So far, the only information we have about the traffic is its source
address. It would be interesting to see the full text of Norton's
description of what it's blocking -- if you can't copy it from the dialog
box, maybe you can find details in the Norton "Log Viewer".
But at this point, I'm thinking this traffic is "strange but harmless".
David Gillett
Norton Personal Firewall
Security Alert
Medium Risk
Norton Personal Firewall has detected and blocked an intrusion attempt.
Intrusion: Invalid Source IP Address.
Intruder: 255.255.255.255.
Risk Level: Medium.
Destination IP address: YOUR-B80B6C408A(165.247.168.231).
Protocol: ICMP.
The Source IP address 255.255.255.255 is invalid.
Security Alert
What is a Security Alert?
A Security Alert appears when someone attempts to access your computer. This
may be an attack, a Trojan horse, or legitimate activity such as someone on
your local network attempting to share files or printers.
Not all Security Alerts are indications that your computer is under attack.
Some harmless communication between computers may appear to be similar to
common Internet attacks and can trigger Security Alerts.
What triggered this alert?
A computer with the IP address 255.255.255.255 sent information that is
characteristic of the Invalid Source IP Address attack.
Additional Information
You can get detailed information about this attack at the Symantec Security
Response Web site. http://securityresponse.symantec.com/avcenter/nis_ids/
What should I do?
You do not have to do anything to protect your computer. Any communications
that triggers a security alert is automatically blocked.
By default, the computer that sent this communication is placed in
AutoBlock, which blocks all communication from this computer for 30 minutes,
even if subsequent communication is benign.
How can I reduce the number of these alerts?
If legitimate connection attempts from a computer that you trust are
triggering Security Alerts, add the computer to the Trusted Zone for your
location.
To add a computer to the Trusted Zone
1. Double-click Personal Firewall.
2. Click Networking.
3. Click Trusted.
4. Click Add.
5. Do one of the following:
a. To specify an individual computer, click Individually and type the
name or IP address of a single computer.
b. To specify a range of computers, click Using a range and type the
starting (lowest numerically) and ending (highest numerically) IP addresses.
c. To specify computers using a network address, click Using a network
address and type an IP address and a subnet mask.
6. Click OK.
If you receive frequent Security Alerts about a specific attack when you
perform safe activities, you can turn off monitoring for this attack.
To turn on or turn off an individual Intrusion Detection alert
1.. In the main window, double-click Intrusion Detection.
2.. In the Intrusion Detection window, on the Intrusion Detection tab,
click Advanced.
3.. In the Signature Exclusions window, click on an attack signature then
click Properties.
4.. In the Signature Properties dialog box, check or uncheck Alert me when
this signature is detected then click OK.
5.. In the Signature Exclusions window, click OK.
6.. In the Intrusion Detection window, click OK.
To turn on or turn off Intrusion Detection alerts
1. In the main window double-click Intrusion Detection.
2. In the Intrusion Detection window, on the Intrusion Detection tab,
check or uncheck Notify me when Intrusion Detection blocks connections.
3. Click OK.
If someone is repeatedly using a specific computer to attack your computer,
you can permanently block all communication from the IP address by adding
this computer to the Restricted Zone for your location.
To add a computer to the Restricted Zone
1. Double-click Personal Firewall.
2. Click Networking
3. Click Restricted.
4. Click Add.
5. Do one of the following:
a. To specify an individual computer, click Individually and type the
name or IP address of a single computer.
b. To specify a range of computers, click Using a range and type the
starting (lowest numerically) and ending (highest numerically) IP addresses.
c. To specify computers using a network address, click Using a network
address and type an IP address and a subnet mask.
6. Click OK
The NOSPIN Group Promotions is now offering
our special coffee cups and mouse pads
with the PCSOFT logo... at a great price!!!
http://freepctech.com/goodies/promotions.shtml
The NOSPIN Group Promotions is now offering
our special coffee cups and mouse pads
with the PCSOFT logo... at a great price!!!
http://freepctech.com/goodies/promotions.shtml
|