Chapter 17 Advanced security features
220
Note:
1. If a user who is allowed to use P2P networks (see chapter 15.1) is connected to the fire-
wall from a certain host, no P2P restrictions are applied to this host. Settings in the P2P
Eliminator tab are always applied to unauthorized users.
2. Information about P2P detection and blocked traffic can be viewed in the Status Hosts /
users section (for details, refer to chapter 19.1).
3. Ifyou wish to notify also another person when a P2P network is detected (e.g. theWinRoute
administrator), define the alert on the Alerts Settings tab of the Configuration Account-
ing section. For details, see chapter 19.4.
Parameters for detection of P2P networks
Click Advanced to set parameters for P2P detection.
Figure17.3 Settingsof P2P networks detection
Ports of P2P networks
Listof ports which are exclusively used by P2P networks. Theseports are usually ports for
controlconnections — ports (port ranges) for data sharing can be set by users themselves.
Ports in the list can be defined by port numbers or by port ranges. Individual values are
separated by commas while dash is used for definition of ranges.