Use the Add Rule wizard

The Add Rule wizard leads you through the steps that are necessary to create firewall rules.

Use the Add Rule wizard

  1. Open the Add Rule wizard by creating a Traffic rule or a Program rule.

  2. In the first panel of the Add Rule wizard, select the action that you want for this rule. Your options are:

    Allow

    Allow communication of this type.

    For example, consider a Traffic rule with the following criteria: all inbound connections from Internet address 192.168.1.1 through port 8080. When you select Allow, Smart Firewall allows all connections that satisfy the criteria of this Traffic rule.

    Block

    Prevent communication of this type.

    For example, consider a Traffic rule with the following criteria: all inbound connections from Internet address 192.168.1.1 through port 8080. When you select Block, Smart Firewall blocks all connections that satisfy the criteria of this Traffic rule.

    Monitor

    Update the Firewall - Activities category in the event log each time that communication of this type takes place. This option lets you monitor how often this firewall rule is used. Norton notifies you every time that the traffic matching the monitor rule criteria passes through your computer. You can use the links in these notifications to view the logs. You can view the event log under Firewall - Activities category in the Security History window.

    The monitor rule only logs the traffic events in the Security History window. You need to create another Allow or Block rule to handle the network traffic.

    You can monitor and allow or block the traffic by enabling the Create a Security History log entry option in the Add Rule wizard or the Modify Rule wizard.

  3. Click Next.

  4. Select the type of connection for the rule. Your options are:

    Connections to other computers

    The rule applies to outbound connections from your computer to another computer.

    Connections from other computers

    The rule applies to inbound connections from another computer to your computer.

    Connections to and from other computers

    The rule applies to inbound and to outbound connections.

  5. Click Next, and then select the computers that apply to the rule. Your options are:

    Any computer

    The rule applies to all computers.

    Any computer in the local subnet

    This rule applies only to computers in the local subnet.

    An organization's network is divided into subnets to facilitate efficient Internet communications. A subnet represents all of the computers in the same LAN.

    Only the computers and sites listed below

    The rule applies only to the computers, sites, or domains that you specify.

    You can specify the names and addresses of computers that apply to the rule. The details of the specified computers appear in the list. You can also remove computers from the list.

    When you select this option, the Add option becomes available. When you click Add, Norton displays the Networking dialog box in which you can specify individual computers, a range of computers, or specify all computers on a subnet or network.

    You can use the Add option or the Remove option to add or remove a computer.

  6. Click Next, and then select the protocols for the rule. Your options are:

    TCP

    The rule applies to TCP (Transmission Control Protocol) communications.

    UDP

    The rule applies to UDP (User Datagram Protocol) communications.

    TCP and UDP

    The rule applies to TCP and to UDP communications.

    ICMP

    The rule applies to ICMP (Internet Control Message Protocol) communications.

    This option is available only when you add a Traffic rule, modify a Traffic rule, or modify a Program rule that handles ICMP traffic.

    ICMPv6

    The rule applies to ICMPv6 (Internet Control Message Protocol for Internet Protocol version 6) communications.

    This option is available only when you add a Traffic rule, modify a Traffic rule, or modify a Program rule that handles ICMPv6 traffic.

    All

    The rule applies to all supported protocols.

    When you select this option, you cannot specify the types of communications or ports that apply to the rule.

  7. Select the ports for the rule. Your options are:

    All types of communication (all ports, local and remote)

    The rule applies to communications that use any port.

    This rule will apply only if it matches all of the ports listed below

    The rule applies to the ports that you specify. You can specify the ports by selecting from the listed ports or by adding specific ports or port ranges.

    If you select ICMP or ICMPv6 protocol, you can specify the commands. To do so, select a command from the list of known commands or add specific commands or command ranges.

    When you select this option, the Add option becomes available. You can use the Add option or the Remove option to specify or remove a port or a command.

  8. Click Next.

  9. Check Create a Security History log entry if you want Norton to create an entry in the firewall event log.

    Norton creates an entry when a network communication event matches this rule. You can view the event log in the Security History window under Firewall - Activities. If you selected the Monitor option in the Action window, then the Create a Security History log entry option is automatically checked. You cannot uncheck the box to turn off this option as it is the default setting.

  10. Under Apply rule for NAT IPv6 traversal traffic, select an option. Your options are:

    • On

    • If Explicitly requested

    • Off

  11. Click Next, and then, in the text box, type a name for this rule.

  12. Click Next, and then review the new rule settings.

  13. Click Finish.

  14. When you have finished adding rules, click Close.

Thank you!

Thank you for using Norton Support.

< Back

Was this information helpful?

DOCID: v1028179_ns_retail_en_us
Operating System: Windows
Last modified: 12/13/2016