opened window, select the check box. Tap . •To clear all rules for all applications: 1.On the applications screen (see Figure 22), open the application menu and select . 2.In the opened window, select the check box. Tap . Incoming connections To allow incoming connections for an application: 1.On the (see Figure 22), select the application to allow incoming connections for. 2.On the screen, open menu in the top right-hand corner. 3.Select the check box. The information on the connections from any external addresses with the port opened by the application is only partially added to the application log and firewall statistics. Moreover, any connections with such addresses may be excluded from firewall check for all other applications. This operation mode is not safe and should not be used. Allowing the incoming connections is useful in case the firewall cannot be disabled by other means, for example, when a server receiving connections from external networks is configured on the device. |