Blocking traffic to or from a specific server
To block traffic to or from a specific server, you can block the traffic by IP address
rather than by domain name or host name. Otherwise, the user may be able to
access the IP address equivalent of the host name.
To block traffic to or from a specific server
1
In the console, open a Firewall policy.
2
On the Firewall Policy page, click Rules.
3
On the Rules tab, in the Rules list, select the rule you want to edit, right-click
the Host field, and then click Edit.
4
In the Host List dialog box, do one of the following actions:
■
Click Source/Destination.
■
Click Local/Remote.
5
Do one of the following tasks:
Do all of the following tasks:
■
In the Source and Destination or Local and Remote tables,
click Add.
■
In the Host dialog box, select a host type from the Type
drop-down list, and type the appropriate information for
each host type.
■
Click OK.
The host that you created is automatically enabled.
To select a host type
from the Type
drop-down list
In the Host List dialog box, do one of the following actions:
■
Click Source/Destination.
■
Click Local/Remote.
Then in the Host List dialog box, check the box in the Enabled
column for any host group that you want to added to the rule.
To select a host
group
6
Add additional hosts, if necessary.
7
Click OK to return to the Rules list.
See
“Setting up firewall rules”
on page 219.
See
“Customizing firewall rules”
on page 221.
See
“Editing a policy”
on page 122.
Managing firewall protection
Setting up firewall rules
224
Summary of Contents for 20032623 - Endpoint Protection Small Business Edition
Page 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Page 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Page 34: ...34...
Page 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Page 70: ...Managing product licenses Licensing an unmanaged client 70...
Page 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Page 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Page 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Page 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Page 304: ...304...
Page 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Page 310: ...310...