Find the desired product help

Firewall Configuration


  • Click 'Settings' > 'Firewall'
  • The firewall protects your computer against inbound and outbound threats.
  • It checks that all network traffic in and out of your computer is legitimate, hides your computer ports against hackers, and blocks software from transmitting your personal data over the internet.
  • The simple rules interface lets you specify exactly which applications can access the internet.
  • You can choose to receive alerts if the firewall detects suspicious activity, or have the firewall auto-implement a specific action.

    Configure the Firewall

    • Click 'Settings' on the CCS home screen
    • Click 'Firewall' on the left:




    Firewall settings has several sub-sections:

    • Application Rules - Rules which control the network access rights of specific applications, or types of application.
    • Global Rules - Rules which apply to all traffic flowing in and out of your computer.
    • Rule Sets - Collections of rules that can be applied to internet capable applications like browsers and email/FTP clients.
    • Network Zones - A network zone is a named grouping of one or more IP addresses. Once created, you can specify a zone as the target of firewall rule.
    • Portets - Predefined groups of regularly used ports that can be used and reused when creating traffic filtering rules.

      Background note on rules:

      Both application rules and global rules are consulted when the firewall decides whether to allow or block a connection:


      Outgoing connections - Application rules are consulted first then global rules.


      Incoming connections - Global rules are consulted first then application rules.