
To do so, simply run afctl (all afctl options require sudo) with a -d option: The most basic task you can do with the firewall is to disable all of the existing rules. Which is why Apple gives us afctl, a tool that interacts with the adaptive firewall. If you’re troubleshooting and you accidentally tripped up one of these rules then it can be a bit frustrating. For example, if a client attempts too many incorrect logins then a firewall rule restricts that user from attempting to communicate with the server for 15 minutes. The firewall automatically blocks incoming connections that it considers to be dangerous.


MacOS Server 5.2 running on Sierra 10.12) has an adaptive firewall built in, or a firewall that controls incoming access based on clients attempting to abuse the server.
