Instruction/ maintenance manual of the product Norton Personal Firewall 2003 Symantec
Go to page of 151
User’s Guide.
Norton™ Personal Firewall User’s Guide The software described in this boo k is furn ished under a license agreement and may be used only in accordance with the te rms of the agreement. Documentation version 6.0 PN: 10025076 Copyright Notice Copyright • 2002 Symantec Corp oration.
SYMANTEC LICENSE AND WARRANTY IMPORTANT: PLEASE READ THE TERM S AND CONDITIONS OF THIS LICENSE AGREEMENT CAREFULLY BEFORE US ING THE SOFTWA RE. SYMANTEC CORPORATION AND/OR ITS SUBSIDIARIES (“SYMANTE.
PROPERTY RIGHTS. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS. YOU MAY HAVE OTHER RIGHTS, WHICH VARY F ROM STATE TO STA TE AND COUNTRY TO COUNTRY. 5. DISCLAIMER OF DAMAGES: SOME STAT ES AND COUNTR IE.
Contents Chapter 1 Responding to emergencies If you think your computer is under attack ......................... ............. 11 Recover from an emergency ........................ ........................... ............. 12 Prevent future problems .
Contents 6 Chapter 4 Norton Personal Firewall basics Access Norton Personal Fi rewall .......................... ........................... ... 35 Access Norton Personal Firewall from the system tray ......... 36 Work with Norton Personal Firewall ..
Contents 7 Chapter 6 Controlling acces s to protected computers Control how people use your computer ................... .......................... 61 Connect to a network ...................... ..................... .......................... 61 Enable file and printer sharing .
Contents 8 Chapter 8 Protecting your privacy Identify private information to protect ...................... ........................ 89 Privacy Control and SSL ........................... .................... ................. 90 Add private information .
Contents 9 Appendix A Troubleshooting Norton Personal Firewall Troubleshoot Norton Personal Firewall problems .............. ........... 112 What is wrong with this Web site? ............ .................... ........... 112 Why can’t I post informatio n online? .
Contents 10 Glossary Service and support solutions Index CD Replacement Form.
Responding to emergencies If you have an emergency, these proced ures can help you find the solution to your problem. If you think your computer is under attack If your computer is beha ving unpredictably, and yo u have determined that the behavior is not due to a virus or a corrupted file, you may be t he victim of an Internet attack.
Responding to emer gencies Recover fr om an emergenc y 12 See “Identif y the source of communications” on page 43. 6 Use Visual Tracking to ident ify the I P address of the computer that the attac ker used. Y ou can use this infor mation to report the attac k to the I S P tha t owns the I P address .
Responding to emergencies Prevent future probl ems 13 Prevent future problems Norton Personal Firewall can prote ct yo ur computer against most Internet attacks. To prepare your computer for emerge ncies: 1 Stay in formed about sec urity risks by visiting the Symant ec Security Response Web site ( securityresponse .
Responding to emer gencies Prevent future p rob lems 14.
About Norton Personal Firewall Norton Personal Fir ewall protects computers from Inter net attacks, guards your privacy, and speeds Web surfing by eliminating ads.
About Norton Per sonal Firewall Nor ton Perso nal Firewa ll features 16 Norton Personal Firewall features Norton Pe rsonal Firewall in cludes a numb er of security tools that help keep your computer safe. You can get fast access to all Norton Personal Firewall tools from the new Security Monitor.
About Norton Personal Firewall Norton Personal F ire wall f ea tur es 17 About Norton Personal Firewall Norton Personal Firewall provides a barrier between your computer and the Inte rnet. A firewall prevents unauthorized users from accessing private computers and networks connecte d to the In ternet.
About Norton Per sonal Firewall Nor ton Perso nal Firewa ll features 18 Norton Personal Firewall features include: Intrusi on Detectio n Intrusio n Detectio n helps keep your computer safe from Internet attacks by scanning each piece of inform ation that enters and exits your computer .
Installing Norton Personal Firewall Before installing Norton Personal Firewall, take a moment to review the system requiremen ts listed in this chapter.
Installing Norton Personal Firewall S yst em r equi r emen ts 20 Your comp uter must also meet th e following minimum requir ements. Supported email clients Norton Personal Firewall can sc an em ail messages for private information in any POP3-compatible email client, including: 1 Microsoft • Outlo ok • Express 4.
Installing Nort on Personal Firewall Befor e installation 21 Email scanning does not support th e following email clients: 1 IM A P c l i e n t s 1 AO L clients 1 P O P3s that use S S L (S ecure Socke.
Installing Norton Personal Firewall Install Norton Personal Fir ewall 22 T o disable the Windows XP firew all 1 On the Windows XP taskbar, clic k Start > Control P anel > Netw ork Connectio ns . 2 If you ha ve crea ted more t han one modem or network connection, select the active connection.
