Reference Guide

Manage Policies
228
Actions
Radio button/Check box
Allow
Block
Treat match as intrusion
Log matching traffic
Allow
- Allows traffic through the
firewa
ll if the item is matched.
Block
- Stops traffic from passing
through the firewall if the item is
matched.
Treat match as
intrusion - Treats
traffic that matches
the rule as an
attack and generates an event that is
sent to the Reputation Service. The
Block
action for the rule must be
selected for an event to be
gener
ated.
Log matching traffic
- Preserves a
record of matching
traffic in the
Firewall activity log on
the Endpoint
Security Cl
ient.
Direction
Drop-down menu
In
Out
Either
In
- Monitors incoming traffic.
Out
- Monitors outgoing traffic.
Either
- Monitors both incoming and
outgoing traffic.
Notes
Text input field
Provides more information about the
rule.
Setting UI Control Description
Networks
Network protocol
Radio button/Check box
Any protocol
IP protocol
Non
-IP protocol
Any protocol
- Allows both IP and
non
-IP protocols.
IP protocol
- Excludes non-IP
protocols
. IPv4 protocol or IPv6
protocol. If ne
ither check box is
selected, any IP protoco
l applies.
Both IPv4 and IPv6 are selectable.
Non
-IP protocol - Includes non-IP
protocols only.
Connection types Check box
Wired
Wireless
Virtual
Indicates if one or all con
nection
types apply.
A Virtual connecti
on type is an
adapter presented by a VPN or a
virtual machine application, such as
VMware, rath
er than a physical
adapter.