Reference: Configuration options
Avira Professional Security - User Manual (Status: 23 Sep. 2011)
124
Setting
Rules
Low
No incoming data traffic is blocked by the Avira FireWall.
Medium
Allow Established TCP Connections on 135
Allow
TCP packets from address
0.0.0.0
with mask
0.0.0.0
if local ports in
{135}
and remote port is in
{0-65535}
.
Apply for
packets of existing connections
.
Don't log
when packet matches rule.
Advanced: Discard packets that have following bytes
<empty>
with mask
<empty>
at offset
0
.
Deny TCP packets on 135
Deny TCP packets from address
0.0.0.0
with mask
0.0.0.0
if local port is in
{135}
and remote port is in
{0-65535}
.
Apply for
all packets
.
Don't log
when packet matches rule.
Advanced: Discard packets that have following bytes
<empty>
with mask
<empty>
at offset
0
.
TCP healthy traffic Monitor
Allow
TCP packets from address
0.0.0.0
with mask
0.0.0.0
if local port is in
{0-65535}
and remote port is in
{0-65535}
.
Apply for
connection initiation and existing connection packets
.
Don't log
when packet matches rule.
Advanced: Select packets that have following bytes
<empty>
with mask
<empty>
at offset
0
.
Discard TCP traffic
Deny
TCP packets from address
0.0.0.0
with mask
0.0.0.0
if local port is in
{0-65535}
and remote port is in
{0-65535}
.
Apply for
all packets
.
Don't log
when packet matches rule.
Advanced: Select packets that have following bytes
<empty>
with mask
<empty>
at offset
0
.
High
Monitor established TCP traffic
Allow
TCP packets from address
0.0.0.0
with mask
0.0.0.0
if local port is in
{0-65535}
and remote port is in
{0-65535}
.
Apply for
packets of existing connections
.
Don't log
when packet matches rule.
Advanced: Select packets that have following bytes
<empty>
with mask
<empty>
at offset
0
.
Allow/ Deny TCP packets
Содержание PROFESSIONAL SECURITY
Страница 1: ...Avira Professional Security User Manual...