Norton Internet Security logo

Add Rule Wizard

May 16, 2010

The Add Rule Wizard leads you through the steps that are necessary to create firewall rules.

To use the Add Rule Wizard
  1. Open the Add Rule Wizard by creating a General rule or a Program rule.
  2. In the first panel of the Add Rule Wizard, select the action that you want for this rule. Your options are:
    Allow Allow communication of this type.

    For example, consider a General rule with the following criteria: all inbound connections from Internet address 192.168.1.1 through port 8080. When you select Allow, Smart Firewall allows all connections satisfying the other criteria of this General rule.

    Block
    Prevent communication of this type.

    For example, consider a General rule with the following criteria: all inbound connections from Internet address 192.168.1.1 through port 8080. When you select Block, Smart Firewall blocks all connections satisfying the other criteria of this General rule.

    Monitor
    Update the Firewall - Activities category in the event log each time that communication of this type takes place. This option lets you monitor how often this firewall rule is used.

    You can view the event log under Firewall - Activities category in the Security History window.
  3. Click Next.
  4. Select the type of connection for the rule. Your options are:
    Connections to other computers The rule applies to outbound connections from your computer to another computer.
    Connections from other computers The rule applies to inbound connections from another computer to your computer.
    Connections to and from other computers The rule applies to inbound and to outbound connections.
  5. Click Next, and then select the computers that apply to the rule. Your options are:
    Any computer The rule applies to all computers.
    Any computer in the local subnet This rule applies only to computers in the local subnet.

    An organization's network is divided into subnets to facilitate efficient Internet communications. A subnet represents all of the computers in the same LAN.
    Only the computers and sites listed below The rule applies only to the computers, sites, or domains that you specify.

    You can specify the names and addresses of computers that apply to the rule. The details of the specified computers appear in the list. You can also remove computers from the list.

    When you select this option, the Add option becomes available. You can then specify or remove a computer by using the Add or the Remove buttons.
  6. Click Next, and then select the protocols for the rule. Your options are:
    TCP The rule applies to TCP (Transmission Control Protocol) communications.
    UDP The rule applies to UDP (User Datagram Protocol) communications.
    TCP and UDP The rule applies to TCP and to UDP communications.
    ICMP The rule applies to ICMP (Internet Control Message Protocol) communications.

    This option is available only when you add a General rule, modify a General rule, or modify a Program rule that handles ICMP traffic.
    ICMPv6 The rule applies to ICMP (Internet Control Message Protocol for Internet Protocol version 6) communications.

    This option is available only when you add a General rule, modify a General rule, or modify a Program rule that handles ICMP traffic.
    All The rule applies to all supported protocols.

    When you select this option, you cannot specify the types of communications or ports that apply to the rule.
    For UDP communications, the rule analyzes the first datagram only. If the rule applies, the same action is used for all subsequent UDP datagrams that flow in either direction between the same endpoints.
  7. Select the ports for the rule. Your options are:
    All types of communication (all ports, local and remote) The rule applies to communications that use any port.
    Only communications that match all types and ports listed below The rule applies to the ports that you specify. You can specify the ports by selecting from the listed ports or by adding specific ports or port ranges.

    Note:

    If you select ICMP or ICMPv6 protocol, you can specify the commands. To do so, select a command from the list of known commands or add specific commands or command ranges.
    When you select this option, the Add option becomes available. You can use the Add option or the Remove option to specify or remove a port or a command.
  8. Click Next.
  9. Check Create a Security History log entry if you want Norton Internet Security to create an entry in the firewall event log.

    Norton Internet Security creates an entry when a network communication event matches this rule. You can view the event log in the Security History window under Firewall - Activities. If you selected the Monitor option in the Action window, then the Create a Security History log entry option is automatically checked.
  10. Check Apply this rule if you want to apply this rule to Ipv6 NAT Traversal traffic.
  11. Click Next, and then, in the text box, type a name for this rule.
  12. Click Next, and then review the new rule settings.
  13. Click Finish.
  14. When you have finished adding rules, click OK.

0 comments: (+add yours?)

Post a Comment

Note: Only a member of this blog may post a comment.