To permit clients to browse for files and printers in the network
1
In the console, open a Firewall policy.
2
On the Firewall Policy page, click Rules.
3
On the Rules tab, in the Rules list, select the rule you want to edit, right-click
the Service field, and then click Edit.
4
In the Service List dialog box, click Add.
5
In the Protocol dialog box, in the Protocol drop-down list, click TCP, and
then click Local/Remote.
6
Do one of the following tasks:
In the Remote port drop-down list, type 88, 135, 139, 445.
To permit clients to
browse for files and
printers in the
network
In the Local Port drop-down list, type 88, 135, 139, 445.
To enable other
computers to browse
files on the client
7
Click OK.
8
In the Service List dialog box, click Add.
9
In the Protocol dialog box, in the Protocol drop-down list, click UDP.
10
Do one of the following tasks:
In the Local Port drop-down list, type 137, 138.
In the Remote Port drop-down list, type 88.
To permit clients to
browse for files and
printers in the
network
In the Local Port drop-down list, type 88, 137, 138.
To enable other
computers to browse
files on the client
11
Click OK.
12
In the Service List dialog box, make sure that the two services are enabled,
and then click OK.
13
On the Rules tab, make sure the Action field is set to Allow.
14
If you are done with the configuration of the policy, click OK.
227
Managing firewall protection
Setting up firewall rules
Summary of Contents for 20032623 - Endpoint Protection Small Business Edition
Page 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Page 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Page 34: ...34...
Page 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Page 70: ...Managing product licenses Licensing an unmanaged client 70...
Page 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Page 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Page 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Page 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Page 304: ...304...
Page 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Page 310: ...310...