About Firewall Rule Network Services Triggers; Setting Up Firewall Rules - Symantec 20032623 - Endpoint Protection Small Business Edition Implementation Manual

Implementation guide
Table of Contents

Advertisement

About firewall rule network services triggers

Setting up firewall rules

For example, consider a rule that defines a single local host and multiple remote
hosts. As the firewall examines the packets, the local host must match the relevant
IP address. However, the opposing sides of the address may be matched to any
remote host. For example, you can define a rule to allow HTTP communication
between the local host and either Symantec.com, Yahoo.com, or Google.com. The
single rule is the same as three rules.
See
Blocking traffic to or from a specific server"
See
About firewall rules"
Network services let networked computers send and receive messages, share files,
and print. A network service uses one or more protocols or ports to pass through
a specific type of traffic. For example, the HTTP service uses ports 80 and 443 in
the TCP protocol. You can create a firewall rule that allows or blocks network
services. A network service trigger identifies one or more network protocols that
are significant in relation to the described network traffic.
When you define TCP-based or UDP-based service triggers, you identify the ports
on both sides of the described network connection. Traditionally, ports are referred
to as being either the source or the destination of a network connection.
See
Permitting clients to browse for files and printers in the network"
See
About firewall rules"
Table 15-5
describes how to set up new firewall rules.
How to setup firewall rules
Table 15-5
Step
Task
1
Add a new
firewall rule
on page 212.
on page 212.
Description
You can add new firewall rules through the console using several
methods. One method lets you add a blank rule that has default
settings. The other method offers a wizard that guides you
through creating a new rule.
See
Adding a new firewall rule"
You can save time creating a new firewall rule by copying an
existing rule that is similar to the rule that you want to create.
Then you can modify the copied rule to meet your needs.
See
Copying and pasting firewall rules"
Managing firewall protection
Setting up firewall rules
on page 224.
on page 226.
on page 220.
on page 221.
219

Advertisement

Table of Contents
loading

This manual is also suitable for:

Endpoint protection small business edition

Table of Contents