F-SECURE CLIENT SECURITY 8.00 Administrator's Manual page 238

Hide thumbs Also See for CLIENT SECURITY 8.00:
Table of Contents

Advertisement

238
1
2
07/15/03
16:48:00
1
2
3
07/15/03
16:47:59
info
07/15/32
16:48:23
info
Receiving connection
If the application has opened a LISTEN connection it is acting as an
server and remote computers can connect to the port which the
connection was opened for. Action log records these also these
connections.
3
4
5
info
appl control
unknown
The fields are:
1. Date
2. Time
3. Type
4. Internal Reason
Dynamic rule entry
If an application opens a listening connection and the user allows it,
then the static firewall rules might prevent that connection. Therefore
a dynamic rule is used to allow this connection inbound, just for the
time of connection, for this applications use only.
4
5
6
dynamic rule
added
0.0.0.0
dynamic rule
removed
0.0.0.0
The fields are:
1. Date
5. Action taken
2. Time
6. Remote IP range IP
3. Alert type
7. Remote IP range
4. Rule type
8. Remote port range from
6
7
8
allow
receive
17
5. Name of application
6. Application control action
7. Network action
7
8
9
255.255.255.0
0
65535
255.255.255.0
0
65535
netmask
9
10
10.128.129.146
138
8. Protocol
9. Remote ip
10. Remote port
10
11
12
371
371
allow
371
371
allow
9. Remote port range to
10. Local port from
11. Local port to
12. Rule action (allow/
deny)

Advertisement

Table of Contents
loading

This manual is also suitable for:

Client security

Table of Contents