Reference Guide
Security Management Server v10.2.7 AdminHelp
233
Settings and Rules
See Client Firewall Settings and Rules.
See basic settings
Client Firewall Settings and Rules
In the Client Firewall policy, Settings and Rules, click View/Edit.
In the Settings window, you can set Client Firewall Options and Client Firewall Rules
.
Return to Client Firewall Policies
Client Firewall Options
Setting UI Control Description
Protection Options
Allow traffic for unsupported protocols Check box
Allows all traffic that uses unsupported protocols.
When disabled, all traffic using unsupported
protocols is blocked.
Allow only outgoing traffic until
firewall services have started
Check box
Allows outgoing traffic but no incoming traffic
until the Firewall service starts.
If this option disabled, Firewall allows all traffic
before services are started.
Allow bridged traffic
Check box
Allows traffic with a local MAC address.
The MAC address is an address in the list of VMs
that Firewall supports, not the local system's MAC
address. Use this option to allow traffic through a
bridged environment with virtual machines.
Enable IP spoof protection
Check box
Blocks network traffic from non-local host IP
addresses or from local processes that attempt to
spoof their IP address.
Enable firewall intrusion alerts
Check box
Displays alerts automatically when Firewall
detects a potential attack.
Setting
UI Control
Description
Tuning Options
Enable Adaptive mode Check box
Creates rules automatically to allow traffic.
NOTE:
Enable this option temporarily while
tuning a deployment.
Log all blocked traffic to client activity log Check box
Enabled by default
Logs all blocked traffic to the Firewall event log
(FirewallEventMonitor.log) on the Endpoint
Security Client.
Log all allowed traffic to client activity log Check box
Disabled by default
Logs all allowed traffic to the Firewall event log
(Firew
allEventMonitor.log) on the Endpoint
Security Client.
N
OTE: Enabling this option might negatively
impact performance.