Network firewall is not a stumbling block for intranet visits

  
Recently, Jelly received several complaints from colleagues. They reported that they could not access the shared folder of strawberries through their online neighbors. Jelly tried it on their own computer. in this way. However, it is normal to access other computers on a strawberry computer.

however, saw the strawberry jelly newly installed network firewall, when he suddenly realized. It is this firewall that keeps everyone out of the door. It turned out that the strawberry worried that his computer was invaded by the virus, and installed a firewall. He did not expect to cause trouble to others. At the request of the strawberry rookie, Jelly explained the correct settings of various commonly used firewall software in the LAN.

Skynet firewall

first to introduce the course Skynet firewall (version 2.60) that "the perpetrators" of the. A setup wizard will pop up just after the firewall is installed. However, many users did not notice the setup wizard, and the installation was completed with a few clicks (Strawberry is such a "sloppy"), resulting in an incorrect configuration causing a network failure.

If you want to solve network problems such as incorrect initial set lead, we can recall the setup wizard. Click the "System Settings" button on the main panel of Skynet Firewall. In the "System Settings" window that pops up, click "Wizard" (Figure 1) in "Rules Settings", and the setup wizard will pop up.

Figure 1

Select the security level in the "Security Level Settings" dialog box (users in the LAN can select "Low") and then click the "Next" button to enter the "Local Area Network" Information Settings window. Check "My computer is used in LAN", the software will automatically detect the IP address of this machine and display it below. Next, click the "Next" button all the way to complete the setup.

Jelly Tips We can also allow only one computer in the LAN to access its shared data for confidentiality purposes. Click the "IP Rule Management" button on the main panel of the firewall, find the rules related to LAN access in the pop-up IP rule list and double-click it to enter the "IP Rule Modify" dialog box, and set it as shown in Figure 2.
Figure 2
Norton Personal Firewall

Click the "Internet Zone Control" option on the left side of the main interface of the software, enter the "Trust Zone" tab in the right window, click the "Add" button, Open the Specify Computer dialog. In the dialog box, select "Use Range", and then enter the start address and end address of the access allowed below.

For example, the IP address range jelly office is 172.22.1.2 ~ 172.22.1.253, now just the beginning and ending IP address is entered, click on the "OK" button after the settings to take effect, all IP within this sector will You can access the strawberry computer normally.

Jelly Tip fact, we can not encompass all the segments of the IP addresses come in, you can determine the IP range of the actual situation where their LAN.

Jiangmin hacker firewall

click on the "IP Rules Settings" button on the main interface of this firewall, pop-up list of IP rules. In this list of IP rules, you can find two IP rules related to the LAN: "Allow the machine to connect to other machines in the LAN", "Other machines in the LAN access the machine (TCP)" (Figure 3).

Figure 3

If you want to modify the "Other machines in the LAN access to the machine (TCP)" rule, you can click the edit button corresponding to the rule to open the "anti-black king rule settings" Dialog box, select "Address Range" in the "Partner IP Address" drop-down list, and add the network segment of this LAN. If you really don't want to be accessed by other users on the network, you can also set it in the rule "Access other machines on the LAN".
Copyright © Windows knowledge All Rights Reserved