User manual
Reference: Configuration options
Avira Professional Security - User Manual (Status: 14 Dec. 2012) 130
Setting
Rules
Low
No incoming data traffic is blocked by the Avira FireWall.
Medium
Allow Established TCP Connections on 135
Allow TCP packets from address 0.0.0.0 with mask 0.0.0.0 if local ports in
{135} and remote port is in {0-65535}.
Apply for packets of existing connections.
Don't log when packet matches rule.
Advanced: Discard packets that have following bytes <empty> with mask
<empty> at offset 0.
Deny TCP packets on 135
Deny TCP packets from address 0.0.0.0 with mask 0.0.0.0 if local port is in
{135} and remote port is in {0-65535}.
Apply for all packets.
Don't log when packet matches rule.
Advanced: Discard packets that have following bytes <empty> with mask
<empty> at offset 0.
TCP healthy traffic Monitor
Allow TCP packets from address 0.0.0.0 with mask 0.0.0.0 if local port is in
{0-65535} and remote port is in {0-65535}.
Apply for connection initiation and existing connection packets.
Don't log when packet matches rule.
Advanced: Select packets that have following bytes <empty> with mask
<empty> at offset 0.
Discard TCP traffic
Deny TCP packets from address 0.0.0.0 with mask 0.0.0.0 if local port is in
{0-65535} and remote port is in {0-65535}.
Apply for all packets.
Don't log when packet matches rule.
Advanced: Select packets that have following bytes <empty> with mask
<empty> at offset 0.
High
Monitor established TCP traffic
Allow TCP packets from address 0.0.0.0 with mask 0.0.0.0 if local port is in
{0-65535} and remote port is in {0-65535}.
Apply for packets of existing connections.
Don't log when packet matches rule.
Advanced: Select packets that have following bytes <empty> with mask
<empty> at offset 0.
Allow/ Deny TCP packets