Peppies-Site Forums

Fun Games and General Chat.

:dj: when radio is on air you can tune in by clicking on the Peppies-Jukebox link on the top of the page (members only) and by leaving it open you can browse the site content and join in with stuff all at the same time or if you join us you can join us in the irc channel to see whats being played, make requests and join in with us there too. :dj: ADVERTS DISAPPEAR ON JOINING OUR SITE ITS FREE TO SIGN UP AND REGISTER SO DO YOURSELF A FAVOUR AND JOIN US RIGHT NOW!! HELP US TO BUILD A NICE LITTLE COMMUNITY WHERE FUN NEVER STOPS............

    Windows Firewall Inside Out

    Share

    gammer121™

    Posts : 51
    Join date : 2011-04-06
    Age : 41
    Location : online

    Windows Firewall Inside Out

    Post  gammer121™ on 18th March 2013, 09:58

    What is a Firewall?

    Firewalls can either be implemented as hardware or as software. They were designed to protect networks by stopping network traffic from passing through them, as such they are normally placed on the perimeter of a network where they allow outbound traffic but block inbound traffic. Firewalls are based on rules that you as an administrator would define. There are three types of rules.

    Inbound rules apply to any traffic that originates from outside of your network and is destined for a device on your network.
    Outbound rules apply to any traffic that originates from a device on your network.
    Connection-specific rules enable a computer’s administrator to create and apply custom rules depending on what network you are connected to. In Windows this is also known as Network Location Awareness.

    Types of Firewalls

    Typically in a large corporate environment you have a whole security team dedicated to protecting your network. One of the most common methods that can be used to enhance the security of your network is deploying a firewall at the boundary of your network, for example between your corporate intranet and the public internet. These are called perimeter firewalls and can be both hardware based as well as software based.

    The problem with perimeter firewalls is that you can’t protect nodes on your network from traffic generated inside your network. As such you will normally have a software based firewall solution running on every node on your network as well. These are called host based firewalls and Windows comes with one out of the box.

    The Windows Firewall

    1. The first thing you will want to do is check that your firewall is turned on. To do that open the Control Panel and head into the system and security section.

    2. Then click on Windows Firewall.

    3. On the right hand side you will see the two firewall profiles as used by Network Location Awareness.

    4. If the firewall is disabled for a network profile it will be red.

    5. You can enable it by clicking on the link on the left hand side.

    6. Here you can easily enable the firewall again by changing the radio button to the enabled setting.

    7. Allowing a Program Through the Firewall

    By default the Windows Firewall, like most others, drops any unsolicited inbound traffic. To prevent this, you can set up an exception in the Firewall rules. The problem with this approach is it requires you to know port numbers and transport protocols such as TCP and UDP. The Windows Firewall allows users not familiar with this terminology to instead whitelist applications that you want to be able to communicate on the network. To do this again open the Control Panel and head into the System and Security section.

    8. Then click on Windows Firewall.

    9. On the left hand side you will see a link to allow a program or feature through the firewall. Click on it.

    10. Here you can enable a firewall exception for a firewall profile by simply ticking a box. For example, if I only wanted remote desktop to be enabled when I was connected to my safe home network, I can enable it for the private network profile.

    11. Of course, if you wanted it to be enabled on all networks you would tick both boxes, but really that’s all there is to it.

    12. Meet the Firewall’s More Experienced Brother

    More experienced user will be pleased to find out about somewhat of a hidden gem, the Windows Firewall with Advanced Security. It allows you to manage the Windows Firewall with more fine grained control. You can do things such as block specific protocols, ports, programs or even a combination of the three. To open it open the start menu and type Windows Firewall with Advanced Security in the search box, then press enter.

    13. The Inbound and Outbound Rules are split up into two sections which you can navigate to from the Console Tree.

    14. We are going to be creating an inbound rule, so select Inbound Rules from the Console Tree. On the right hand side you will see a long list of Firewall rules appear.

    15. Its important to notice that there are duplicate rules which apply to the different firewall profiles.

    16. To create a rule right click on Inbound Rules in the Console Tree and select New Rule… from the context menu.

    17. Let’s create a custom rule so we can get a feel for all the options.

    18. The first part of the wizard asks if you want to create the rule for a specific program. This differs slightly from creating a rule for a program using the normal Windows Firewall as demonstrated earlier. Rather, what the wizard is saying is you are about to create an advanced rule such as opening port X, would you like all programs to be able to use port X or would you like to restrict the rule so that only certain programs can use port X? Since the rule we are creating is going to be system wide, leave this section at its defaults and click next.

    19. Now you have to configure the actual rule. This is the most important part of the entire wizard.

    20. Next we have the option of tying this rule to a network card by specifying a specific IP address. We want other computers to communicate with our PC regardless of which network card they contact, so we will leave that section blank and click next.

    21. The next section is critical as it asks you want this rule to actually do. You can Allow, Only allow it if the connection is using IPSec or you can simply block Inbound communication on the port we specified. We will go with allow, which is the default.

    22. Next you have to choose which firewall profiles this rule is going to apply to. We will allow communication on all networks except those marked as public.

    23. Finally, give your rule a name.

    That’s all there is to it, so now you know how to configure windows firewall.


      Current date/time is 20th July 2017, 13:37