Firewall

The firewall employs kernel-mode drivers to enforce network traffic restrictions and block unauthorized intrusion attempts.

It is recommended to use the firewall of defense system instead of the system firewall, because the firewall of defense  system supports protection by region, for example, only Hong Kong IP is allowed to access port 21.


Comparison of Functional Advantages Between Our Company's Firewall and System Firewall

Functional ModuleSystem FirewallMagiAegis
Zone Protectionno (1).pngyes-l (1).png
Inbound Rulesyes-l (1).pngyes-l (1).png
Outbound Rulesyes-l (1).pngyes-l (1).png
Rule PriorityWindows does not supportyes-l (1).png
Port Scan Protectionno (1).pngyes-l (1).png
Brute Force Protectionno (1).pngyes-l (1).png
Disable ICMP Echo Replyyes-l (1).pngyes-l (1).png
IP Whitelist/Blacklistno (1).pngyes-l (1).png
Zone-based Whitelist/Blacklistno (1).pngyes-l (1).png
Malicious IP Blacklistno (1).pngyes-l (1).png

Inbound Rules

Outbound Rules

Attack Protection

Black and White Lists

Interception List

<< Process Protection