McAfee TSA00M005PAA Processor Guide - Page 83

Connection type and detections of incoming, communications

Page 83 highlights

Using Firewall Protection Connection type and detections of incoming communications Connection type and detections of incoming communications Firewall protection monitors communications coming into the network (known as inbound events) to determine whether they meet criteria specified for safe communications. If an event does not meet the criteria, it is blocked from reaching computers on the network. Specify criteria by selecting the type of connection client computers are using. A policy option setting determines whether the administrator or the user selects the connection type. Types of connections The connection type defines the environment where client computers are used, It determines what firewall protection considers to be suspicious activity and, therefore, which IP addresses and ports are allowed to communicate with the network computers. Select from three connection environments. Select this... When the computer... Then firewall protection... Untrusted network Is connected directly to the Internet. For example: through a dial-up connection, a DSL line, or a cable modem; through any type of connection in a coffee shop, hotel, or airport. Blocks communications with all other computers, including those on the same subnet. This is the default setting. Trusted network Is connected indirectly to a network that is separated from the Internet by a hardware router or firewall. For example: in a home or office network. Allows communications with other computers on the same subnet, but blocks all other network communications. Custom Should communicate only through specific Allows communications with the ports and IP ports or with a specific range of IP addresses, addresses you specify, blocks all other or the computer is a server providing system communications. services. When you select this option, an Edit button becomes available that enables you to configure options. Additional information about connection types It is important to update the connection type whenever the working environment changes. For example, mobile users who connect to both secured (trusted) and unsecured (untrusted) networks must be able to change their setting accordingly. A policy option specifies whether firewall protection tracks blocked events for reporting purposes. When the option is enabled, you can see a listing of all blocked events in the report entitled Inbound Events Blocked by Firewall. The connection type does not affect the way that firewall protection handles detections of Internet applications running on client computers. Custom connections Trusted and untrusted connection types let you specify whether to allow or block communications originating within a network. Configure a custom connection type when you want to be more specific about where communications originate. When you set up a custom connection, you can designate: McAfee Total Protection Service Product Guide 83

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134

McAfee Total Protection Service Product Guide
83
Connection type and detections of incoming
communications
Firewall protection monitors communications coming into the network (known as inbound
events) to determine whether they meet criteria specified for safe communications. If an event
does not meet the criteria, it is blocked from reaching computers on the network.
Specify criteria by selecting the type of connection client computers are using. A policy option
setting determines whether the administrator or the user selects the connection type.
Types of connections
The connection type defines the environment where client computers are used, It determines
what firewall protection considers to be suspicious activity and, therefore, which IP addresses
and ports are allowed to communicate with the network computers.
Select from three connection environments.
Additional information about connection types
It is important to update the connection type whenever the working environment changes.
For example, mobile users who connect to both secured (trusted) and unsecured (untrusted)
networks must be able to change their setting accordingly.
A policy option specifies whether firewall protection tracks blocked events for reporting
purposes. When the option is enabled, you can see a listing of all blocked events in the report
entitled Inbound Events Blocked by Firewall.
The connection type does not affect the way that firewall protection handles detections of
Internet applications running on client computers.
Custom connections
Trusted and untrusted connection types let you specify whether to allow or block
communications originating within a network. Configure a custom connection type when you
want to be more specific about where communications originate. When you set up a custom
connection, you can designate:
Then firewall protection...
When the computer...
Select this...
Blocks communications with all other
computers, including those on the same
subnet.
This is the default setting.
Is connected directly to the Internet.
For example: through a dial-up connection,
a DSL line, or a cable modem; through any
type of connection in a coffee shop, hotel,
or airport.
Untrusted network
Allows communications with other computers
on the same subnet, but blocks all other
network communications.
Is connected indirectly to a network that is
separated from the Internet by a hardware
router or firewall.
For example: in a home or office network.
Trusted network
Allows communications with the ports and IP
addresses you specify, blocks all other
communications.
When you select this option, an
Edit
button
becomes available that enables you to
configure options.
Should communicate only through specific
ports or with a specific range of IP addresses,
or the computer is a server providing system
services.
Custom
Using Firewall Protection
Connection type and detections of incoming communications