30.01.2015 Views

Administrator's Guide - Kerio Software Archive

Administrator's Guide - Kerio Software Archive

Administrator's Guide - Kerio Software Archive

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Firewall and Intrusion Prevention System<br />

MAC address list<br />

This list includes MAC addresses of computers with either filtered (blocked) or allowed<br />

traffic — depending on the mode.<br />

MAC addresses are defined as six bytes (hexadecimal numbers) separated by colons<br />

(e.g.: a0:de:bf:33:ce:12) or dashes (e.g.: a0-de-bf-33-ce-12) or in a compact format<br />

without separators (a0debf33ce12).<br />

For better reference, each MAC address can be optionally accompanied by a description<br />

of the particular device. It is highly recommended to use these descriptions thoroughly<br />

— the MAC address itself provides no helpful reference information.<br />

Warning:<br />

It is necessary to bear in mind that a wrong setting of the MAC address filter may also<br />

block access to the firewall’s remote administration. If this happens, it is necessary to<br />

connect to the firewall from a computer from which traffic is allowed or locally (the Windows<br />

edition). The <strong>Software</strong> Appliance / VMware Virtual Appliance edition does not allow local<br />

administration. If the remote administration gets completely blocked, the only option is<br />

recovery of default configuration (see chapter 2.11). However, after the recovery, it is<br />

necessary to reconfigure the firewall.<br />

For these reasons it is recommended to change MAC filter settings only with utmost caution<br />

so that you do not block remote administration.<br />

8.3 Special Security Settings<br />

<strong>Kerio</strong> Control provides several additional options for traffic filtering that cannot be defined by<br />

traffic rules. These options can be set in the Miscellaneous tab of the Configuration → Traffic<br />

Policy → Security Settings section.<br />

Figure 8.4<br />

Security options — Anti-Spoofing and cutting down number of connections for one host<br />

118

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!