{"id":2661,"date":"2024-03-27T13:41:14","date_gmt":"2024-03-27T12:41:14","guid":{"rendered":"https:\/\/kb.apptec360.com\/manual\/?post_type=knowledgebase&#038;p=2661"},"modified":"2024-05-03T15:08:19","modified_gmt":"2024-05-03T13:08:19","slug":"firewall-configuration","status":"publish","type":"knowledgebase","link":"https:\/\/kb.apptec360.com\/manual\/knowledgebase\/configuration-windows-10-pc\/general\/security-management\/security-configuration\/firewall-configuration\/","title":{"rendered":"Firewall Configuration"},"content":{"rendered":"\n<table id=\"tablepress-293\" class=\"tablepress tablepress-id-293\">\n<caption style=\"caption-side:bottom;text-align:left;border:none;background:none;margin:0;padding:0;\"><a href=\"https:\/\/kb.apptec360.com\/manual\/wp-admin\/admin.php?page=tablepress&amp;action=edit&amp;table_id=293\" rel=\"nofollow\">Edit<\/a><\/caption>\n<tbody class=\"row-hover\">\n<tr class=\"row-1 odd\">\n\t<td colspan=\"2\" class=\"column-1\" style=\"text-align: center;\"><br>\n        <p><strong>Firewall configuration &#8211; Global settings<\/strong><\/p><br>\n      <\/td>\n<\/tr>\n<tr class=\"row-2 even\">\n\t<td class=\"column-1\"><br>\n        <p>Ignore authentication set<\/p><br>\n      <\/td><td class=\"column-2\"><br>\n        <p>Ignore the entire authentication set if they do not support all of the authentication suites specified in the set<\/p><br>\n      <\/td>\n<\/tr>\n<tr class=\"row-3 odd\">\n\t<td class=\"column-1\"><br>\n        <p>Type of packet queueing<\/p><br>\n      <\/td><td class=\"column-2\"><br>\n        <p>Specifies how scaling for the software on the receive side is enabled for both the encrypted receive and clear the forward path for the IPsec tunnel gateway scenario.<\/p><br>\n      <\/td>\n<\/tr>\n<tr class=\"row-4 even\">\n\t<td class=\"column-1\"><br>\n        <p>Disable perform stateful FTP filtering<\/p><br>\n      <\/td><td class=\"column-2\"><br>\n        <p>If it is disabled, it won&#8217;t performs stateful File Transfer Protocol (FTP) filtering to allow secondary connections<\/p><br>\n      <\/td>\n<\/tr>\n<tr class=\"row-5 odd\">\n\t<td class=\"column-1\"><br>\n        <p>Security association idle time<\/p><br>\n      <\/td><td class=\"column-2\"><br>\n        <p>This field configures the security association idle time, in seconds. Security associations are deleted after network traffic is not seen for this specified period of time.<\/p><br>\n      <\/td>\n<\/tr>\n<tr class=\"row-6 even\">\n\t<td class=\"column-1\"><br>\n        <p>Preshared key encoding<\/p><br>\n      <\/td><td class=\"column-2\"><br>\n        <p>Set the preshared key encoding<\/p><br>\n      <\/td>\n<\/tr>\n<tr class=\"row-7 odd\">\n\t<td class=\"column-1\"><br>\n        <p>IPSec Exceptions<\/p><br>\n      <\/td><td class=\"column-2\"><br>\n        <p>Configure Internet Protocol exceptions<\/p><br>\n      <\/td>\n<\/tr>\n<tr class=\"row-8 even\">\n\t<td colspan=\"2\" class=\"column-1\"><br>\n        <p>Certificate revocation list check<\/p><br>\n      <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\n\n<div class=\"pagebreak-after\"><\/div>\n\n\n\n<table id=\"tablepress-294\" class=\"tablepress tablepress-id-294\">\n<caption style=\"caption-side:bottom;text-align:left;border:none;background:none;margin:0;padding:0;\"><a href=\"https:\/\/kb.apptec360.com\/manual\/wp-admin\/admin.php?page=tablepress&amp;action=edit&amp;table_id=294\" rel=\"nofollow\">Edit<\/a><\/caption>\n<tbody class=\"row-hover\">\n<tr class=\"row-1 odd\">\n\t<td colspan=\"2\" class=\"column-1\" style=\"text-align: center;\"><br>\n        <p><strong>Firewall Profiles (Domain Profile \/ Private Profile \/ Public Profile)<\/strong><\/p><br>\n      <\/td>\n<\/tr>\n<tr class=\"row-2 even\">\n\t<td colspan=\"2\" class=\"column-1\"><br>\n        <p>Enable Firewall for this profile<\/p><br>\n      <\/td>\n<\/tr>\n<tr class=\"row-3 odd\">\n\t<td class=\"column-1\"><br>\n        <p>Disable notifications<\/p><br>\n      <\/td><td class=\"column-2\"><br>\n        <p>Disable displaying notification to the user when an application is blocked from listening on a port.