Full name
Protocol number
Protocol name
Cisco Generic Routing
Encapsulation (GRE) Tunnel
47
GRE
Encapsulation Security Payload
protocol
50
ESP
Authentication Header protocol
51
AH
Protocol Independent Multicast
103
PIM
Compression Header protocol
108
COMP
Raw IP packets
255
RAW
6.
Select the initiator ports:
If your service uses the TCP or UDP protocol, you need to define the initiator ports the service covers.
The format for entering the ports and port ranges is as follows:
•
>port
: all ports higher than
port
•
>=port
: all ports equal and higher than
port
•
<port
: all ports lower than
port
•
<=port
: all ports equal and lower than
port
•
port
: only the
port
•
minport-maxport
:
minport
and
maxport
plus all ports between them (notice that there are no
spaces on either side of the dash).
You can define comma-separated combinations of these items. For example ports 10, 11, 12, 100, 101,
200 and over 1023 can be defined as
10-12, 100-101, 200, >1023
.
In this example, define the initiator port as
>1023
.
7.
Select responder ports:
If your service uses the TCP or UDP protocol, you need to define the responder ports the service covers.
In this example, define the responder port as
8000
.
8.
Select a classification number for the service from the drop down list.
You can accept the default value.
9.
Select whether any extra filtering is to be applied for the traffic allowed by the service you are creating, in
addition to the normal packet and stateful filtering.
In this example you can accept the default,
Disabled
.
Note:
When the service uses TCP protocol, and you do not have application control enabled, you
can select
Active mode FTP
from the
Extra filtering
drop-down menu.
Active mode FTP
requires
special handling from the firewall, as the information about the port that should be opened for the
connection is included in the transferred data.
10.
You can review your rule now.
If you need to make any changes to the rule, click
Back
through the rule.
11.
Click
Finish
to close the rule wizard.
The rule you just created is now displayed on the
Firewall rules
table.
12.
Take the new rule into use:
To take this new service into use you will have to create a new Internet Shield rule that allows the use of
the
HTTP 8000
firewall service in the currently used Internet Shield security level. In this case you can
select the new service on the
Rule wizard
➤
Service
page and you do not have to define any alerts on
the
Rule Wizard
➤
Advanced options
page.
F-Secure Client Security | Advanced features: Internet Shield |
155
Содержание ANTI-VIRUS FOR MICROSOFT EXCHANGE 9.00
Страница 1: ...F Secure Client Security Administrator s Guide...
Страница 2: ......
Страница 8: ...8 F Secure Client Security TOC...
Страница 44: ......
Страница 62: ......
Страница 86: ......
Страница 101: ...4 Click to save and distribute the policy F Secure Client Security Configuring Internet Shield 101...
Страница 114: ......
Страница 118: ......
Страница 135: ...Tammasaarenkatu 7 PL 24 00181 Helsinki Finland F Secure Client Security Virus information 135...
Страница 148: ......
Страница 157: ...4 Click to save and distribute the policy F Secure Client Security Advanced features Internet Shield 157...
Страница 158: ......