User Manual
User Manual
User Manual
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Reference: Configuration options<br />
Warning<br />
When a packet is filtered, the corresponding rules are applied successively,<br />
therefore the rule order is very important. Change the rule order only if you are<br />
completely aware of what you are doing.<br />
Predefined rules for the TCP traffic monitor<br />
Setting Rules<br />
Low No incoming data traffic is blocked by the Avira FireWall.<br />
Medium Allow Established TCP Connections on 135<br />
Allow TCP packets from address 0.0.0.0 with mask 0.0.0.0 if local ports in<br />
{135} and remote port is in {0-65535}.<br />
Apply for packets of existing connections.<br />
Don't log when packet matches rule.<br />
Advanced: Discard packets that have following bytes with mask<br />
at offset 0.<br />
Deny TCP packets on 135<br />
Deny TCP packets from address 0.0.0.0 with mask 0.0.0.0 if local port is in<br />
{135} and remote port is in {0-65535}.<br />
Apply for all packets.<br />
Don't log when packet matches rule.<br />
Advanced: Discard packets that have following bytes with mask<br />
at offset 0.<br />
TCP healthy traffic Monitor<br />
Allow TCP packets from address 0.0.0.0 with mask 0.0.0.0 if local port is in<br />
{0-65535} and remote port is in {0-65535}.<br />
Apply for connection initiation and existing connection packets.<br />
Don't log when packet matches rule.<br />
Advanced: Select packets that have following bytes with mask<br />
at offset 0.<br />
Discard TCP traffic<br />
Deny TCP packets from address 0.0.0.0 with mask 0.0.0.0 if local port is in<br />
{0-65535} and remote port is in {0-65535}.<br />
Apply for all packets.<br />
Don't log when packet matches rule.<br />
Advanced: Select packets that have following bytes with mask<br />
at offset 0.<br />
Avira Professional Security - <strong>User</strong> <strong>Manual</strong> (Status: 30 Mar. 2012) 129