Skip to main content

Setting Up a Firewall: Mac OS X 10.6.x (Snow Leopard)

Setting Up a Firewall: Mac OS X 10.6.x (Snow Leopard)

Learn how to set up the Mac OS 10.6.x firewall to protect your computer against malicious activity.

Note: This basic firewall closes off unused network service ports, but lets you create exceptions for specific programs running on your computer. To check your version of OS X, open the Apple menu (the blue apple icon in the upper left corner of the screen), and selectAbout This Mac.

Expand all

1. Open System Preferences.

  • Open the Apple menu, and select System Preferences…
  • Click the Security icon in the Personal area of the window, or open the View menu at the top of the screen, and selectSecurity.

2. Activate the firewall.

  • Click the Firewall tab.
    • Note: If the Start button is gray and you can’t click it, click the lock icon at the bottom of the window, and enter your adminstrator password when prompted.
  • Click the Start button.
  • Click the Advanced button.
  • Select the desired firewall configuration.
  • Click OK.
  • Close the Security pane to save your selections.

Task Screenshot

3. Create program exceptions.

  • Click the Firewall tab in the Security pane.
  • Click the Advanced button.
  • Click the + symbol.
  • Find the program that you'd like to add as an exception.
  • Click the Add button.
  • Repeat the above steps for each program you'd like to add to the exceptions list.
  • Set whether to Allow incoming connections or Block incoming connections for the programs in your list by clicking the up or down arrows to the far right of the program name, then selecting the appropriate option.
  • Click OK.
  • Close the Security pane saving your selections.

Note: UCSD does not officially recommend any exceptions; any university programs will not be affected. However, in the example below, George Bluefin has added iTunes as an exception. If he did not have iTunes enabled in his firewall exceptions list (which allows incoming connections), people wouldn't be able to connect or listen to his shared music when his firewall is on.

Task Screenhot

Source : http://blink.ucsd.edu/technology/security/firewall/mac-snow.html#3.-Create-program-exceptions.


Comments

Popular posts from this blog

Cisco Command "Auto secure"

Cisco Command "Auto secure" In today's article, I'm going to quickly inform you about the Privileged EXEC command named "auto secure". Network administrators (like you) use the "auto secure" command to secure the management and forwarding planes of a router. Another way of saying it is, CCNAs use this command to secure a router by disabling common IP services which can be exploited by attackers to initiate network attacks. When the command is typed on a router, it takes the user (ccna) through a command line-interface (CLI) semi-interactive session (which is also known as the AutoSecure dialogue). Below is the command's syntax: auto secure [management | forwarding] [no-interact | full] [ntp | login | ssh | firewall | tcp-intercept] As you can see, the command can use several "optional" keywords: management - This (optional) keyword is used to only secure the management plane of a router. forwarding - This (optional) keyword is used to...

NetSurveyor :: 802.11 (WiFi) Network Discovery / Scanner Tool

NetSurveyor :: 802.11 (WiFi) Network Discovery / Scanner Tool http://www.performancewifi.net/performance-wifi/main/NetSurveyor.htm NetSurveyor is an 802.11 (WiFi) network discovery tool and, as such, its goal in life is to gather information about nearby wireless access points in real time and display it in a useful way. Similar in purpose to NetStumbler , it includes many more features. The data is displayed using a variety of different diagnostic views and charts. Data can be recorded for extended periods and played-back at a later date/time. Also, reports can be generated in Adobe PDF format. Applications for NetSurveyor include the following: During the installation of a wireless network, as an aid in verifying the network is properly configured and antennas are positioned at locations to achieve efficient transmission / reception -- that is, for use in verifying WiFi coverage and maximizing beacon signal strength Trouble-shooting an existing network or wireless environm...

The Seven Habits

The Seven Habits Habit 1: Be Proactive - Changes starts form within; highly effective people make the decisions to improve their lives through the things that they can influence rather than simply reacting to external forces. Habit 2: Begin with the end with mind. - Develop a principle– centered personal mission statement into long- term goals based on personal principle. Habit 3: Put first thing first. - Spend time doing what fits into your personal mission, observing the proper balance between production and building production capacity. Identify the key roles that you take on in life, and make time for each other. Habit 4: Think win / win - Seek agreements and relationships that are mutually beneficial. In cases where a win / win deal cannot be achieved, accept the fact that agreeing to make “no deal”, may be the best alternative. In developing the organizational culture, be sure to reward win / win behavior among employees and avoid inadvertently rewarding win / lose behavior. Habi...