The Add Rule wizard leads you through the steps that are necessary to create firewall rules.
Use the Add Rule wizard
- Open the Add Rule wizard by creating a Traffic rule or a Program rule.
- In the first panel of the Add Rule wizard, select the action that you want for this rule. Your options are:
Allow communication of this type. For example, consider a Traffic rule with the following criteria: all inbound connections from Internet address 192.168.1.1 through port 8080. When you select
, Smart Firewall allows all connections that satisfy the criteria of this Traffic rule.Prevent communication of this type. For example, consider a Traffic rule with the following criteria: all inbound connections from Internet address 192.168.1.1 through port 8080. When you select
, Smart Firewall blocks all connections that satisfy the criteria of this Traffic rule.Update the Firewall – Activities category in the event log each time that communication of this type takes place. This option lets you monitor how often this firewall rule is used. Norton notifies you every time that the traffic matching the monitor rule criteria passes through your computer. You can use the links in these notifications to view the logs. You can view the event log under Firewall – Activities category in the Security History window. The monitor rule only logs the traffic events in the Security History window. You need to create another Allow or Block rule to handle the network traffic.
You can monitor and allow or block the traffic by enabling the Add Rule wizard or the Modify Rule wizard.
option in the - Click .
- Select the type of connection for the rule. Your options are:
The rule applies to outbound connections from your computer to another computer. The rule applies to inbound connections from another computer to your computer. The rule applies to inbound and to outbound connections. - Click , and then select the computers that apply to the rule. Your options are:
The rule applies to all computers. This rule applies only to computers in the local subnet. An organization’s network is divided into subnets to facilitate efficient Internet communications. A subnet represents all of the computers in the same LAN.
The rule applies only to the computers, sites, or domains that you specify. You can specify the names and addresses of computers that apply to the rule. The details of the specified computers appear in the list. You can also remove computers from the list.
When you select this option, the Networking dialog box in which you can specify individual computers, a range of computers, or specify all computers on a subnet or network.
option becomes available. When you click , Norton displays theYou can use the
option or the option to add or remove a computer. - Click , and then select the protocols for the rule. Your options are:
The rule applies to TCP (Transmission Control Protocol) communications. The rule applies to UDP (User Datagram Protocol) communications. The rule applies to TCP and to UDP communications. The rule applies to ICMP (Internet Control Message Protocol) communications. This option is available only when you add a Traffic rule, modify a Traffic rule, or modify a Program rule that handles ICMP traffic.
The rule applies to ICMPv6 (Internet Control Message Protocol for Internet Protocol version 6) communications. This option is available only when you add a Traffic rule, modify a Traffic rule, or modify a Program rule that handles ICMPv6 traffic.
The rule applies to all supported protocols. When you select this option, you cannot specify the types of communications or ports that apply to the rule.
- Select the ports for the rule. Your options are:
The rule applies to communications that use any port. The rule applies to the ports that you specify. You can specify the ports by selecting from the listed ports or by adding specific ports or port ranges. If you select ICMP or ICMPv6 protocol, you can specify the commands. To do so, select a command from the list of known commands or add specific commands or command ranges.
When you select this option, the
option becomes available. You can use the option or the option to specify or remove a port or a command. - Click .
- Check if you want Norton to create an entry in the firewall event log.
Norton creates an entry when a network communication event matches this rule. You can view the event log in the Security History window under Firewall – Activities. If you selected the option in the Action window, then the option is automatically checked. You cannot uncheck the box to turn off this option as it is the default setting.
- Under Apply rule for NAT IPv6 traversal traffic, select an option. Your options are:
- Click , and then, in the text box, type a name for this rule.
- Click , and then review the new rule settings.
- Click .
- When you have finished adding rules, click .
Need more help?
Source : Official Norton Brand
Editor by : BEST Antivirus KBS Team