Installing Nort on Personal Firewall Install Norton Personal F irew all 23 3 Click Next . 4 Read the License Agreement, then clic k I accept th e license agreeme nt .
Installing Norton Personal Firewall Install Norton Personal Fir ewall 24 7 Click Next . 8 Click Browse to select a fo lder into which yo u want to install Norton Personal Firewall, if it is ot her than the default location. 9 Click Next . See “Register your software” on page 25.
Installing Nort on Personal Firewall Register yo ur software 25 11 Read the readme text, th en click Nex t . 12 Click Fini sh to complete the installa tion. If the opening screen does not appear Sometimes a computer’s CD-ROM drive does not automatically run a CD.
Installing Norton Personal Firewall Register yo ur software 26 2 If you would like informatio n from Symantec about Norton Personal Firewall, select the method by which you want to receive that information, then click Next . 3 Type your name, then click Next .
Installing Nort on Personal Firewall Register yo ur software 27 5 Do one of the following: 2 Answer the su rvey questions to help Symantec improve its products and ser vices, t hen click Next . 2 Skip the survey by clicking Next . 6 Select whether you want to register Norton Personal Firewall over the Internet or by mail.
Installing Norton Personal Firewall After ins ta ll ati on 28 After installation After Nort on Pers onal Fir ewall is in stalled, a prompt appears giving you the option to r estart your computer immediately. After restart ing, the Security Assistant appears to guid e you through the configuration of Norton Personal Firewall.
Installing Nort on Personal Firewall After ins ta ll ati on 29 T o set up Home Ne tworkin g 1 In the Security Assistant Ro admap, click Home Network ing . 2 In the Home Networking p ane, click Set up Home Netwo rking . 3 In the Home Networking Wizard, click Next .
Installing Norton Personal Firewall After ins ta ll ati on 30 To s e t u p P r o g ra m C o n t ro l 1 In the Security Assistant Ro admap, click Pr ogram Scan .
Installing Nort on Personal Firewall After ins ta ll ati on 31 3 In the Program Scan window, click Next to begin the scan. W hen the scan is complete , all Internet-enabled programs tha t were found are listed. 4 To allow Internet access for a program, c heck the c hec k box to the left of the program’s name.
Installing Norton Personal Firewall After ins ta ll ati on 32 T o set up Privacy Control 1 In the Security Assistant Ro admap, click Pr ivacy Control . 2 In the Pr ivacy Control p ane, click Add private i nformation to protect . 3 In the Add Pr ivate Infor mation dial og b ox, under Type of information to protect, select a category .
Installing Nort on Personal Firewall If you have Norton S ystemWorks installed 33 T o protect Nor ton Personal Firewall options with a password 1 In the Security Assistant Ro admap, click P assword Protectio n . 2 In the Password Prot ection pane, click Turn on password prote ction .
Installing Norton Personal Firewall If you need to uninst all Norton Personal Fir ew all 34 If you need to uninstall Norton Personal Firewall If you need to uninstall Norton Per son al Firewall from your computer, use the Uninstall Norton Personal Firewa ll option on the Windows Start menu.
Norton Personal Firewall basics After installation, Norton Personal Firewall automatically protects any computer on which it is installed. You do not ha ve to start the program t o be protected. Access Norton Personal Firewall Launch Norton Personal Fi rewall to ch ange protection settings or monitor its activities.
Norton Personal Firewall basics Acc ess Nort on Pe rson al Fi r ewal l 36 2 On the Windows XP taskbar, click Start > More Programs > Norton Personal Firewall > Nort on Persona l Firew all . 2 On the Windows de sk top, double-click Norton Personal Firewa ll .
Norton Person al Firew all basics Work with Norton Personal F ir ewall 37 See “About Global Settings” on page 46. Use the Norton Personal Firewall Op tions to ad d additional tools to the menu.
Norton Personal Firewall basics Work with Norton Personal F irew all 38 3 In the Security Center, do one of the following: 2 Double-click a feature you want to cust omize. 2 Select a feature, then in the lower-right corner of the window, click Customize .
Norton Person al Firew all basics Work with Norton Personal F ir ewall 39 Select a t ask wit h the Security M onitor Use the Select a Task men u in the Security Monitor to quickly perform common Norton Personal Fi rewall tasks.
Norton Personal Firewall basics Work with Norton Personal F irew all 40 1 Wha t thes e typ es of al erts ind icate 1 How to reduce the number of these alerts you receive T o use the Alert Assistant 1 In any alert window, clic k the Alert Assistant button.
