This tool is used to detect suspicious or abnormal
activities and warns you of intrusion attempts to your machine. You can
access it via the net applet by right clicking on it and choosing
Interactive Firewall from the pop-up menu.
Even if your machine is protected by a firewall, intrusion attempts can be made, we recommend that you use this tool to monitor security status and to detect any intrusions.
When you set up your firewall configuration, check the Use Interactive Firewall option to enable this feature. (Refer to Section 8.3, “Securing your Internet Access via DrakFirewall” for more details about firewall settings).
Each time a remote host tries to connect to one of the open ports on your system the tool pops up a message: click on it to view the full log of the connection attempt and to manage these remote hosts by allowing or denying their access.
The Log tab shows connection attempt details: the date and time, the IP address of the machine trying to connect to yours, the service or port and protocol, and the network interface on which the connection attempt was made.
You can the manage the remote hosts access with the following buttons:
Forbid connections to addresses selected.
Allow access to addresses selected.
Open the Blacklist tab to view all the forbdden remote hosts. You can then:
Remove a remote host from the black list.
Allow a remote host by adding them to the whitelist.
Open the Whitelist tab to view all the allowed addresses. You can then:
Remove addresses from this list.