Asus P5ND2-SLI User Manual
Page 147
A S U S P 5 N D 2 - S L I S e r i e s
A S U S P 5 N D 2 - S L I S e r i e s
A S U S P 5 N D 2 - S L I S e r i e s
A S U S P 5 N D 2 - S L I S e r i e s
A S U S P 5 N D 2 - S L I S e r i e s
5 - 1 9
5 - 1 9
5 - 1 9
5 - 1 9
5 - 1 9
Setting security profiles
Setting security profiles
Setting security profiles
Setting security profiles
Setting security profiles
The NVFirewall™ application allows several security profiles to match your
system security needs. The following describes the NVFirewall™ security
profiles:
•
L o w
L o w
L o w
L o w
L o w - allows safe incoming connections and deny those that are
known to be dangerous connections. This profile also enables some
anti-hacking features.
•
M e d i u m
M e d i u m
M e d i u m
M e d i u m
M e d i u m - blocks most incoming connections. Incoming connections
to some ports must be set to allow file transfers using some online
messaging applications. This profile also enables some anti-hacking
features.
•
H i g h
H i g h
H i g h
H i g h
H i g h - allows the least traffic through. Only outbound connections
are allowed. This profile also includes the “stealth mode’ feature that
makes your system invisible to intruders. This also enables some
anti-hacking features.
•
L o c k d o w n
L o c k d o w n
L o c k d o w n
L o c k d o w n
L o c k d o w n - blocks all incoming and outgoing connections.
•
A n t i - h a c k i n g o n l y
A n t i - h a c k i n g o n l y
A n t i - h a c k i n g o n l y
A n t i - h a c k i n g o n l y
A n t i - h a c k i n g o n l y - this profile enables all anti-hacking features but
disables the firewall. This security profile is useful if you want to use a
third-party firewall application.
•
C u s t o m 1 , 2 , 3
C u s t o m 1 , 2 , 3
C u s t o m 1 , 2 , 3
C u s t o m 1 , 2 , 3
C u s t o m 1 , 2 , 3 - these are reserved for customized profiles.
•
O f f
O f f
O f f
O f f
O f f - deactivates the firewall.
To set a security profile:
1.
From the NVFirewall™ summary
menu, click the C u r r e n t
C u r r e n t
C u r r e n t
C u r r e n t
C u r r e n t
F i r e w a l l P r o f i l e
F i r e w a l l P r o f i l e
F i r e w a l l P r o f i l e
F i r e w a l l P r o f i l e
F i r e w a l l P r o f i l e combo list
box then select a security profile.
The following confirmation box
appears.
2.
Click C h a n g e P r o f i l e
C h a n g e P r o f i l e
C h a n g e P r o f i l e
C h a n g e P r o f i l e
C h a n g e P r o f i l e to apply
settings or D o n ’ t C h a n g e
D o n ’ t C h a n g e
D o n ’ t C h a n g e
D o n ’ t C h a n g e
D o n ’ t C h a n g e
P r o f i l e
P r o f i l e
P r o f i l e
P r o f i l e
P r o f i l e to return to previous
menu.