McAfee MTP08EMB3RUA Product Guide - Page 90

Connection type and detections of incoming communications, Select, Custom

Page 90 highlights

5 Using Firewall Protection Connection type and detections of incoming communications Connection type and detections of incoming communications Firewall protection monitors communications coming into the network (known as inbound events) to determine whether they meet criteria specified for safe communications. If an event does not meet the criteria, it is blocked from reaching computers on the network. Specify criteria by selecting the type of connection client computers are using. A policy option setting determines whether the administrator or the user selects the connection type. Types of connections The connection type defines the environment where client computers are used, It determines what firewall protection considers to be suspicious activity and, therefore, which IP addresses and ports are allowed to communicate with the network computers. Select from three connection environments. Select this... Untrusted network Trusted network When the computer... Then firewall protection... Is connected directly to the Internet. Blocks communications with all other For example: through a dial-up connection, a DSL line, or a cable modem; through any computers, including those on the same subnet. type of connection in a coffee shop, hotel, or This is the default setting. airport. Is connected indirectly to a network that is separated from the Internet by a hardware router or firewall. For example: in a home or office network. Allows communications with other computers on the same subnet, but blocks all other network communications. Custom Should communicate only through specific ports or with a specific range of IP addresses, or the computer is a server providing system services. Allows communications with the ports and IP addresses you specify, blocks all other communications. When you select this option, an Edit button becomes available that enables you to configure options. Additional information about connection types It is important to update the connection type whenever the working environment changes. For example, mobile users who connect to both secured (trusted) and unsecured (untrusted) networks must be able to change their setting accordingly. A policy option specifies whether firewall protection tracks blocked events for reporting purposes. When the option is enabled, you can see a listing of all blocked events in the report entitled Inbound Events Blocked by Firewall. The connection type does not affect the way that firewall protection handles detections of Internet applications running on client computers. 90 McAfee Total Protection Service 5.1.5 Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175

Connection type and detections of incoming communications
Firewall protection monitors communications coming into the network (known as
inbound events
) to
determine whether they meet criteria specified for safe communications. If an event does not meet
the criteria, it is blocked from reaching computers on the network.
Specify criteria by selecting the type of connection client computers are using. A policy option setting
determines whether the administrator or the user selects the connection type.
Types of connections
The connection type defines the environment where client computers are used, It determines what
firewall protection considers to be suspicious activity and, therefore, which IP addresses and ports are
allowed to communicate with the network computers.
Select from three connection environments.
Select
this...
When the computer...
Then firewall protection...
Untrusted
network
Is connected directly to the Internet.
For example: through a dial-up connection, a
DSL line, or a cable modem; through any
type of connection in a coffee shop, hotel, or
airport.
Blocks communications with all other
computers, including those on the same
subnet.
This is the default setting.
Trusted
network
Is connected indirectly to a network that is
separated from the Internet by a hardware
router or firewall.
For example: in a home or office network.
Allows communications with other
computers on the same subnet, but
blocks all other network communications.
Custom
Should communicate only through specific
ports or with a specific range of IP
addresses, or the computer is a server
providing system services.
Allows communications with the ports and
IP addresses you specify, blocks all other
communications.
When you select this option, an
Edit
button becomes available that enables
you to configure options.
Additional information about connection types
It is important to update the connection type whenever the working environment changes. For
example, mobile users who connect to both secured (trusted) and unsecured (untrusted) networks
must be able to change their setting accordingly.
A policy option specifies whether firewall protection tracks blocked events for reporting purposes.
When the option is enabled, you can see a listing of all blocked events in the report entitled Inbound
Events Blocked by Firewall.
The connection type does not affect the way that firewall protection handles detections of Internet
applications running on client computers.
5
Using Firewall Protection
Connection type and detections of incoming communications
90
McAfee Total Protection Service 5.1.5 Product Guide