Norton Person al Firew all basics Work with Norton Personal F ir ewall 41 Use Alert Tracker Many of the Inte rnet events th at Nort on Persona l Firewall monitors are not significant enough t o trigger al erts. Alert Tracker provides an easy way to monitor these less-important security events.
Norton Personal Firewall basics Work with Norton Personal F irew all 42 T o re view r ecent Alert T rac k er messa ges 1 On the W indows desk top, double-click the Alert Trac ker . 2 To the right of the first message, click the arrow if it appears . See “Review detailed statistics” on page 10 5.
Norton Person al Firew all basics Work with Norton Personal F ir ewall 43 T o get more information about an at-risk are a 4 On the r esult s page , next to t he scan name, cl ick Show Details . Identify the source of communications Visual Tracking helps you le arn more about computer s that att empt to connect to your computer.
Norton Personal Firewall basics Work with Norton Personal F irew all 44 3 In the Intrusion Detectio n window, in the A utoBlock section, select a connection yo u want to trace. 4 Click Attacker Details . Y our browser opens the Visual Tracking W eb page .
Norton Person al Firew all basics Customiz e Norton Person al Fir ewa ll 45 Customize Norton Personal Firewall The default Norton Personal Firewall sett ings should provide adequate protection for most users. If you need to make changes, use the Options menu to access Norton Personal Fi rewall options.
Norton Personal Firewall basics P assw ord -prote c t o ptio ns 46 About Web Content options Web Conten t options le t you control ho w Norton Personal Firewall handles interactive online content, ads, and possible privac y intrusions. Web Content options a re arranged on three tabs.
Norton Person al Firew all basics T emporar ily disable Norton Personal F ire wall 47 Reset options p assword If you forget your options password you can reset it.
Norton Personal Firewall basics For more in format ion 48 You can also disable individual securi ty features. For ex ample, you might want to see if th e Personal Firewall is preventing a program fr om operating correctly. T o disable a protection fe a ture 1 Open Norton Personal Firewall.
Norton Person al Firew all basics For more in format ion 49 2 On the main Help menu, click Norton P ersonal Fir ewall Help . 3 In the left pane of the Help window, select one of the following tabs: 2 Contents : Displays the Help by topic. 2 Index: Lists H elp topics in alphabetical order by key word.
Norton Personal Firewall basics For more in format ion 50 The Release Notes can be accessed from the Start menu. T o re a d the Release Notes 1 Do one of the following: 2 On the Windows t askbar, cli ck Start > Progr ams > Norton Personal Fir ewa ll > Pr oduct Supp ort > Norton Person al Firewall Release Notes .
Norton Person al Firew all basics For more in format ion 51 T o re ad the User’s Guide from your h ar d disk 1 Open the locatio n into whic h you copied the PDF . 2 Double-click NP F2003.pdf . About Norton Personal Firewall on the Web The Symantec Web site provides extensive information about Norton Personal Firewall.
Norton Personal Firewall basics For more in format ion 52 Subscribe to the Symantec Se curity Response newsletter Each month, Symantec publishes a fr ee electronic newsletter that is focused on the needs of Internet securi ty customers.
Keeping current with LiveUpdate Symantec products depe nd on current information to protect yo ur computer from newly discovered th reat s. Symant ec makes this information available to you through LiveUpdate. Using your Inte rnet connection , LiveUpdate obtains program updates and protection updat es for your computer.
Keeping current with LiveUpdate About pro t ection updates 54 About protection updates Protection update s are files available from Symantec, by subscription, that keep your Symantec product s up-to- date with the latest anti-threat technology. The pro tection updates you receive depe nd on which product you are using.
Keepi ng curren t with LiveUpd ate When you should updat e 55 When you should update Run LiveUpdate as soon as you have installed your product. Once you know that your files are up-to-date, run Live Update regularly to obtain updates.
Keeping current with LiveUpdate If you can’t use Liv eUpdate 56 If you can’t use LiveUpdate When new updates become available, Symantec posts th em on the Symantec Web site. If you can’t run LiveUpdate, you can obtain new updates fr om the Sym antec We b site.
Keepi ng curren t with LiveUpd ate Set L iveU pd ate to Interact ive o r E xpres s m ode 57 LiveUpdate automatically installs all available updates for your Symantec products. T o set Liv eUpdate to Int er ac tive or Expr ess mode 1 Open your Symantec product.
Keeping current with LiveUpdate Ru n LiveUpdat e autom atica lly 58 Run LiveUpdate automatically You can have LiveUpdate check for protection updates automatically, on a set schedule, by enabling Automatic LiveUpdate. You must continue to run LiveUpdate manually to receive product updates.
