SlideShare uma empresa Scribd logo
1 de 23
Baixar para ler offline
]
FIREWALL CONFIGURATION
Report by : Soban Ahmad (036)
Waqar-ul-Malik (050)
Section : A
Program : BS-SE
Date 1/18/16
Soban Ahmad (036) Firewall Configuration
Waqar-ul-Malik (050)
1 | P a g e
Computer Networks 1/18/2016
Table of Contents
Introduction..................................................................................................................................................2
Configuring Windows Firewall General Settings.........................................................................................2
System Model .........................................................................................................................................2
On (recommended)......................................................................................................................................2
Don't allow exceptions.................................................................................................................................2
Off (not recommended)...............................................................................................................................3
Practical Simulation ............................................................................................................................3
Requirements to perform this task .............................................................................................................3
To open Windows Security Center ..............................................................................................................3
To open Windows Firewall ..........................................................................................................................4
To configure Windows Firewall On with no exceptions mode...................................................................5
To disable Windows Firewall .......................................................................................................................5
Configuring Windows Firewall Exceptions ..................................................................................................6
Requirements to perform this task...............................................................................................................7
Configure Notifications.................................................................................................................................7
To configure notifications ............................................................................................................................8
Configure Exceptions for Programs .............................................................................................................8
To configure Windows Firewall Program Exceptions .................................................................................9
Configure Exceptions for Ports ..................................................................................................................13
To configure Windows Firewall Port Exceptions.......................................................................................13
To edit exceptions......................................................................................................................................15
Configuring Windows Firewall Advanced Settings ...................................................................................16
Requirements to perform this task ...........................................................................................................17
To open the Windows Firewall Advanced Settings...................................................................................17
Configure Network Connection Settings...................................................................................................17
To use Network Connection settings.........................................................................................................18
To configure Security Logging settings ......................................................................................................19
Configure ICMP Settings.............................................................................................................................20
Result & Conclusion ...................................................................................................................................21
Reference’s:................................................................................................................................................22
Soban Ahmad (036) Firewall Configuration
Waqar-ul-Malik (050)
2 | P a g e
Computer Networks 1/18/2016
How to Configure Windows Firewall on a Computer
Introduction
Windows Firewall is a new feature of Microsoft Windows XP Service Pack 2 (SP2) that is turned on by default.
It monitors and restricts the information that travels between your computer and a network such as the
Internet. Windows Firewall helps to provide a line of defense against someone who might try to access your
computer over a network without your permission. It also helps to block malicious software and worms and
provides a means to log security events.
Windows Firewall helps to protect your computer by blocking unsolicited traffic. Unsolicited traffic is any
attempt to communicate with your computer over a network connection that was not specifically requested
by programs running on your computer. Therefore programs such as Microsoft Internet Explorer or Outlook
Express will continue to operate successfully with Windows Firewall enabled.
This document describes how to configure Windows Firewall on a single computer if the recommended
default settings do not meet your requirements. For example, you might need to adjust settings if you use
a program that needs an open connection to the Internet, or if you connect your mobile computer to a
public network in a hotel or airport. This document focuses on:
 How to configure Windows Firewall General Settings
 How to configure Windows Firewall Exceptions
 How to configure Windows Firewall Advanced settings
Configuring Windows Firewall General Settings
System Model
The Windows Firewall general settings allow you to configure these options:
On (recommended).
This is the default setting (with Don't allow exceptions not selected).
Don't allow exceptions.
When this check box is selected, the firewall is placed into On with No Exceptions mode which
blocks all unsolicited requests to connect to your computer. This includes requests to programs or services
that you select on the Exceptions tab. Use the Don't allow exceptions setting when you need maximum
protection for your computer, such as when you connect to a public network in a hotel or airport, or when
a vulnerability is discovered and either you have not had time to download a hotfix for your computer or a
hotfix is unavailable.
After you have installed the latest operating system service packs and software updates, you can restore
normal Internet functionality by returning the operational mode to On with Don't allow exceptions cleared.
Soban Ahmad (036) Firewall Configuration
Waqar-ul-Malik (050)
3 | P a g e
Computer Networks 1/18/2016
Off (not recommended).
Turning off Windows Firewall might make your computer more vulnerable to damage from viruses, worms,
or intruders.
