Legal Information
PC Knowledge Base - Expected computer use

Good Knowledge Is Good2Use

You need protection if you have

You'll also want to enable a firewall on the Windows XP-based host computer (and only the host computer) that is used for Internet Connection Sharing (ICS). If you're a broadband user with two or more ISP assigned IPs connected through a hub, you'll need to protect each computer individually. An easy rule of thumb - if a computer connects directly to the Internet, it needs protection.

Ask the following questions

  1. What asset(s) (corporate, customer, e-commerce) is/are at risk?
  2. What is the value of that asset?
  3. What are the ramifications relating to downtime, lost revenue, or lost client and customer confidence?
  4. What is the actual threat? Have internal threats been sealed off?
  5. What's the potential for external breaches?

CIOs and network administrators need a complete and comprehensive understanding of not only Internet activities but also internal network traffic, such as bandwidth requirements, protocols in use, and access requirements. Remember that all access points are vulnerable and subject to attacks.
Once you have this information, you can move on to building a firewall architecture.

VPN Usage:

If you're a VPN user and connect to a remote office, you should not use ICF. Turn it off before you start your VPN session.

File and Print Sharing:

Some broadband providers offer connectivity for more than a single computer and supply multiple public routable IPs. In this case, computers are connected to a hub or switch (rather than a router or NAT box) that connects to a cable or DSL modem. Since ICF disables file and print sharing using TCP/IP, you may need an alternative method of sharing files among your own computers.

You can install an additional network transport protocol such as IPX/SPX that will enable you to transfer files between your computers.



Search Knowledge Base Feedback
If you like our web site refer a friend.
Your friends name.
Your friends email address.
Your Name
Your Email Address


© Copyright 1998-1999 GOOD2USE