Keepi ng curren t with LiveUpd ate Run Li veUpdat e automat ically 59 To delete the schedule for Automatic LiveUpdate, disable Automatic LiveUpdate. T o di sabl e A utoma tic Live Upda te 1 Start Norton Pe rsonal Firewall. 2 At the top of the Norton Personal Firewall main window, clic k Options .
Keeping current with LiveUpdate Ru n LiveUpdat e autom atica lly 60.
Controlling access to protected computers You can configure Norton Personal Fire wall to meet your needs in many different situations. You can use the progr am to control your computer’s access to both local computers and comput ers over the Internet.
Controlling access to p rotected computers Contr ol how people use your computer 62 See “Monitoring Norto n Pers onal Firewa ll” on page 103. Whenever you jo in a network, Norton Personal Firewall au tomatically begins monitoring the connection. You do not need to make any changes in order to be protected.
Controlling ac cess to protec ted computer s Contr ol how people us e your comp ut er 63 computers to your Trusted Zone if yo u know that their user s can be trusted and they have firewall software installed. The Home Network Wizard is the fast est way to organize co mputers into zones.
Controlling access to p rotected computers Contr ol how people use your computer 64 T o manually add computers to z ones 1 Open Norton Personal Firewall. 2 In the Security Center, double-click Personal Firew all . 3 In the Personal Firewall window, on the Home Networking tab, select the zone to whic h you want to add a computer .
Controlling ac cess to protec ted computer s Contr ol how people us e your comp ut er 65 Find a comput er’s IP addr ess There are t wo procedures for finding a computer’s IP address. On Windows 98/Me computers, you can use Winipcfg to find the IP address of a computer.
Controlling access to p rotected computers Contr ol how people use your computer 66 Specify a r ang e of computers You can enter a range of computers by specifying the starting (lowest numerically) IP address and the ending (highest numerically) IP address.
Controlling ac cess to protec ted computer s Control how users access the Int ernet 67 Control how users access the Internet Norton Personal Firewall suppo rts most In ternet conne ction methods without needing additiona l configuration.
Controlling access to p rotected computers Contro l how ou tsid e us ers a cces s you r net wor k 68 If you run a Virtual Private Network Norton Personal Firewall works with the following Virtual Priv.
Guarding against intrusion attempts Internet attacks ta ke advantage of the wa y that computers transfer information. Norton Pers onal Firewall can prot ect your computer by monitoring the information that comes into and out of your computer and blocking any attack attempts.
Guarding against in trusion attempts How Norton Personal F irew all prot ects ag ainst network a ttacks 70 Norton Personal Firewall monitors communications When Norton Personal Fi rewa ll is active, it mo nitors communications among your computer and other comput er s on the Internet.
Guarding against intrusion attempt s How Norto n Pe rson al Fir ewall pro te cts ag ains t netw ork a ttac ks 71 Because attacks may span packets, In trusion Detection examines packets in two different ways. It scans each pack et individually looking for patterns that are t ypical of an attack.
Guarding against in trusion attempts Custom ize fi re wall pr ot ection 72 Customize firewall protection The default Norton Personal Firewall sett ings should provide adequate protection for most users.
Guarding against intrusion attempt s Customiz e firew all prot ection 73 3 Move the slider to the Security Level that you want. Y our options are : Change individual security settings If the Security Level options do not meet your nee ds, you can change the settings for Norton Personal Firewall, Java , and ActiveX protection levels.
Guarding against in trusion attempts Custom ize fi re wall pr ot ection 74 3 Click Custom Level . 4 Do one or more of the following : 2 On the Personal Firewall menu, select a level. Your o ptions are: 2 On the Java Ap plet Security or ActiveX Control Security menu, select a level.
Guarding against intrusion attempt s Customize firewall rules 75 2 To be notified whenever unknown pr ograms access the Internet, check Enable Access Cont rol Alerts . 2 To be notified whenever a r emote computer atte mpts to conne ct to a port no program is using, check Alert when unused ports are acce ssed .
Guarding against in trusion attempts Customiz e firewa ll rules 76 this type of communication are ignored if they appear below the first rule that matches. If no match ing rule i s found, the co mmunication is bloc ked. Depending on the Reporting level, an alert may appear.
Guarding against intrusion attempt s Customize firewall rules 77 T o enable Automatic Progr am Control 1 Open Norton Personal Firewall. 2 In the Security Center, double-click Personal Firew all . 3 In the Personal Firewall window, on the Program Contr ol tab, c heck Turn on A utomati c Prog ram Contr ol .
Guarding against in trusion attempts Customiz e firewa ll rules 78 3 In the Personal Firewall window, on the Program Contr ol tab, clic k Program Scan .
