Reference: Configuration options
Avira Internet Security - User Manual (Status: 23 Sep. 2011)
134
Action
Shows the action that the Avira FireWall will automatically take when the
application is using the network, whatever the network usage type is. With
a mouse click on the link you can switch to another action type. The action
types are
Ask
,
Allow
or
Deny
.
Ask
is the default action.
Advanced configuration
If the network accesses of an application require individual rules, you can create the
application rules based on packet filters in the same way as you created the adapter rules.
To change to the advanced configuration of the application rules, first activate the
Expert mode
option in the
Configuration
window.
Then go to
Configuration > Online protection > FireWall > Settings
and enable
the
Advanced settings
option under
Application rules
.
Save the setting by clicking
Apply
or
OK
.
Under
Configuration > Online protection > FireWall > Application rules
section, an additional column with the heading
Filtering
is displayed in the list of
application rules, with the entry
Basic
for each application.
Column
Description
Application
Name of the application.
Active
Connections
Number of active connections opened by the application.
Action
Shows the action that the Avira FireWall will automatically take when the
application is using the network, whatever the network usage type is.
If you choose
Basic
in the
Filtering
column, you can click the link to
select another action type. The values are
Ask
,
Allow,
or
Deny
.
If you choose
Advanced
in the
Filtering
column, the
Rules
action type is
displayed. The
Rules
link opens the
Advanced application rules
window, in which you can enter specific rules for the application.
Filtering
Shows the type of filtering. You can select another type of filtering by
clicking the link.
Basic
: In the case of simple filtering, the specified action is carried out on
all network activities performed by the software application.
Advanced
: With this type of filtering, the rules that were added to the
extended configuration are applied.