How to configure 2 way access to the “trusted” computers on your network
Published May 15th, 2005 in the following Categories:Firewalls
A software firewall can stop outside hackers from breaking into your home or office network.
At the same time, you can easily set it up with a trusted zone so that people you know and trust can share files and folders whenever you want.
Let’s open up ZoneAlarm which is a popular and free software firewall and I’ll tell you how to do it.
Now, I happen to use ZoneLabs but you can use any firewall you want.
Let’s open it up and click on ZoneLabs Security. When it opens up you’re going to want to go to the firewall menu option and click on the Zones tab.
Next, click the Add button to create a zone and we’ll choose the IP range option because what we’re going to do is define our trusted zone with a beginning and ending IP address range.
Here I’m using a particular set of addresses for example purposes. Your mileage may vary. You’ll have to find out what range is relevant to your network. whether it’s a home network or an office network.
Put in a descriptive name for your netowork — home network, office network, pineapple, banana, whatever you like.
click the OK button.
click the apply button.
Now, let’s test our firewall and see if it is working the way we want it to — allowing access to trusted users.
Let’s double click My Network Places on the desktop
The window that opens will automatically display the shared folder resources on our network.
Double Click the icon that says Entire Network.
If we’re successful, we should be able to see an icon called Workgroup. This name may be different if you have named your workgroup with another name.
The next window will show the computers that are in your workgroup. If you double click one of them, you should see the shared folders that we will have access to over the network, allowed by the trusted zone feature in Zone Alarm.
So — to review:
A software firewall can stop outside hackers from getting into your home or office network.
At the same time it can allow access to your network for people you trust.
- What to look for if two computers can’t connect to each other
- Access your PC from anywhere
- How to Configure Network Indentification in Windows 2000 (Part I)
- How to Configure Network Identification in Win 2000 (Part II)
No Responses to “How to configure 2 way access to the “trusted” computers on your network”
Please Wait
Leave a Reply