Guarding against intrusion attempt s Customize firewall rules 79 6 In the Internet Access Contr ol alert, select the acc ess level you want this program to ha ve . Y our options are : 7 If you want to see any risks that this program could pose to y our computer, clic k Detai ls .
Guarding against in trusion attempts Customiz e firewa ll rules 80 5 In the Internet Access Contr ol alert, select the acc ess level you want this program to ha ve .
Guarding against intrusion attempt s Customize firewall rules 81 3 In the Personal Firewall window, on the Advanced tab, click Tr ojan Horse Rules . 4 Follow the on-screen instructions. See “Write a firewa ll rule” on page 8 1 . T o add a Progr am Rule 1 Open Norton Personal Firewall.
Guarding against in trusion attempts Customiz e firewa ll rules 82 4 Select the t ype of connectio n the ru le should mon itor . Y our options are: 5 Click Next . 6 Select the computers the rule sh ould moni tor . Y our optio ns are : 7 Click Next . 8 Select the protocols the rule should monitor .
Guarding against intrusion attempt s Customize firewall rules 83 9 Select the ports the rule should monitor . Y our options are: 10 Click Next . 11 Choos e if an d how you want N orton P ersonal Firewa ll to t rack this rule. Y our options are: 12 Click Next .
Guarding against in trusion attempts Customiz e firewa ll rules 84 T o change an e xistin g firew a ll rule 1 In the G enera l Rules, Troj an Horse Ru les, or Prog ram Rules window, click Add . 2 Sel ect the ru le that you want to change . 3 Click Modify .
Guarding against intrusion attempt s Customiz e Intrusion Det ection 85 T o remov e a firewall rule 1 In the G enera l Rules, Troj an Horse Ru les, or Prog ram Rules window, click Add . 2 Select the rule that y ou want to r emove. 3 Click Re move . 4 W hen you are done removing rules, click OK .
Guarding against in trusion attempts Customiz e Intrusion Det ection 86 safe behavior, you can create an excl usion for the attack signat ure that matches the benign activity. w Each exclusion that you create leaves your co mputer vulnerable to attacks.
Guarding against intrusion attempt s Customiz e Intrusion Det ection 87 4 In the Exclud ed Signatur es li st, selec t the attack signatur e that yo u want to monitor .
Guarding against in trusion attempts Customiz e Intrusion Det ection 88 Exclude computers from AutoBlock If a computer you need to access is repeatedly placed in the AutoBlock list, you can exclude it fro m be ing blocked by AutoBlock. T o ex clude specific c omputers f rom Aut oBlock 1 Open Norton Personal Firewall.
Protecting your privacy Every time that you browse the Internet, computers and Web sites collect information about you. Some of this information comes fr om forms that you fill out and choices that you make.
Protectin g your pr ivacy Identify privat e in forma tion to prot ect 90 Privacy Control lets you c reate a list o f information that you wa nt to rema in private. If someone attempts to se nd protected information over the Interne t, Nort on Per sonal Firewall warns them ab out t he sec urity r isk or blocks the co nnecti on .
Protecting your privacy Custo mi ze Privac y Cont rol 91 Modify or remove private information You can modify or remove private information at any time. T o modify or remove pr iv ate inf ormation 1 Start Norton Pe rsonal Firewall. 2 In the Security Center, double-click Pr ivacy Cont rol .
Protectin g your pr ivacy Customize Pr ivacy Control 92 T o set the Priv acy Leve l 1 Start Norton Pe rsonal Firewall. 2 Double-click Privacy C ontrol .
Protecting your privacy Custo mi ze Privac y Cont rol 93 4 Select the Private Informa tion setting that y ou want . Y our options are : 5 Click OK . Chan ge the Cook ie Blocki ng sett in g Many Web sites store in fo rmation they collect in cookies placed on your hard disk.
Protectin g your pr ivacy Customize Pr ivacy Control 94 Enable or dis able Brows er Pr iv acy Browser Privacy prevents W eb site s from lea rning the type of browser that you are using, the Web site that you last visited, and other information about your browsing habits.
Blocking Internet advertisements Many Web sites are using more aggres si ve techniques to draw attention to the ads on their page s. Some have be gun using larger, more prominent ads, while others rely on ad windows tha t appear wh en you enter or leave the site.
Blocking Internet a dvertisements Enab le or d isabl e Ad Bloc ki ng 96 Blocking by location Every file on the Internet has a unique address or URL . Whe n you view a Web page, your computer connect s to a URL and displays the file that is stored there.
Blocking Internet advertisement s Enable or disabl e Popup Window Bl ocking 97 2 Double-click Ad Blocking . 3 Check or unchec k Turn on Ad Blocking . 4 Click OK . Enable or disable Popup Window Blocking Pop-up and pop-under ads are secondary windows that Web sites open when you visit or leave the sites.
Blocking Internet a dvertisements Enab le or di sable F lash blo ck ing 98 Enable or disable Flash blocking When Ad Blocking is active , Norton Pe rsonal Firewall automatically blo cks all Flash animations that have the sam e dimens ions as co mmon ads.
Blocking Internet advertisement s Use te xt strings t o identify ads to block or pe rmit 99 3 In the Security Center, double-click Ad Blockin g . 4 In the Ad Blo cking window, ensure that En able Ad Blo cking is che cke d . 5 Click Open the Ad Trashcan .
Blocking Internet a dvertisements Use te xt strings to iden tify ads to block or permit 100 Make sure that wha t you place in the (D efaults) block list isn't too general. For example, www by itself is not a go od string to block because almost every URL incl udes www.
Blocking Internet advertisement s Use te xt strings t o identify ads to block or pe rmit 101 4 On the Ad Blocking tab, clic k Add . 5 In the Ad d New HT ML String di alog b ox, selec t the act ion that you want to take. Y o ur options are: 6 Type an HTM L string to bl ock or p ermit .
Blocking Internet a dvertisements Use te xt strings to iden tify ads to block or permit 102.
Monitoring Norton Personal Firewall Norton Personal Firewall maintain s re cords of every ingoing and outgoing Interne t conn ection and any actions that the pr ogram takes to protect your computer. You sh ould periodically review this information to spot potential problems.
Monitoring Nor ton Personal Firewall View the Status & Settings window 104 It is normal to see some denied acc ess attempts on a random basis (not all from the same IP addr ess, and not to a sequenc e of port numbers) .
Monitoring Nort on Personal Firewall Revie w detailed stat istics 105 Reset information in the Statistics window Norton Personal Firewall au tomatically c lears all of the statis tics in the Statistics window when you rest art Windows. You can also clear the statistics manually.
Monitoring Nor ton Personal Firewall Revie w detailed st atistics 106 T o re view de tailed st atistics 1 Open Norton Personal Firewall. 2 In the Security Center main window, click St atistics . 3 In the Sta tistics window, clic k Detailed Statist ics .
Monitoring Nort on Personal Firewall View Norton Personal F ir ewall Logs 10 7 T o set the stat istics displa yed in the Det ailed S tat istics window 1 Open Norton Personal Firewall. 2 In the Security Center main window, click St atistics . 3 In the Sta tistics window, clic k Detailed Statistics .
Monitoring Nor ton Personal Firewall Vie w Norton P erson al Fi re wall L ogs 108 View the logs View the Norton Personal Firewall logs from the Statistics window. T o view the logs 1 Open Norton Personal Firewall. 2 Do one of the following: 2 In the Security Center, click Stati stics > View Log s .
Monitoring Nort on Personal Firewall View Norton Personal F ir ewall Logs 109 Refresh the logs The logs automatically refresh when yo u move from log to log. To view network events occurring since you began v iewing the Log Viewer, you can manually refresh all the logs or an individu al log.
Monitoring Nor ton Personal Firewall Vie w Norton P erson al Fi re wall L ogs 110 Change the size of the logs Norton Personal Firewall stores the infor mation for each lo g in a separate file. You can change the s ize of log file s to m anage the amoun t of hard dis k space that they occupy.
Troubleshooting Norton Personal Firewall The information in this ch apter will help you so lve the most frequently encountered problems. If you can’t fin d the solution to your problem here, there is a wea lth of info rmation on the Symant ec Web site.
Troubleshooting Norton Personal Firewall T rouble shoo t Nort on P erson al F ir ewa ll pr oblems 112 T o se arch the S ymant ec service and support Web site 1 On the left side of any W eb page in t he Syma ntec W e b site, c lick search . 2 Type a wor d or ph rase tha t best r epresent s the in forma tion for w hich you are looking .
Troubleshooting Nort on Personal Firewall T roubleshoot Nort on Personal F ire wall problems 113 See “Temporaril y disable N orton Personal Firewall” on page 47. If you need t o view the site, disable Norton Personal Fir ewall and try the Web site again.
Troubleshooting Norton Personal Firewall T rouble shoo t Nort on P erson al F ir ewa ll pr oblems 114 If your email program mainta ins copies of sent messages in its Sent or Out folder, you can reopen th e email messag e, remove the private information, and send the message again.
Troubleshooting Nort on Personal Firewall T roubleshoot Nort on Personal F ire wall problems 115 Some Internet service providers scan th e ports on users’ computers to ensure that they are keeping to thei r service agreements. Norton Personal Firewall might interpret this as a malicious port scan and stop communications with your cable system.
Troubleshooting Norton Personal Firewall T rouble shoo t Nort on P erson al F ir ewa ll pr oblems 116.
About the Internet The Internet is the interconnect ion of millions of computers throughout the world. It is comprised of the computer s and the connections that make it possible for any computer on the Internet to communicate with any other computer on the Internet.
About t he Inte rnet How inf orma tion is tr ansmitte d over the Int ernet 118 exchanges (MAEs). There ar e regional highways pr ov ided by large ISPs and local streets provided by local ISPs. Like a system of roads and highways, th e Inter net provides multiple rou tes from one point to another.
About the Internet How inf orma tion is tr ansmitted ov er the Int ernet 119 The Internet is a packet switching network . Every communication is broken into packets by TCP (Transmission Control Protocol). Each packet contains the addresses of the sending and re ce iving computers a long with the information to be communicated.
About t he Inte rnet How Web i nf orma tion is locat ed on the In ter net 120 About UDP UDP (User Datagram Pro tocol) is used for funct ions in which the reliability of TCP is not necessar y, such as broadcasting video to multiple computers at once. UDP doesn’t provide error correct ion or retransmission of lost packets.
About the Internet How We b in form ation is loc at ed on the Int ernet 121 Each URL maps to the IP address of the computer that stores the Web page. URLs are used beca use they are easie r to remember and type than IP addresses. Before your browser r equests a page, it asks a DNS (Dom ain Name System) server for the IP address of the Web site.
About t he Inte rnet How ports identify progr a ms on servers 122 There is one particular URL th at identifi es your computer to itself, and that is localhost. If your computer has We b server software installed, you can type http://localhost and see your Web page.
About the Internet How computers are iden tified on the Inte rnet 123 Well-known p ort s Following are some of the mo st common well-known ports . How computers are identified on the Internet Millions of computers are connected to the I nternet.
About t he Inte rnet How computers are iden tified on the Int ernet 124 A typical subnet mask looks like this: 255.255.255.0. The 255s indicate parts of the IP address that are the same for all computer s within the subnet, while the 0 indicates a part of the IP address that is different.
Understanding Internet risks Norton Personal Firewall protects you fro m major risks that a re associated with the Internet. These risks incl ude the threat of network attack, malicious code in active content , exposure to inappropriate cont ent, exposure o f private information, and getting viruses from infected files.
Understanding In ternet risks Risks from hack ers 126 1 Initial access T he hacker exploits a v ulnerability found during informa tion gathering and establishes an en try point into your computer . 1 Privilege escalation T he hack er gains access t o more pr ograms and serv ices on your computer .
Understandi ng Internet risks Risks f rom h ack ers 127 Ini tial acces s The easiest way for a hacker to access a Windows computer is to use Microsoft networking. On many comp uters, Microsoft networking is enabled so that anyone on th e network can co nnect to it.
Understanding In ternet risks Risks from active cont ent 128 Other Trojan horse programs might reco rd all your keystr okes to capture passwords and other sensitive data. No rton Personal Fire wa ll blocks the ports t hat Remo te Acc ess Tr ojan ho rse pr ograms use t o commu nicate over the Internet .
Understandi ng Internet risks Risks from inappropriate cont ent and ac tivities 129 Risks from inappropriate content and activities There is a wealth of information on th e Internet th at is easily accessible to everyone. However, some topics are not suitable for all people.
Understanding In ternet risks Risks to your privacy 130 You may want to prevent some users from sending private information over the Internet. No rton Personal Fi rewall can block users from accessing secure sites where they might be asked for personal information.
Understandi ng Internet risks Risks f rom T rojan horses and viruses 131 Tracking Internet use Most browsers pass on informatio n that you might want to keep confidential. One item that your browse r normally passes to Web sites is the URL of the page from which you came .
Understanding In ternet risks The lik elihood of being attack ed 132 A zombie program is a dormant program secre tly installed on a computer. It can later be run remotely to aid in a collective attack on another computer. Zombie prog rams don ’t norm ally damage the computer on which they reside, but are used to attack other computers.
Gloss ary This glossary provides definitions of some common In ternet terms. active content Material on a Web page that changes wit h time or in response to user ac tion. Active content is implemented through ActiveX controls, Visual Basic Scripts, Java scripts, and Java applets in the HTML code that defines the page.
Glossary 134 connection A method of d ata ex change that allows a rel iable transfer of dat a between two comput ers. connection attempt The data transfe r that requests the opening of a connection. cookie A small data file that some Web sites place on yo ur hard disk while you’re viewing a Web page.
Glossary 135 email (electronic mail) A method of exchang ing messag es and file s with other people via computer networks. A popular protocol for sending emai l is SMTP (Simple Mail Transfer Protocol). Popular protocols for r eceiving email are POP3 (Post Office Protocol 3) and IMAP4 (Internet Message Access Proto col 4).
Glossary 136 IP address (Internet Protocol address) A 32-bit numeric identifier that uniquely identifies a computer on the Interne t. IP addresses are usually expressed as four groups of numbers, each ranging from 0 to 255, separated by periods. For example, 206.
Glossary 137 network address The portion of an IP address that is common to all computers on a par ticular network or subnet. operating system A program that ties the capabilities of computer hardware and software to input/output devices such as disks, keyboards , and mouse devices.
Glossary 138 port number A logical communications channel to be used by a particular TCP/IP applic ation. Each application has unique port numbers associated with it. By convention, some protocols use a well-known port number (for example, HTTP uses port 80), although this is configurable.
Glossary 139 TCP/IP (Transmission Control Protocol/ Internet Protocol) The standard family of pro tocols for communicatin g with Internet devices. threat A circumstance, event, or person with the potential to cau se harm to a system in the fo rm of destruction, disclosure, modifica tion of data, and/ or denial of serv ice.
Glossary 140.
Service and support solutions The Service & Support Web site at h ttp://service.symantec .com supports Symantec products. Customer Service he lps with nontechnical issues such as orders, upgrades, replacements, an d rebate s. Technic al Suppor t helps with technical issues such as instal ling, configuring, or troubleshooting Symantec products.
Service and support solutions 142 For upgrade orders, visit the Symantec St ore at: http://www.symantecstore.com Technical support Symantec offers two technical suppor t options for help with installi.
Service and support solutions 14 3 Worldwide service and support Technical support an d customer servic e solutions vary by country. For Symantec and Interna tional Partner locations out side of the United States, contact one o f the service and support offic es listed below, or connect to http://service.
Service and support solutions 144.
Inde x A access Alert Tracker 36 Block Traffic 36, 44 Help 36 LiveUpdate 36, 39 logs 39 Norton Personal Firewall 37 options 45 Program Scan 39 Security Check 42 Visual Tracking 43-44 active content 12.
Index 146 browser information 115 privacy 94 C CompuServe 56 computer blocking 87 emergency procedu res 11 requirements 19 computers names 65 specifying 64-66 connecting to the In ternet automat icall.
Index 14 7 Internet Access Statistics contents 105-106 resetting 105 Internet Control Me ssage Protocol (ICMP) 119 Internet Group Membership Protocol (IGMP) 119 Internet -enabled applicati ons 78 Intr.
Index 148 options ( continued ) protecting with password 32, 46 resetting pa ssword 47 P passwords options 32 ping scans 126 Popup Window Blocki ng, enabling and disabling 97 pop-up windows, blocking .
Index 14 9 settings Norton Personal Firewall 72-85 Program Control 79 sockets 122 SSL (Secure Sockets Layer) and Privacy Control 90 statistics 105-107 detailed 105 Norton Personal Firewall 103-110 res.
Index 150 Z zombie programs 71, 132 zones 62-64 adding computers to 63 Restricted 88 Trusted 71.
Norton™ Person al Fir ewall CD Rep la cement Fo rm FOR CD REPLACEMENT Please send me : ___ CD Replacement Name _________________ ____________ _________________ ____________ _________________ _____________ ________ Company Name _____________ _________________ ____________ _________________ ____________ _________________ Street Address ( No P .
An important point after buying a device Symantec Norton Personal Firewall 2003 (or even before the purchase) is to read its user manual. We should do this for several simple reasons:
If you have not bought Symantec Norton Personal Firewall 2003 yet, this is a good time to familiarize yourself with the basic data on the product. First of all view first pages of the manual, you can find above. You should find there the most important technical data Symantec Norton Personal Firewall 2003 - thus you can check whether the hardware meets your expectations. When delving into next pages of the user manual, Symantec Norton Personal Firewall 2003 you will learn all the available features of the product, as well as information on its operation. The information that you get Symantec Norton Personal Firewall 2003 will certainly help you make a decision on the purchase.
If you already are a holder of Symantec Norton Personal Firewall 2003, but have not read the manual yet, you should do it for the reasons described above. You will learn then if you properly used the available features, and whether you have not made any mistakes, which can shorten the lifetime Symantec Norton Personal Firewall 2003.
However, one of the most important roles played by the user manual is to help in solving problems with Symantec Norton Personal Firewall 2003. Almost always you will find there Troubleshooting, which are the most frequently occurring failures and malfunctions of the device Symantec Norton Personal Firewall 2003 along with tips on how to solve them. Even if you fail to solve the problem, the manual will show you a further procedure – contact to the customer service center or the nearest service center