Firewall Question

Posted on 2007-08-07
Last Modified: 2013-11-16
I have a wireless network that I use at home.  It is a basic Linksys wireless modem that I use (if you need the specific model number I can provide it).  I have the same applications on my desktop and my laptop computer.  The application works fine on the laptop which has the Windows firewall disabled and no other firewall present, but I have problems on my desktop which does have a firewall enabled (McAfee).  The applications connect to servers to verify my license is valid before allowing me access.  

I right now I use both machines in tandem to do what I need to do but I would like to use one.  What should I do to resolve this issue?  Would I put myself at a greater risk disabling the McAfee firewall and only using the firewall on the router?  
Question by:banseca
    LVL 28

    Accepted Solution

    I prefer the paranoid solution using two firewalls -- particularly since  you're wireless.

    Is the application server outside your network and have you configured McAfee to explicitly allow connections from that IP and port?

    Author Comment

    Yes the application server is outside of my network.  I have not configure McAfee to specifically allow ip's or ports.  I just gave the application full rights so that it can send and receive data from the application server.  I'll have to check and see if that is an option and how to do it.
    LVL 32

    Assisted Solution

    If you know the ports used for communication between the server and client, you can add an exception on the McAfee firewall. This would give you the desired protection and would also allow you to communicate with the server.

    Please check and advice.
    LVL 28

    Expert Comment

    by:Jan Springer
    Absolutely.  I have found that just allowing an application privilege is not enough with some firewalls.

    Author Comment

    McAfee apparently pushed out some updates to there security center between the time I posted this question and now all my applications work again.  Thanks for you guys help.  

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Find Ransomware Secrets With All-Source Analysis

    Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

    Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
    This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
    To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…
    Migrating to Microsoft Office 365 is becoming increasingly popular for organizations both large and small. If you have made the leap to Microsoft’s cloud platform, you know that you will need to create a corporate email signature for your Office 365…

    761 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    10 Experts available now in Live!

    Get 1:1 Help Now