Symantec 360R Administration Guide - Page 177

Computers tab field descriptions, Special Application tab field descriptions

Page 177 highlights

Field descriptions 177 Firewall field descriptions ■ Services tab field descriptions ■ Special Application tab field descriptions ■ Advanced tab field descriptions Computers tab field descriptions Before configuring outbound or inbound rules, you must identify the nodes on the Computers tab. Table C-18 Computers tab field descriptions Section Host Identity Field Description Host Select a host name (network name) from the list to edit or delete. Host Name Defines the name of the host (a computer on your internal network). Use a short descriptive name. You should use the host name or DNS name in the computer's network properties. Adapter (MAC) Address Physical address of the host's network interface card (NIC), usually an Ethernet or wireless card. Computer Group Displays all the computer groups to which you can bind hosts. Computer groups cluster computers to which you want to apply the same rules. Options include: ■ Everyone ■ Group 1 ■ Group 2 ■ Group 3 ■ Group 4

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

177
Field descriptions
Firewall field descriptions
Services tab field descriptions
Special Application tab field descriptions
Advanced tab field descriptions
Computers tab field descriptions
Before configuring outbound or inbound rules, you must identify the nodes on
the Computers tab.
Table C-18
Computers tab field descriptions
Section
Field
Description
Host Identity
Host
Select a host name (network name) from the list
to edit or delete.
Host Name
Defines the name of the host (a computer on
your internal network). Use a short descriptive
name. You should use the host name or DNS
name in the computer’s network properties.
Adapter (MAC)
Address
Physical address of the host’s network interface
card (NIC), usually an Ethernet or wireless card.
Computer Group
Displays all the computer groups to which you
can bind hosts. Computer groups cluster
computers to which you want to apply the same
rules.
Options include:
Everyone
Group 1
Group 2
Group 3
Group 4