Learn how to a build a cloud-first strategyRegister Now


How to configure Norton 360's Firewall Rules to allow Printer sharing on a wireless network.

Posted on 2007-10-02
Medium Priority
Last Modified: 2013-11-16
- How do I properly configure Norton 360's firewall rules to let everyone on my home wireless network print to a locally attached printer to PC (1) please see below.
 - The hardware is a D-Link DIR-625 Router and the following computers listed below.  I can find the printer drivers for the HP OfficeJet 600 that is attached to PC (1); I've enabled printer sharing on PC (1). I'm just having a hard time with Norton 360 letting the other computers on my network access it.
I would like to be able to print to Desktop (1) along with computers 2,3,4 listed below by sharing the printer through windows.

1) Desktop: Hard-wired to the router with printer sharing enabled - Norton 360 is installed on this PC.
OS: XP Home

2) Desktop: Wireless NIC
OS: XP Pro - Software Firewall - ZoneAlarm Internet Security

3) Desktop - Wireless NIC
OS: Vista Home Basic - Firewall - N/A at the moment

4) Laptop - Wireless NIC
OS -  XP Media Center Edition - Software Firewall ZoneAlarm Internet Security

Thanks in advance,
Question by:Heuman
LVL 29

Accepted Solution

chilternPC earned 1500 total points
ID: 20003096
run the home network wizard on all machines  (control panel)
make sure they are all in the sameworkgroup.

re-boot ll PC/laptops

open norton 360 goto firewall configuration and on theright hand side - click on trust network choose the network to trust.

the main thing with norton is rebooting the PC after changin the firewall  otherwise it doesn't really change,  

Author Comment

ID: 20089422
Appreciate your advice, but it was a little more complicated than just that.  Norton 360 just needed to be set up on a trusted zone setting.  Making sure that all computers are on the same workgroup and opening up ZoneAlarm on the computers that are running at.  With this particular firewall you have to add the computer via the IP address to allow them to see each other on the network.  So doing an IP config on each computer to establish their IP addresses was another thing I need to do.  Overall my wireless network is setup with file sharing and printer sharing (which is really well is trying to do).  

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question