McAfee MIS09EMB3RAA User Guide - Page 93

Add this IP as Trusted

Page 93 highlights

Chapter 18 McAfee Internet Security 91 ƒ Select Range, and then enter the starting and ending IP addresses in the From IP Address and To IP Address boxes. If your computer connection is on an IPv6 network, enter the starting IP address and the prefix length in the From IP Address and Prefix Length boxes. 7 Under Type, do one of the following: ƒ Select Trusted to specify that this computer connection is trusted (for example, a computer in a home network). ƒ Select Standard to specify that this computer connection (and not the other computers in its network) is trusted (for example, a computer in a corporate network). ƒ Select Public to specify that this computer connection is public (for example, a computer in an Internet café, hotel, or airport). 8 If a system service uses Internet Connection Sharing (ICS), you can add the following IP address range: 192.168.0.1 to 192.168.0.255. 9 Optionally, select Rule expires in, and enter the number of days to enforce the rule. 10 Optionally, type a description for the rule. 11 Click OK. Note: For more information about Internet Connection Sharing (ICS), see Configure a new system service. Add a computer from the Inbound Events log You can add a trusted or standard computer connection and its associated IP address from the Inbound Events log. 1 On the McAfee SecurityCenter pane, on the Common Tasks pane, click Advanced Menu. 2 Click Reports & Logs. 3 Under Recent Events, click View Log. 4 Click Internet & Network, and then click Inbound Events. 5 Select a source IP address, and under I want to, do one of the following: ƒ Click Add this IP as Trusted to add this computer as Trusted in your Networks list. ƒ Click Add this IP as Standard to add this computer connection as Standard in your Networks list. 6 Click Yes to confirm.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274

Chapter 18
McAfee Internet Security
91
Select
Range
, and then enter the starting and ending IP
addresses in the
From IP Address
and
To IP Address
boxes. If your computer connection is on an IPv6 network,
enter the starting IP address and the prefix length in the
From IP Address
and
Prefix Length
boxes.
7
Under
Type
, do one of the following:
Select
Trusted
to specify that this computer connection is
trusted (for example, a computer in a home network).
Select
Standard
to specify that this computer connection
(and not the other computers in its network) is trusted (for
example, a computer in a corporate network).
Select
Public
to specify that this computer connection is
public (for example, a computer in an Internet café, hotel,
or airport).
8
If a system service uses Internet Connection Sharing (ICS),
you can add the following IP address range: 192.168.0.1 to
192.168.0.255.
9
Optionally, select
Rule expires in
, and enter the number of
days to enforce the rule.
10
Optionally, type a description for the rule.
11
Click
OK
.
Note:
For more information about Internet Connection Sharing
(ICS), see Configure a new system service.
Add a computer from the Inbound Events log
You can add a trusted or standard computer connection and its
associated IP address from the Inbound Events log.
1
On the McAfee SecurityCenter pane, on the Common Tasks
pane, click
Advanced Menu
.
2
Click
Reports & Logs
.
3
Under
Recent Events
, click
View Log
.
4
Click
Internet & Network
, and then click
Inbound Events
.
5
Select a source IP address, and under
I want to
, do one of the
following:
Click
Add this IP as Trusted
to add this computer as
Trusted in your
Networks
list.
Click
Add this IP as Standard
to add this computer
connection as Standard in your
Networks
list.
6
Click
Yes
to confirm.