Reference: Configuration options
Avira Professional Security - User Manual (Status: 23 Sep. 2011)
144
Setting
Rules
Low
No incoming data traffic is blocked by the Avira
FireWall.
Medium
Allow established TCP connections on 135
Allow
TCP packets from address
0.0.0.0
with mask
0.0.0.0
if local ports in
{135}
and remote ports in
{0-65535}
.
Apply for
packets of existing connections
.
Don't log
when packet matches rule.
Advanced: Discard packets that have following
bytes
<empty>
with mask
<empty>
at offset
0
Deny TCP packets on 135
Deny TCP packets from address 0.0.0.0 with mask
0.0.0.0 if local ports in {135} and remote ports in {0-
65535}.
Apply for all packets.
Don't log when packet matches rule.
Advanced: Discard packets that have following
bytes <empty> with mask <empty> at offset
0
.
Monitor TCP healthy data traffic
Allow
TCP packets from address
0.0.0.0
with mask
0.0.0.0
if local ports in
{0-65535}
and remote ports
in
{0-65535}
.
Apply for
connection initiation and existing
connection packets
.
Don't log
when packet matches rule.
Advanced: Discard packets that have following
bytes
<empty>
with mask
<empty>
at offset
0
.
Deny all TCP packets
Deny
TCP packets
from address
0.0.0.0
with mask
0.0.0.0
if local ports are in range
{0-65535}
and the
remote port is in range
{0-65535}
.
Apply for
all packets
.
Don't log
when packet matches rule.
Advanced: Discard packets that have following
bytes
<empty>
with mask
<empty>
at offset
0
.