Symantec 20032623 - Endpoint Protection Small Business Edition Implementation Manual page 215

Implementation guide
Table of Contents

Advertisement

additional triggers to describe the particular network protocols and hosts with
which communication is allowed.
Application-based rules may be difficult to troubleshoot because an application
may use multiple protocols. For example, if the firewall processes a rule that
allows Internet Explorer before a rule that blocks FTP, the user can still
communicate with FTP. The user can enter an FTP-based URL in the browser,
such as ftp://ftp.symantec.com.
For example, suppose you allow Internet Explorer and define no other triggers.
Computer users can access the remote sites that use HTTP, HTTPS, FTP, Gopher,
and any other protocol that the Web browser supports. You can define additional
triggers to describe the network protocols and hosts with which communication
is allowed.
You should not use application rules to control traffic at the network level. For
example, a rule that blocks or limits the use of Internet Explorer would have no
effect should the user use a different Web browser. The traffic that the other Web
browser generates would be compared against all other rules except the Internet
Explorer rule. Application-based rules are more effective when the rules are
configured to block the applications that send and receive traffic.
See
Defining information about applications"
See
Notifying the users that access to an application is blocked"
See
About firewall rules"
Defining information about applications
You can define information about the applications that clients run and include
this information in a firewall rule.
To define information about applications
1
In the console, open a Firewall policy.
2
On the Firewall Policies page, click Rules.
3
On the Rules tab, in the Rules list, right-click the Application field, and then
click Edit.
4
In the Application List dialog box, click Add.
5
In the Add Application dialog box, enter one or more of the following fields:
Path and file name
Description
Size, in bytes
on page 215.
on page 212.
Managing firewall protection
About firewall rules
on page 216.
215

Advertisement

Table of Contents
loading

This manual is also suitable for:

Endpoint protection small business edition

Table of Contents