User Manual
Using SmartDefense
Chapter 9: Setting Your Security Policy 253
In each node, you can configure how peer-to-peer connections of the selected type
should be handled, using the table below.
Table 54: Peer to Peer Fields
In this field… Do this…
Action Specify what action to take when a connection is attempted, by selecting
one of the following:
• Block. Block the connection.
• None. No action. This is the default.
Track Specify whether to log peer-to-peer connections, by selecting one of the
following:
• Log. Log the connection.
• None. Do not log the connection. This is the default.
Block proprietary
protocols on all ports
Specify whether proprietary protocols should be blocked on all ports, by
selecting one of the following:
• Block. Block the proprietary protocol on all ports. This in effect
prevents all communication using this peer-to-peer
application. This is the default.
• None. Do not block the proprietary protocol on all ports.