Protocol filtering

Antivirus protection for application protocols is provided by the ThreatSense scanning engine, which seamlessly integrates all advanced malware scanning techniques. Protocol filtering works automatically, regardless of the Internet browser or email client used. To edit encrypted (SSL/TLS) settings, go to Advanced Setup (F5) > Web and email > SSL/TLS.

Enable application protocol content filtering – Can be used to disable protocol filtering. Note that many ESET NOD32 Antivirus components (Web access protection, Email protocols protection, Anti-Phishing, Parental control) depend on this and will be non-functional without it.

Excluded applications – Enabes you to exclude specific applications from protocol filtering. Useful when protocol filtering causes compatibility issues.

Excluded IP addresses – Enables you to exclude specific remote addresses from protocol filtering. Useful when protocol filtering causes compatibility issues.

Adds (for example, 2001:718:1c01:16:214:22ff:fec9:ca5).

Subnet – Subnet (a group of computers) is defined by an IP address and mask (for example, 2002:c0a8:6301:1::1/64).


example

Example of excluded IP addresses

IPv4 addresses and mask:

192.168.0.10 – IP address of an individual computer for which the rule is to be applied.

192.168.0.1 to 192.168.0.99 – the starting and ending address IP address to specify the IP range (of several computers) for which the rule is to be applied.

Subnet (a group of computers) defined by an IP address and mask. For example, 255.255.255.0 is the network mask for the 192.168.1.0/24 prefix, which means 192.168.1.1 to 192.168.1.254 address range.

IPv6 address and mask:

2001:718:1c01:16:214:22ff:fec9:ca5 – the IPv6 address of an individual computer for which the rule is to be applied

2002:c0a8:6301:1::1/64 – IPv6 address with the prefix length of 64 bits, that means 2002:c0a8:6301:0001:0000:0000:0000:0000 to 2002:c0a8:6301:0001:ffff:ffff:ffff:ffff