Reference Guide
Security Management Server v10.2.10 AdminHelp
225
are started.
Allow bridged traffic
Check box
Allows traffic with a local MAC
address.
The MAC address is an address in the
lis
t of VMs that Firewall supports,
not the
local system's MAC address.
Use this option to allow traffic
through a bridged environment wit
h
virtual mach
ines.
Enable IP spoof protection
Check box
Blocks network traffic from non-local
host IP addresses or from
local
processes that attempt to spoof their
IP add
ress.
Enable firewall intrusion alerts
Check box
Displays alerts automatically when
Firewall detects a pot
ential attack.
Setting
UI Control
Description
Tuning Options
Enable Adaptive mode Check box
Creates rules automatically to allow
traffi
c.
NOTE:
Enable this option temporarily
while tuning a deploy
ment.
Log all blocked traffic to client
activity log
Check box
Enabled by default
Logs all blocked traffic to the
Firewall event log
(FirewallEventMonitor
.log) on the
Endpoint Security Client.
Log all allowed traffic to client
activity log
Check box
Disabled by default
Logs all allowed t
raffic to the
Firewall event log
(FirewallEventMonitor.log) on the
Endpoint Security Client.
N
OTE: Enabling this option might
negatively impact perform
ance.
Setting
UI Control
Description
Network Reputation
Incoming network - reputation
threshold
Drop-down menu
High Risk
Unverified
Do not block
Medium Risk
Specifies the rating threshold for
blocking incoming or outgoing traffic
from a network connection.
High R
isk - This source/destination
sends or hosts pote
ntially malicious
content/traffic that is cons
idered
r
isky.
Unverified
- This site appears to be
a legitimate source or destination of
content/traffic, but also displa
ys
properties suggesting that further
in
spection is necessary.
Do not block - This site is a