Hello,
long time eset enpoint user and first time forum poster here.
In the RAC policy editor, we have added all our company networks as zones (and checked the mark to add them to the trusted zone).
The main goal for this is to make sure the client does not have to add their company network to the trusted zone each time (via the allow sharing dialog).
This works perfectly so far.
The second goal is to allow some services to work between our networks without hassle. (They are all connected with company-wide vpn)
More specifically, I would like to be able to ping to my clients on other sites.
This does not work unless I temporary disable the eset firewall.
In the firewall rules, the standard rule "Allow icmp communication in the trusted zone" is present.
So, this should work right, considering that all my company networks are added to the zones, and they in their turn are checked to be in the trusted zone?
To get around this problem, I tried to add a new rule to allow icmp traffic in the zones I created myself, but I am only able to select "Trusted zone","Addresses excluded from IDS", "Addresses notified about unavailability of TCP/UDP ports", "Addresses excluded from protocol filtering", "DNS servers" and "Local Addresses" as zone selection at the remote side.
Any help to as what I am doing wrong?