Reference Guide
Security Management Server Virtual v10.2.11 AdminHelp
are started.
Allow bridged traffic
Check box
Allows traffic with a local MAC
address.
The MAC address is an address in the
list of VMs that Firewall supports,
not the local system's MAC address.
Use this option to allow traffic
through a bridged environment with
virtual machines.
Enable IP spoof protection
Check box
Blocks network traffic from non-local
host IP addresses or from local
processes that attempt to spoof their
IP address.
Enable firewall intrusion alerts
Check box
Displays alerts automatically when
Firewall detects a potential attack.
Setting
UI Control
Description
Tuning Options
Enable Adaptive mode Check box
Creates rules automatically to allow
traffic.
NOTE:
Enable this option temporarily
while tuning a deployment.
Log all blocked traffic to client
activity log
Check box
Enabled by default
Logs a
ll blocked traffic to the
Firewall event log
(FirewallEventMonitor.log) on the
Endpoint Security Client.
Log all allowed traffic to client
activity log
Check box
Disabled by default
Logs all allowed traffic to the
Firewall event log
(FirewallEventMonitor.
log) on the
Endpoint Security Client.
N
OTE: Enabling this option might
negatively impact performance.
Setting
UI Control
Description
Network Reputation
Incoming network - reputation
threshold
Drop-down menu
High Risk
Unverified
Do not block
Medium Risk
Specifies the rating threshold for
blocking incoming or outgoing traffic
from a network connection.
High Risk
- This source/destination
sends or hosts potentially malicious
content/traffic that is considered
risky.
Unverified
- This site appears to be
a legitimate source or destination of
content/traffic, but also displays
properties suggesting that further
inspection is necessary.
Do not block
- This site is a
223