User manual

Reference: Configuration options
Avira Professional Security - User Manual (Status: 14 Dec. 2012) 149
Setting
Rules
Low
No incoming data traffic is blocked by the Avira
FireWall.
Medium
Allow established TCP connections on 135
Allow TCP packets from address 0.0.0.0 with mask
0.0.0.0 if local ports in {135} and remote ports in
{0-65535}.
Apply for packets of existing connections.
Don't log when packet matches rule.
Advanced: Discard packets that have following
bytes <empty> with mask <empty> at offset 0
Deny TCP packets on 135
Deny TCP packets from address 0.0.0.0 with mask
0.0.0.0 if local ports in {135} and remote ports in {0-
65535}.
Apply for all packets.
Don't log when packet matches rule.
Advanced: Discard packets that have following
bytes <empty> with mask <empty> at offset 0.
Monitor TCP healthy data traffic
Allow TCP packets from address 0.0.0.0 with mask
0.0.0.0 if local ports in {0-65535} and remote ports
in {0-65535}.
Apply for connection initiation and existing
connection packets.
Don't log when packet matches rule.
Advanced: Discard packets that have following
bytes <empty> with mask <empty> at offset 0.
Deny all TCP packets
Deny TCP packets from address 0.0.0.0 with mask
0.0.0.0 if local ports are in range {0-65535} and the
remote port is in range {0-65535}.
Apply for all packets.
Don't log when packet matches rule.
Advanced: Discard packets that have following
bytes <empty> with mask <empty> at offset 0.