HP (Hewlett-Packard) Norton Personal Firewall 2003 Printer User Manual


 
Guarding against intrusion attempts
Customize firewall rules
81
3 In the Personal Firewall window, on the Advanced tab, click Trojan
Horse Rules.
4 Follow the on-screen instructions.
See “Write a firewall rule” on page 81.
To add a Program Rule
1 Open Norton Personal Firewall.
2 In the Security Center, double-click Personal Firewall.
3 In the Personal Firewall window, on the Program Control tab, in the
list of programs, click Add.
4 In the Select a program window, select a program’s executable file.
Executable file names typically end in .exe.
5 In the Internet Access Control alert, on the What do you want to do
menu, select Create a firewall rule.
6 Follow the on-screen instructions.
See “Write a firewall rule” on page 81.
Write a firewall rule
Norton Personal Firewall leads you through the process of writing your
own firewall rules.
To write a firewall rule
1 In the General Rules, Trojan Horse Rules, or Program Rules window,
click Add.
2 In the Add Rule window, select the action that you want for this rule.
Your options are:
3 Click Next.
Permit Internet
Access
Allows communication of this type to take place.
Block Internet
Access
Prevents communication of this type from taking place.
Monitor Internet
Access
Updates the Firewall tab in the Event Log or shows a
message each time that communication of this type takes
place. This lets you monitor how often this firewall rule is
used.
w To monitor a permitted connection, you must create
both a monitor and a permit rule. The monitor rule must
precede the permit rule.