HP (Hewlett-Packard) Norton Personal Firewall 2003 Printer User Manual


 
Guarding against intrusion attempts
Customize firewall rules
82
4 Select the type of connection the rule should monitor. Your options are:
5 Click Next.
6 Select the computers the rule should monitor. Your options are:
7 Click Next.
8 Select the protocols the rule should monitor. Your options are:
Connections to
other computers
The rule applies to outbound connections from your
computer to another computer.
Connections from
other computers
The rule applies to inbound connections from another
computer to your computer.
Connections to and
from other
computers
The rule applies to both inbound and outbound
connections.
Any computer The rule applies to all computers.
Only computers
specified below
The rule applies only to the computers, sites, and
domains listed.
Adapters The rule applies to a specific network adapter in your
computer. This allows you to customize firewall rules for
each of your computer’s IP addresses. For example, if
your computer is connected to a home network and to
the Internet, you might want to set up a rule that
permits file sharing on the home network, while another
rule blocks file sharing over the Internet.
TCP The rule applies to TCP (Transmission Control Protocol)
communications.
UDP The rule applies to UDP (User Datagram Protocol)
communications.
TCP and UDP The rule applies to both TCP and UDP communications.
ICMP The rule applies to ICMP (Internet Control Message
Protocol) communications. This option is only available
when adding or modifying a General Rule.