In each node, you can configure how peer-to-peer connections of the selected type
should be handled, using the table below.
Tab
le 54: Peer-to-Peer Fields
In t
his field...
Acti
on
Track
Bl
ock proprietary
pr
otocols on all ports
Chapter 9: Setting Your Security Policy
Do this...
Specify what action to take when a connection is atte
one of the following:
•
Block. Block the connection.
•
None. No action. This is the default.
Specify whether to log peer-to-peer connections, by selecting one of the
following:
•
Log. Log the connection.
•
None. Do not log the connection. This is the default.
Specify whether
proprietary protocols should be blocked on all ports, by
selecting one of the following:
•
Block. Block the proprietary protocol on all ports. This in effect
prevents all communication using this peer-to-peer
application. This is the default.
•
None. Do not block the proprietary protocol on all ports.
Using SmartDefense
mpted, by selecting
253