User guide

46
4.2.4.1 Network authentication
For mobile computers, it is recommended that you verify the network credibility of the network that you are
connecting to. The Trusted zone is identified by the local IP address of the network adapter. Mobile computers
often enter networks with IP addresses that are similar to the trusted network. If the Trusted zone settings are not
manually switched to Public network, the Personal firewall will continue to use the Home/work network mode.
To prevent this type of situation, we recommended using zone authentication.
4.2.4.1.1 Zone authentication - Client configuration
In the Zone and rule setup window, click the Zones tab and create a new zone using the name of the zone
authenticated by the server. Then click Add IPv4 address and select the Subnet option to add a subnet mask that
contains the authentication server.
Click the Zone authentication tab. Each zone can be set to authenticate to the server. The zone (its IP address and
subnet) will be valid after it is successfully authenticated – for example actions such as switching to a firewall profile
and adding an address/subnet of the zone to the Trusted Zone will be performed ??only after successful
authentication.
Enable IP addresses/subnets in the zone will become valid... to make a zone that will become invalid if
authentication is unsuccessful. To select a Personal firewall profile to be activated after a successful zone
authentication, click Profiles....
If you select Add addresses/subnets of the zone to the Trusted Zone, the addresses/subnets of the zone will be
added to the Trusted zone after successful authentication (recommended). If authentication is unsuccessful, the
addresses will not be added to the Trusted zone. If Switch to profile with the same name automatically (a new
profile will be created) is selected, a new profile will be created after successful authentication. Click Profiles... to
open the Firewall profiles window.
There are two authentication types available:
1) Using ESET authentication server
Zone authentication searches for a specific server in the network and uses asymmetric encryption (RSA) to