Advanced firewall configuration / Configuring the firewall |
For more information, see Managing roles and sub-estates.
Some applications can access a network through rawsockets, which gives them control over all aspects of the data they send over the network.
Malicious applications can exploit rawsockets by faking their IP address or send deliberately corrupt messages.
To allow applications to access the network through rawsockets, follow these steps.