89
Managing computer connections
You can configure Firewall to manage specific remote
connections to your computer by creating rules, based on
Internet Protocol addresses (IPs), that are associated with remote
computers. Computers that are associated with trusted IP
addresses can be trusted to connect to your computer and those
IPs that are unknown, suspicious, or distrusted, can be banned
from connecting to your computer.
When allowing a connection, make sure that the computer that
you trust is safe. If a trusted computer is infected with a worm or
other mechanism, your computer can be vulnerable to infection.
Also, McAfee recommends that the computer you trust is
protected by a firewall and an up-to-date antivirus program.
Firewall does not log traffic or generate event alerts from trusted
IP addresses in the
Networks
list.
You can ban computers that are associated with unknown,
suspicious, or distrusted IP addresses from connecting to your
computer.
Since Firewall blocks all unwanted traffic, it is normally not
necessary to ban an IP address. You should ban an IP address
only when you are sure that an Internet connection is a threat.
Make sure that you do not block important IP addresses, such as
your DNS or DHCP server, or other ISP-related servers.
In this chapter
About computer connections ....................................90
Banning computer connections ................................94
C
H A P T E R
1 8
Summary of Contents for MTP09EMB1RAA - Total Protection 2009
Page 1: ...User Guide...
Page 2: ......
Page 6: ......
Page 28: ......
Page 30: ......
Page 42: ......
Page 46: ......
Page 70: ......
Page 82: ......
Page 120: ......
Page 128: ......
Page 146: ......
Page 162: ......
Page 190: ......
Page 192: ......
Page 198: ......
Page 206: ......
Page 218: ......
Page 222: ......
Page 239: ...Chapter 49 McAfee Total Protection 237...
Page 254: ......