BullGuard Mobile Security


Block unwanted messages

BullGuard Mobile Security suite includes a Firewall engine that will protect your device against unwanted intrusions or network traffic. This feature is designed for users who are usually connected to access points as it greatly reduces the risks created by working in public environments.


The Firewall module has 3 security levels to suit users’ needs. The security levels can also be adapted in turn by adding, removing or editing Firewall rules.

Security level: is responsible for the Firewall behaviour and how it directs both incoming and outgoing traffic. The levels can be further tuned by using Firewall Rules. Security levels:

Off: disables the Firewall filtering for all traffic.

Low: allows the traffic on all ports except for those blocked by individual rules.

High: blocks the traffic on all ports except for those allowed by individual rules.

Back: returns you to the BullGuard module screen.

Menu: allows you to access the Rules list and the Firewall Activity log.

Firewall Rules

You can specify the BullGuard Firewall what kind of traffic to allow or block based on strict rules through which you can block IP addresses or Ports. To add a new rule and to edit, delete or duplicate existing ones, click on the Menu button to manage your Firewall’s Rules List. Note that High and Low security profiles have their own rules and changes made in one list will not affect the other.

Add: starts the Guide that will takes you through all steps needed to create a Firewall rule.

Edit: allows you to edit the currently selected Firewall rule.

Delete: allows you to delete the currently selected rules.

Disable: allows you to disable the currently selected rule.

Make Copy: allows you to create a duplicate of the selected rule.

Restore defaults: restores the Firewall default rules. It will delete any user created rules as well.

Adding Firewall Rules

As soon as you choose to add a rule, the Guide will appearto guide you through the process of editing the newly created rule to meet your needs.

At the first screen, you can name the rule and set its policy, whether to allow or block network traffic. Click Next to proceed further.

Description: allows you to choose a name for the newly created rule.

Allow/Block: allows you to choose whether the Firewall will block or allow the traffic.

Rule enabled: having this option checked, the Firewall will apply the rule as soon as it is saved to the Rules List. Otherwise, you will need to enable it manually whenever you want it active.

The next step is selecting the IP or IP addresses the Firewall will be applied to.

All IPs: the rule affects all IP addresses. Untick this option if you wish to block a specific IP or IP range.

Single IP Address: the rule applies only to the specified IP.

IP Address Range: the rule applies only to the IPs included in the defined IP range (192.168.0.* - the rule applies to all IPs starting with to

Next: takes you to the next screen of editing your Firewall rule.

Back: takes you to the previous screen.
The next step is to choose the ports the Firewall rules will be applied to.

All: the rule is applied indiscriminately to all active ports on the device.

Single: the rule is applies to the specified port number.

Range: the rule is applied to all ports included in the specified range.

Next: takes you to the next Guide screen.

Back: brings up the previous screen.

The last step in creating a custom-made Firewall rule is to choose the traffic direction the Firewall rule is applied to. The Firewall rules can apply to inbound or outbound traffic or both.

Click Finish to save the rule. If the Rule enabled settings is active, as soon as the rule is created, it will be applied immediately.

Activity Log

The Activity Log screen displays changes made to the Firewall and blocked traffic to and from your device so you can review any changes or events. Press Clear Log to empty the log file or Close to return to the Firewall main module screen.