EasyManua.ls Logo

AVIRA PROFESSIONAL SECURITY - Page 144

AVIRA PROFESSIONAL SECURITY
195 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Reference: Configuration options
Avira Professional Security - User Manual (Status: 23 Sep. 2011) 144
Setting
Rules
Low
No incoming data traffic is blocked by the Avira
FireWall.
Medium
Allow established TCP connections on 135
Allow TCP packets from address 0.0.0.0 with mask
0.0.0.0 if local ports in {135} and remote ports in
{0-65535}.
Apply for packets of existing connections.
Don't log when packet matches rule.
Advanced: Discard packets that have following
bytes <empty> with mask <empty> at offset 0
Deny TCP packets on 135
Deny TCP packets from address 0.0.0.0 with mask
0.0.0.0 if local ports in {135} and remote ports in {0-
65535}.
Apply for all packets.
Don't log when packet matches rule.
Advanced: Discard packets that have following
bytes <empty> with mask <empty> at offset 0.
Monitor TCP healthy data traffic
Allow TCP packets from address 0.0.0.0 with mask
0.0.0.0 if local ports in {0-65535} and remote ports
in {0-65535}.
Apply for connection initiation and existing
connection packets.
Don't log when packet matches rule.
Advanced: Discard packets that have following
bytes <empty> with mask <empty> at offset 0.
Deny all TCP packets
Deny TCP packets from address 0.0.0.0 with mask
0.0.0.0 if local ports are in range {0-65535} and the
remote port is in range {0-65535}.
Apply for all packets.
Don't log when packet matches rule.
Advanced: Discard packets that have following
bytes <empty> with mask <empty> at offset 0.

Table of Contents

Related product manuals