McAfee MTP10EMB3RAA Processor Guide - Page 86

The role of IP addresses, The role of system service ports

Page 86 highlights

Using Firewall Protection The role of IP addresses Use learn mode to discover Internet applications Report mode can be used as a "learn mode" to help you determine which applications to allow. In Report mode, firewall protection tracks but does not block unrecognized Internet applications. You can review detected applications in the Unrecognized Programs report and approve those that are appropriate for your policy. When you no longer see applications you want to allow in the report, change the policy setting to Prompt or Protect mode. The role of IP addresses An IP address is used to identify any device that originates or receives a request or a message over networks and the Internet (which comprises a very large group of networks). Each IP address uses a unique set of hexadecimal characters to identify a network, a subnetwork (if applicable), and a device within the network. An IP address enables: • T he request or message to be delivered to the correct destination. • T he receiving device to know where the request or message originated and where to send a response if one is required. Total Protection Service allows you to configure a custom connection to accept only communications that originate from designated IP addresses. You can specify IP addresses that conform to either of these standards: • IPv4 (Internet Protocol Version 4) - The most common Internet addressing scheme. Supports 32-bit IP addresses consisting of four groups of four numbers between 0 and 255. • IPv6 (Internet Protocol Version 6) - Supports 128-bit IP addresses consisting of eight groups of four hexadecimal characters. The role of system service ports System services communicate through ports, which are logical network connections. Common Windows system services are typically associated with particular service ports, and your computer's operating system or other system applications might attempt to open them. Because these ports represent a potential source of intrusions into a client computer, you must open them before the computer can communicate through them. Certain applications, including web servers and file-sharing server programs, must accept unsolicited connections from other computers through designated system service ports. When configuring a custom connection, you can: • A llow applications to act as servers on the local network or the Internet. • A dd or edit a port for a system service. • D isable or remove a port for a system service. NOTE: Select a port for system services only if you are certain it must be open. You will rarely need to open a port. We recommend that you disable unused system services. 86 McAfee Total Protection Service Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134

86
McAfee Total Protection Service Product Guide
Use learn mode to discover Internet applications
Report mode can be used as a “learn mode” to help you determine which applications to
allow. In Report mode, firewall protection tracks but does not block unrecognized Internet
applications. You can review detected applications in the Unrecognized Programs report and
approve those that are appropriate for your policy. When you no longer see applications you
want to allow in the report, change the policy setting to Prompt or Protect mode.
The role of IP addresses
An IP address is used to identify any device that originates or receives a request or a message
over networks and the Internet (which comprises a very large group of networks). Each IP
address uses a unique set of hexadecimal characters to identify a network, a subnetwork (if
applicable), and a device within the network.
An IP address enables:
The request or message to be delivered to the correct destination.
The receiving device to know where the request or message originated and where to send
a response if one is required.
Total Protection Service allows you to configure a custom connection to accept only
communications that originate from designated IP addresses. You can specify IP addresses
that conform to either of these standards:
IPv4 (Internet Protocol Version 4) — The most common Internet addressing scheme.
Supports 32-bit IP addresses consisting of four groups of four numbers between 0 and 255.
IPv6 (Internet Protocol Version 6) — Supports 128-bit IP addresses consisting of eight
groups of four hexadecimal characters.
The role of system service ports
System services communicate through ports, which are logical network connections. Common
Windows system services are typically associated with particular service ports, and your
computer’s operating system or other system applications might attempt to open them.
Because these ports represent a potential source of intrusions into a client computer, you must
open them before the computer can communicate through them.
Certain applications, including web servers and file-sharing server programs, must accept
unsolicited connections from other computers through designated system service ports. When
configuring a custom connection, you can:
Allow applications to act as servers on the local network or the Internet.
Add or edit a port for a system service.
Disable or remove a port for a system service.
NOTE:
Select a port for system services only if you are certain it must be open. You will rarely
need to open a port. We recommend that you disable unused system services.
Using Firewall Protection
The role of IP addresses