52
Security Profiles
You can change the current security profile from the Summary page. For
more information, see “
.
The following table contains a list of the security profiles available in the
product and the type of traffic each of them either allow or deny.
Security profiles
Description
Block All
Blocks all network traffic (excluding loopback).
Server
Allows only IP configuration via DHCP, DNS
lookups and ssh protocol out and in.
The server profile has to be customized
before it can be taken into use.
Mobile
Allows normal web browsing and file retrievals
(HTTP, HTTPS, FTP), as well as e-mail and
Usenet news traffic. Encryption programs,
such as VPN and SSH are also allowed.
Everything else is denied. Local rules can be
added after the malware probes detection.
Home
Allows all outbound TCP traffic and FTP file
retrievals. Everything else is denied. Local
rules can be added to enable new network
functionality.
Office
Allows all outbound TCP traffic and FTP file
retrievals. Everything else is denied by
default. With this profile, a firewall should exist
between 0.0.0.0/0 and the host.
Summary of Contents for ANTI-VIRUS LINUX CLIENT SECURITY -
Page 1: ...F Secure Anti Virus Linux Server Security Administrator s Guide...
Page 36: ...34 5 USER INTERFACE BASIC MODE Summary 35 Common Tasks 36...
Page 88: ...86 C Riskware Types Riskware Categories and Platforms 87...
Page 91: ...CHAPTERC 89 Riskware Types...
Page 104: ...102 F Man Pages fsav 103 fsavd 137 dbupdate 155 fsfwc 159 fsic 162...
Page 160: ...158 SEE ALSO fsav 1 and fsavd 8 For more information see F Secure home page...
Page 173: ...171 G APPENDIX Config Files fsaua_config 172 fssp conf 177...
Page 206: ...204...
Page 207: ......
Page 208: ...www f secure com...