Reference Guide

Security Management Server Virtual v10.2.10 AdminHelp
223
are started.
Allow bridged traffic
Check box
Allows traffic with a local MAC
address.
The MAC address is an address in the
list of VMs that
Firewall supports,
not the local system's MAC address.
Use this option to allow traffic
through a bridged environment w
ith
virtual machines.
Enable IP spoof protection
Check box
Blocks network traffic from non-local
host IP addresses or from local
processes that attempt to spoof their
IP address.
Enable firewall intrusion alerts
Check box
Displays alerts automatically when
Firewall detects a pot
ential attack.
Setting
UI Control
Description
Tuning Options
Enable Adaptive mode Check box
Creates rules automatically to allow
traffic.
NOTE:
Enable this option temporarily
while tuning a deployment.
Log all blocked traffic to client
activity log
Check box
Enabled by default
Logs all block
ed traffic to the
Firewall event log
(FirewallEventMonitor.log) on the
E
ndpoint Security Client.
Log all allowed traffic to client
activity log
Check box
Disabled by default
Logs all allowed
traffic to the
Firewall event log
(FirewallEventMonitor.log) on
the
Endpoint Security Client.
N
OTE: Enabling this option might
negativel
y impact performance.
Setting
UI Control
Description
Network Reputation
Incoming network - reputation
threshold
Drop-down menu
High Risk
Unverified
Do not block
Medium Risk
Specifie
s the rating threshold for
blocking incoming or outgoing traffic
from a
network connection.
High Risk
- This source/destination
sends or hosts pote
ntially malicious
content/traffic that is co
nsidered
risky.
Unverified
- This site appears to be
a legitimate
source or destination of
content/traffic, but also displays
properties
suggesting that further
inspection is necessary.
Do not block - This site is a