How to block specific Web sites using the Symantec Endpoint Protection (SEP) client Network Threat Protection (NTP) component.
The SEP client firewall cannot function as a proxy, however, it can be used to block traffic to/from specific DNS names if properly configured.
It is highly recommended to use another method such as proxy server and/or DNS security service to provide Web filtering. Using the SEP client firewall to block Web sites has the following limitations:
To create a DNS name based firewall rule:
The SEP Firewall engine is an NDIS driver, which means it only sees IP addresses, not domain names. However, SEP Firewall has two key enhancements to associate IP addresses with domain names:
Enhancement 1: DNS Traffic Monitoring
SEP FW monitors DNS traffic in real-time. For example, if OS send a DNS query to www.domain.com and receives the IP 1.2.3.4, SEP records this association. It then knows that traffic to 1.2.3.4 corresponds to www.domain.com and can block it accordingly.
Once the TTL expires, the OS will send a DNS query again, and SEP will update its records accordingly.
Enhancement 2: Reverse DNS (RDNS) Support
If this option is enabled, when SEP FW receives a packet from an unknown IP (e.g., 1.2.3.4), it will hold the packet and send a reverse DNS query to the DNS server. It will then allow or block the traffic depending on the domain name returned in the response.
Once the TTL expires, SEP will remove the cached entry from its records. Then, when SEP receives a packet from an unknown domain, it will send a new rDNS query.
You can configure a firewall rule to block or allow traffic based on the process name, along with other conditions.