Check Point UTM-1 Edge User Manual page 435

Internet security appliance
Hide thumbs Also See for UTM-1 Edge:
Table of Contents

Advertisement

In each node, you can configure how peer-to-peer connections of the selected type should
be handled, using the following table.
Table 94: Peer to Peer Fields
In this field...
Action
Track
Block proprietary
protocols on all ports
Chapter 13: Using SmartDefense
Do this...
Specify what action to take when a connection is attempted, by selecting
one of the following:
Block. Block the connection.
None. No action. This is the default.
Specify whether to log peer-to-peer connections, by selecting one of the
following:
Log. Log the connection.
None. Do not log the connection. This is the default.
Specify whether proprietary protocols should be blocked on all ports, by
selecting one of the following:
Block. Block the proprietary protocol on all ports. This in effect
prevents all communication using this peer-to-peer
application. This is the default.
None. Do not block the proprietary protocol on all ports.
SmartDefense Categories
421

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the UTM-1 Edge and is the answer not in the manual?

Table of Contents

Save PDF