30.01.2015 Views

Administrator's Guide - Kerio Software Archive

Administrator's Guide - Kerio Software Archive

Administrator's Guide - Kerio Software Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Firewall and Intrusion Prevention System<br />

MAC address list<br />

This list includes MAC addresses of computers with either filtered (blocked) or allowed<br />

traffic — depending on the mode.<br />

MAC addresses are defined as six bytes (hexadecimal numbers) separated by colons<br />

(e.g.: a0:de:bf:33:ce:12) or dashes (e.g.: a0-de-bf-33-ce-12) or in a compact format<br />

without separators (a0debf33ce12).<br />

For better reference, each MAC address can be optionally accompanied by a description<br />

of the particular device. It is highly recommended to use these descriptions thoroughly<br />

— the MAC address itself provides no helpful reference information.<br />

Warning:<br />

It is necessary to bear in mind that a wrong setting of the MAC address filter may also<br />

block access to the firewall’s remote administration. If this happens, it is necessary to<br />

connect to the firewall from a computer from which traffic is allowed or locally (the Windows<br />

edition). The <strong>Software</strong> Appliance / VMware Virtual Appliance edition does not allow local<br />

administration. If the remote administration gets completely blocked, the only option is<br />

recovery of default configuration (see chapter 2.11). However, after the recovery, it is<br />

necessary to reconfigure the firewall.<br />

For these reasons it is recommended to change MAC filter settings only with utmost caution<br />

so that you do not block remote administration.<br />

8.3 Special Security Settings<br />

<strong>Kerio</strong> Control provides several additional options for traffic filtering that cannot be defined by<br />

traffic rules. These options can be set in the Miscellaneous tab of the Configuration → Traffic<br />

Policy → Security Settings section.<br />

Figure 8.4<br />

Security options — Anti-Spoofing and cutting down number of connections for one host<br />

118

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!