<\/p><br>\n      <\/td>\n<\/tr>\n<tr class=\"row-4 even\">\n\t<td colspan=\"2\" class=\"column-1\"><br>\n        <p>Block unicast responses to multicast broadcasts<\/p><br>\n      <\/td>\n<\/tr>\n<tr class=\"row-5 odd\">\n\t<td class=\"column-1\"><br>\n        <p>Enforce authorized application firewall rules<\/p><br>\n      <\/td><td class=\"column-2\"><br>\n        <p>If it is not enforced, authorized application firewall rules in the local store are ignored and not enforced<\/p><br>\n      <\/td>\n<\/tr>\n<tr class=\"row-6 even\">\n\t<td class=\"column-1\"><br>\n        <p>Enforce global port firewall rules<\/p><br>\n      <\/td><td class=\"column-2\"><br>\n        <p>If it is not enforced, global port firewall rules in the local store are ignored and not enforced. The setting only has meaning if it is set or enumerated in the Group Policy store or if it is enumerated from the GroupPolicyRSoPStore<\/p><br>\n      <\/td>\n<\/tr>\n<tr class=\"row-7 odd\">\n\t<td class=\"column-1\"><br>\n        <p>Enforce firewall rules<\/p><br>\n      <\/td><td class=\"column-2\"><br>\n        <p>If it is not enforced, firewall rules from the local store are ignored and not enforced<\/p><br>\n      <\/td>\n<\/tr>\n<tr class=\"row-8 even\">\n\t<td class=\"column-1\"><br>\n        <p>Enforce connection security rules<\/p><br>\n      <\/td><td class=\"column-2\"><br>\n        <p>It it is not enforced, connection security rules from the local store are ignored and not enforced<\/p><br>\n      <\/td>\n<\/tr>\n<tr class=\"row-9 odd\">\n\t<td class=\"column-1\"><br>\n        <p>Default outbound action<\/p><br>\n      <\/td><td class=\"column-2\"><br>\n        <p>The action that the firewall does by default on outbound connections<\/p><br>\n      <\/td>\n<\/tr>\n<tr class=\"row-10 even\">\n\t<td class=\"column-1\"><br>\n        <p>Default inbound action<\/p><br>\n      <\/td><td class=\"column-2\"><br>\n        <p>The action that the firewall does by default on inbound connections<\/p><br>\n      <\/td>\n<\/tr>\n<tr class=\"row-11 odd\">\n\t<td class=\"column-1\"><br>\n        <p>Disable Stealth mode<\/p><br>\n      <\/td><td class=\"column-2\"><br>\n        <p>Stealth mode is a mechanism in Windows Firewall that helps prevent malicious users from discovering information about network computers and the services that they run.<\/p><br>\n      <\/td>\n<\/tr>\n<tr class=\"row-12 even\">\n\t<td class=\"column-1\"><br>\n        <p>Disable preventing from responding to unsolicited traffic<\/p><br>\n      <\/td><td class=\"column-2\"><br>\n        <p>If disabled, the firewall&#8217;s stealth mode rules must not prevent the host computer from responding to unsolicited network traffic if that traffic is secured by IPsec<\/p><br>\n      <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\n\n<div class=\"pagebreak-after\"><\/div>\n","protected":false},"parent":2621,"menu_order":0,"template":"","class_list":["post-2661","knowledgebase","type-knowledgebase","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/kb.apptec360.com\/manual\/wp-json\/wp\/v2\/knowledgebase\/2661","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kb.apptec360.com\/manual\/wp-json\/wp\/v2\/knowledgebase"}],"about":[{"href":"https:\/\/kb.apptec360.com\/manual\/wp-json\/wp\/v2\/types\/knowledgebase"}],"version-history":[{"count":6,"href":"https:\/\/kb.apptec360.com\/manual\/wp-json\/wp\/v2\/knowledgebase\/2661\/revisions"}],"predecessor-version":[{"id":6924,"href":"https:\/\/kb.apptec360.com\/manual\/wp-json\/wp\/v2\/knowledgebase\/2661\/revisions\/6924"}],"up":[{"embeddable":true,"href":"https:\/\/kb.apptec360.com\/manual\/wp-json\/wp\/v2\/knowledgebase\/2621"}],"wp:attachment":[{"href":"https:\/\/kb.apptec360.com\/manual\/wp-json\/wp\/v2\/media?parent=2661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}