McAfee MIS08EMB3RUA User Guide - Page 100

Trusting computer connections

Page 100 highlights

98 McAfee Internet Security Trusting computer connections You can add, edit, and remove trusted IP addresses on the Trusted and Banned IPs pane, under Trusted IP Addresses. The Trusted IP Addresses list on the Trusted and Banned IPs pane allows all traffic from a specific computer to reach your computer. Firewall does not log traffic or generate event alerts from IP addresses that appear in the Trusted IP Addresses list. Firewall trusts any checked IP addresses on the list, and always allows traffic from a trusted IP through the firewall on any port. Activity between the computer associated with a trusted IP address and your computer is not filtered or analyzed by Firewall. By default, Trusted IP Addresses lists the first private network that Firewall finds. When allowing a connection, ensure that the computer that you trust is safe. If a computer that you trust is infected through a worm or other mechanism, your computer can be vulnerable to infection. In addition, McAfee recommends that the computer(s) you trust are protected by a firewall and an up-to-date antivirus program also. Add a trusted computer connection You can add a trusted computer connection and its associated IP address. 1 On the McAfee SecurityCenter pane, click Internet & Network, then click Configure. 2 On the Internet & Network Configuration pane, under Firewall protection is enabled, click Advanced. 3 On the Firewall pane, click Trusted and Banned IPs. 4 On the Trusted and Banned IPs pane, select Trusted IP Addresses, and then click Add. 5 Under Add Trusted IP Address Rule, do one of the following: ƒ Select Single IP Address, and then enter the IP address. ƒ Select IP Address Range, and then enter the starting and ending IP addresses in the From IP Address and To IP Address boxes.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267

98
McAfee Internet Security
Trusting computer connections
You can add, edit, and remove trusted IP addresses on the
Trusted and Banned IPs pane, under
Trusted IP Addresses
.
The
Trusted IP Addresses
list on the Trusted and Banned IPs
pane allows all traffic from a specific computer to reach your
computer. Firewall does not log traffic or generate event alerts
from IP addresses that appear in the
Trusted IP Addresses
list.
Firewall trusts any checked IP addresses on the list, and always
allows traffic from a trusted IP through the firewall on any port.
Activity between the computer associated with a trusted IP
address and your computer is not filtered or analyzed by Firewall.
By default, Trusted IP Addresses lists the first private network that
Firewall finds.
When allowing a connection, ensure that the computer that you
trust is safe. If a computer that you trust is infected through a
worm or other mechanism, your computer can be vulnerable to
infection. In addition, McAfee recommends that the computer(s)
you trust are protected by a firewall and an up-to-date antivirus
program also.
Add a trusted computer connection
You can add a trusted computer connection and its associated IP
address.
1
On the McAfee SecurityCenter pane, click
Internet &
Network
, then click
Configure
.
2
On the Internet & Network Configuration pane, under
Firewall protection is enabled
, click
Advanced
.
3
On the Firewall pane, click
Trusted and Banned IPs
.
4
On the Trusted and Banned IPs pane, select
Trusted IP
Addresses
, and then click
Add
.
5
Under
Add Trusted IP Address Rule
, do one of the
following:
Select
Single IP Address
, and then enter the IP address.
Select
IP Address Range
, and then enter the starting and
ending IP addresses in the
From IP Address
and
To IP
Address
boxes.