About Firewall rules

The Firewall Management task controls filtration of incoming and outgoing network traffic using allowing rules forcibly applied to the Windows Firewall during task execution.

The first time the task is started Kaspersky Embedded Systems Security reads and copies all the incoming network traffic rules specified in the Windows Firewall settings to the Firewall Management task settings. Then the application operates according to the following rules:

You can manage different types of Firewall rules: for applications and for ports.

Behavior of the default rules when you install and remove the application

During installation, a set of allowing rules is created to prevent the applications installed along with Kaspersky Embedded Systems Security from being blocked and to ensure their continuous operation. Following are the details and limitations.

By default, Kaspersky Embedded Systems Security creates a set of rules for incoming network traffic when you install the application on a device that runs any supported version of Windows OS:

By default, Kaspersky Embedded Systems Security creates a set of rules for outgoing network traffic when you install the application on a device that runs Windows 7 or later:

When you uninstall Kaspersky Embedded Systems Security, the application removes all created Firewall rules, except for the rules created by Kaspersky Security Center Network Agent, such as Kaspersky Security Center WDS and Kaspersky Administration Kit. Also, the application removes the rules for ICMPv4 and ICMPv6 for Windows 7 and later.

When you uninstall Kaspersky Embedded Systems Security, the application enables all ICMP connections for operating systems earlier than Windows 7.

Application rules

This type of rule allows targeted network connections for specified applications. The triggering criterion for these rules is based on a path to an executable file.

You can manage application rules:

Port rules

This type of rule allows network connections for specified ports and protocols (TCP / UDP). The triggering criteria for these rules are based on the port number and protocol type.

You can manage port rules:

Port rules involve a broader scope than application rules. By allowing connections based on port rules, you lower the security level of the protected device.

Page top