Reference Guide
Manage Policies
Actions
Radio button/Check box
Allow
Block
Treat matc
h as intrusion
Log matching traffic
Allow
- Allows traffic through the
firewall if the item is matched.
Block
- Stops traffic from passing
through the firewall if the item is
matched.
Treat match as intrusion
- Treats
traffic that matches the rule as an
attack and generates an event that is
sent to the Reputation Service. The
Block
action for the rule must be
selected for an event to be
generated.
Log matching traffic
- Preserves a
record of matching traffic in the
Firewall activity log on the Endpoint
Secu
rity Client.
Direction
Drop-down menu
In
Out
Either
In
- Monitors incoming traffic.
Out
- Monitors outgoing traffic.
Either
- Monitors both incoming and
outgoing traffic.
Notes
Text input field
Provides more information about the
rule.
Setting UI Control Description
Networks
Network protocol
Radio button/Check box
Any protocol
IP protocol
Non
-IP protocol
Any protocol
- Allows both IP and
non
-IP protocols.
IP protocol
- Excludes non-IP
protocols. IPv4 protocol or IPv6
protocol. If neither check box is
selected, any IP protocol applies.
Both IPv4 and IPv6 are selectable.
Non
-IP protocol - Includes non-IP
protocols only.
Connection types Check box
Wired
Wireless
Virtual
Indicates if one or all connection
types apply.
A Virtual connection type is an
adap
ter presented by a VPN or a
virtual machine application, such as
VMware, rather than a physical
adapter.
228