McAfee MTP08EMB3RUA Product Guide - Page 100

Configuring IP addresses, Block, Add Policy, Firewall Protection, General Settings, Custom settings

Page 100 highlights

5 Using Firewall Protection Configuring custom connections To do this... Modify an existing service Perform these steps... 1 For a service listed in the table, click edit. 2 In the Add or Edit Incoming Connection panel, modify the name for the service and/or the ports through which the service will communicate with computers using this policy, then click OK. Block an existing service and close its ports 1 For a service listed in the table, click Block. 2 Click OK. The service is removed from the list, and computers using this policy will not accept communications through the ports assigned to the blocked service. 5 Click Save. (For a new policy, click Next, select additional options for the policy, then click Save.) Configuring IP addresses Use this SecurityCenter task to add or remove a range of IP addresses in a custom connection. Client computers using this policy will accept communications originating only from the IP addresses you add. Specify IP addresses and system service ports through which to communicate by using separate tasks. Task For option definitions, click ? in the interface. 1 On the Policies page, click Add Policy (or click Edit to modify an existing policy). 2 Select Firewall Protection, then click the General Settings tab. 3 Under Connection Type, select Custom settings, then click edit. 4 On the Firewall Custom Settings panel, under Allowed Incoming Addresses, configure a range of IP addresses for computers using this policy by using one of these methods. To do this... Perform these steps... Accept communications from 1 Select Any computer. any IP address 2 Click OK. Accept communications from IP addresses on the subnet where the computers are located 1 Select My network (the subnet only). 2 Click OK. 100 McAfee Total Protection Service 5.1.5 Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175

To do this...
Perform these steps...
Modify an existing
service
1
For a service listed in the table, click
edit
.
2
In the Add or Edit Incoming Connection panel, modify the name for the
service and/or the ports through which the service will communicate with
computers using this policy, then click
OK
.
Block an existing
service and close
its ports
1
For a service listed in the table, click
Block
.
2
Click
OK
.
The service is removed from the list, and computers using this policy will not
accept communications through the ports assigned to the blocked service.
5
Click
Save
.
(For a new policy, click
Next
, select additional options for the policy, then click
Save
.)
Configuring IP addresses
Use this SecurityCenter task to add or remove a range of IP addresses in a custom connection.
Client computers using this policy will accept communications originating only from the IP addresses
you add.
Specify IP addresses and system service ports through which to
communicate by using separate tasks.
Task
For option definitions, click
?
in the interface.
1
On the Policies page, click
Add Policy
(or click
Edit
to modify an existing policy).
2
Select
Firewall Protection
, then click the
General Settings
tab.
3
Under Connection Type, select
Custom settings
, then click
edit
.
4
On the Firewall Custom Settings panel, under Allowed Incoming Addresses, configure a range of IP
addresses for computers using this policy by using one of these methods.
To do this...
Perform these steps...
Accept communications from
any IP address
1
Select
Any computer
.
2
Click
OK
.
Accept communications from
IP addresses on the subnet
where the computers are
located
1
Select
My network (the subnet only)
.
2
Click
OK
.
5
Using Firewall Protection
Configuring custom connections
100
McAfee Total Protection Service 5.1.5 Product Guide