About firewall rule network adapter triggers
|Article:HOWTO80717|||||Created: 2012-10-24|||||Updated: 2013-10-07|||||Article URL http://www.symantec.com/docs/HOWTO80717|
You can define a firewall rule that blocks or allows traffic that passes through (transmitted or received) a network adapter.
When you define a particular type of adapter, consider how that adapter is used. For example, if a rule allows outbound HTTP traffic from Ethernet adapters, then HTTP is allowed through all the installed adapters of the same type. The only exception is if you also specify local host addresses. The client computer may use multi-NIC servers and the workstations that bridge two or more network segments. To control traffic relative to a particular adapter, the address scheme of each segment must be used rather than the adapter itself.
The network adapter list eliminates the need to retype types of adapters for firewall rules. Instead, when you create a firewall rule, you can select a network adapter from a default list of commonly used network adapters. You can also add network adapters to the default list.
You can select a network adapter from a default list that is shared across firewall policies and rules. The most common adapters are included in the default list in thelist. The common adapters include VPNs, Ethernet, wireless, Cisco, Nortel, and Enterasys adapters.
You can add a custom network adapter through a firewall rule. However, that network adapter is not added to the default list. You cannot access the custom network adapter from any other rule.
Article URL http://www.symantec.com/docs/HOWTO80717