You can specify an address or a host name for the following computers:
- A computer that triggers a firewall rule
- A computer that the client excludes from checks by the firewalls.
- A computer that the authenticator client device excludes from the peer-to-peer authentication process. The authenticator normally blocks traffic from a remote client that tries to connect to the authenticator. The authenticator does not block computers in this list. For peer-to-peer authentication, you can only specify the IP address, IP range, and subnet.
If the client communicates with a web server and the traffic is inbound, then the source host is the web server; the destination host is the client. If the traffic is outbound, the source host is the client and the destination host is the Web server.
If the client communicates with a web server, the remote host is the web server; the local host is the client. The local host is the same, for both inbound traffic and outbound traffic.
The address type of the host for which connections are allowed or blocked.
You choose one of the following options to define a host: