User ManualTable of ContentsMcAfee Firewall1Table of Contents71 Welcome to McAfee Firewall11About McAfee Firewall11Figure 11. McAfee Firewall main window11How McAfee Firewall works12About McAfee Firewall documentation12McAfee Firewall online Help13To launch McAfee Firewall help:131. In the text box, type the first few letters of the word or phrase you are looking for.132. Locate what you are looking for; then double-click the topic or click the Display button.131. In the text box, type the first few letters of the word or phrase you are looking for. You can...132. Once you have located what you are looking for in the display topic box, click the topic.13Frequently Asked Questions13How will McAfee Firewall help me?13How is my PC at risk on the Internet?14What other protection do I need?14Are there any data packets that McAfee Firewall cannot stop?15Inbound Data: No.15Outbound Data: Yes and no.15What network devices does McAfee Firewall support?15What protocols can McAfee Firewall filter?15How can I still be harassed, even with McAfee Firewall?16Figure 12. Normal TCP Connection162 Installing McAfee Firewall17System requirements17About Winsock 217Installing McAfee Firewall17To install McAfee Firewall181. Close all open programs.182. Insert the McAfee Firewall CD in the CD-ROM drive.183. In the McAfee Firewall Setup screen, click Install McAfee Firewall.18Troubleshooting installation problems18Step 1: Clean up your hard drive181. Click Start on the Windows taskbar, point to Programs, then Accessories, then System Tools, an...182. In the ScanDisk window, select Standard and Automatically fix errors.183. Click Advanced. In the Advanced Settings dialog box, make sure the following settings are sele...184. Ignore the other options, and click OK. Click Start. ScanDisk begins scanning your drive for e...195. When ScanDisk is finished, close ScanDisk.196. Click Start on the Windows taskbar, point to Programs, then Accessories, then System Tools, an...197. Click OK to start Disk Defragmenter. Depending on the speed of your computer and the size of y...198. Close Disk Defragmenter when it has finished defragmenting your disk.19Step 2: Remove temporary files191. Double-click the My Computer icon on your desktop. The My Computer window opens. Double-click ...192. Double-click the Windows folder.193. In the Windows folder, double-click the Temp folder.194. In the menu, click Edit, then click Select All. All of the items in your Temp folder are highl...195. Press the Delete key on your keyboard to delete the files. If Windows asks about deleting file...196. In the Windows taskbar, click Start, then click Shut Down.197. Click Restart the computer, then click Yes in the Shut Down Windows dialog box to restart your...19Step 3: Close other software191. Hold down the Ctrl and Alt keys on your keyboard, and then press the Delete key once. The Clos...192. Click End Task for every item on the list except Explorer.193. Repeat steps 2 and 3 until you’ve closed everything except Explorer.204. When you see only Explorer in the Close Program dialog box, click Cancel.203 McAfee Firewall Configurations21Applications21Control applications21Default settings for applications22Systems22Control system22Figure 31. System Settings22Figure 32. Dial-Up Adapter [0000] Properties23Default settings for System activity24NetBIOS over TCP: Blocked24Identification: Allowed24ICMP: Blocked24ARP: Allowed24DHCP: Allowed if your system uses DHCP24RIP: Blocked24PPTP: Blocked24Other Protocols: Blocked24Password Protection25Instructions for Administrators25Configuring Network, Display and Logging Controls25Network Control25Display Control25Logging Control25Configuring Applications261. Select the Settings menu item, and the Applications option on the popup menu.262. Do not select "Trust all applications" unless you are very sure this is what you want. When se...263. Close the Application Settings dialog box, choosing "OK".264. Add applications you want to communicate to the "Trusted Applications" list by running the app...265. Once you have run the applications you want to communicate, review the Trusted and Blocked App...266. Select the application and click either Add, Remove, or Allow. Click the Trust all application...26Figure 33. Application Settings dialog box267. Choose "OK" to close the dialog box.268. Choose File/Save Settings if you want to write this new configuration to disk immediately. Not...27Configuring System Settings271. List all the network segments that are connected to computers that are to be configured.272. Decide what network traffic should be allowed on each network segment.273. Select the Settings menu item, and the System option on the popup menu.274. From the list of network devices, determine which device is connected to which network segment...275. For each device:276. Choose OK to close the System/Settings dialog box.27Configuration after Adding/Removing Network Devices281. Select the Settings menu item, and the System option on the popup menu.282. For each network device:283. Choose OK to close the System/Settings dialog box.28Using Password Protection281. Select the File menu item, and the "Password" option on the popup menu. This pops up another m...282. Enter a secret password in the two places shown and choose OK.283. Write the password down and store it in a safe place. There is no mechanism for retrieving the...284 Glossary31A Product Support41How to Contact McAfee41Customer service41Technical support42Support via the web42Support forums and telephone contact42Table A1.42Table A1.43McAfee training43Index45A45About McAfee Firewall 1145Address 3145Administrator 3145Allow/Block (packets) 3145ARP 24, 3145Authentication 3145B45BO 3145BRKill 3145Broadcast (networks) 3145Button 3245C45Configuration after Adding/Removing Network Devices 2845Configurations 2145Configuring Applications 2645Configuring Network, Display and Logging Controls 2545Configuring System Settings 2745Connection 3245Control applications 2145Control system 2245Cookies 3245D45datagram 3245Default 3245Default settings for applications 2245DHCP 24, 3245Dialog Box 3245Dial-Up Adapter 2345DNS 3245E45Email 3345Ephemeral (port) 3345Ethernet 3345F45Fileshare 3345Filter (firewalls) 3345finger 3345Firewall 3345Flood blocking a TCP connection 1645FTP 3345G45GRE 3345H45Hacker 3345How is my PC at risk on the Internet? 1445How McAfee Firewall works 1245HTTP 3345HTTPS 3445I45ICMP 24, 3445ICQ 3445Identification 3445Inbound Data 1545inbound packet 3445Installing McAfee Firewall 1745Instructions for Administrators 2545IP 3446IPX 3446IPX network 2446ISDN 3546ISP 3546L46Listening 3546Local (address or port) 3546Log File 3546M46McAfee Firewall filter 1546Menu 3546Message Box 3546Modem 3546N46NetBEUI 3546NetBIOS 3546NetBIOS over TCP 2446NetBus 3646Netware-IP 3646Network 3646Network Device 3646News (NNTP) 3646Normal TCP Connection 1646ntp 3646O46Operating System 3646Outbound Data 1546outbound packet 3646P46Packet 3646Packet Filter 3646Password 3746Password Protection 2546Phone Book 3746ping 3746POP2 3746POP3 3746PPP 3746PPPoE 3746PPTP 24, 3746Printshare 3746Protocol 3746protocols 1546R46RARP 3846RAS 3846Remote (address or port) 3846RIP 24, 3846S46Server-side nuking 1646Service 3846SLIP 3846SMTP 3846SNMP 3846SPX 3846System activity 2446System requirements 1746T46TCP 3846Telnet 3846tftp 3946Toggle 3946trojan 3946Tunnel 3946U47UDP 3947Using Password Protection 2847V47Virus (software) 3947VPN 3947W47WINS 4047Winsock 4047Winsock 2 1747Size: 366 KBPages: 48Language: EnglishOpen manual