To modify the recommended Windows Firewall default general settings, perform these tasks:
 Open Windows Security Center
 Open Windows Firewall
 Configure Windows Firewall On with No Exceptions mode
 Disable Windows Firewall
 Verify Windows Firewall General settings are applied
Note: The steps to disable Windows Firewall are listed here but should only be performed by advanced
users for computer administration purposes, or if your computer is protected by another hardware or
software firewall.
Practical Simulation
Requirements to perform this task
 Credentials: You must be logged on as a member of the local Administrators group.
Open Windows Security Center
To open Windows Security Center
1. From the Windows XP SP2 desktop, click Start, and then click Control Panel.
Figure 1 The Control Panel
Soban Ahmad (036) Firewall Configuration
Waqar-ul-Malik (050)
4 | P a g e
Computer Networks 1/18/2016
2. In Control Panel, click Security Center.
Figure 2 The Windows Security Center
Open Window Firewall.
To open Windows Firewall
1. In Windows Security Center, under Manage security settings for, click Windows Firewall.
Figure 3 Windows Firewall
Soban Ahmad (036) Firewall Configuration
Waqar-ul-Malik (050)
5 | P a g e
Computer Networks 1/18/2016
Configure Windows Firewall On With No Exceptions
To configure Windows Firewall On with no exceptions mode
1. In the Windows Firewall dialog box, select the Don't allow exceptions check box.
Figure 4 Windows Firewall in On with no exceptions mode
2. Click OK.
Disable Windows Firewall
WARNING: Disabling Windows Firewall will expose your computer to the Internet, if no other firewall
exists. The setting discussed in this section should only be used by advanced users for computer
administration purposes, or if your computer is protected by another firewall.
To disable Windows Firewall
1. In Windows Security Center under Manage security settings for, click Windows Firewall.
2. In the Windows Firewall dialog box, click Off (not recommended).
Soban Ahmad (036) Firewall Configuration
Waqar-ul-Malik (050)
6 | P a g e
Computer Networks 1/18/2016
Figure 5 Disabling Windows Firewall
3. Click OK, then close Security Center, and then close Control Panel.
Verifying Windows Firewall General Settings Are Applied
When you verify Windows Firewall settings, some tabs and options in the Windows Firewall dialog box
might be unavailable depending on your configuration.
To verify Windows Firewall General settings are applied
1. From the Windows XP SP2 desktop, click Start, and then click Control Panel.
2. Under Pick a category, click Security Center.
3. Under Manage security settings for, click Windows Firewall.
4. Click the General tab and verify that your configuration is applied to Windows Firewall, and then
click OK.
Configuring Windows Firewall Exceptions
Because Windows Firewall restricts communication between your computer and the Internet, you might
have to adjust settings for some programs that require an open connection to the Internet. For any program
Soban Ahmad (036) Firewall Configuration
Waqar-ul-Malik (050)
7 | P a g e
Computer Networks 1/18/2016
on the Windows Firewall exceptions list, Windows opens the necessary connection automatically, regardless
of where the application is run from.
Note: The firewall designates that the connection is only open while the program is waiting to receive the
connection. All other times the port is closed.
The firewall designates that the port is only open while the program is waiting to receive the connection.
All other times the port is closed and your computer is secure from unsolicited requests.
To help minimize your security risk, if you must allow exceptions:
 Only allow an exception when you really need it.
 Never allow an exception for a program that you don't recognize.
 Remove an exception as soon as you no longer need it.
To enable Windows Firewall Exceptions, you must perform these tasks:
 Configure notifications
 Add Exceptions for Programs
 Add Exceptions for Ports
 Edit Exceptions
 Verify Windows Firewall Exceptions settings are applied
Requirements to perform this task
 Credentials: You must be logged on as a member of the local Administrators group.
Configure Notifications
By default, Windows Firewall displays a notification dialog box, similar to the one that appears in Figure 6,
whenever it blocks a program.
Figure 6 Windows Security Alert
The dialog indicates which program has been blocked and allows you to choose whether to allow this
program. The options available are:
 Keep Blocking. Use this option so the program won't connect without your permission.
 Unblock. Use this option to place the program in the Windows Firewall exceptions list.
 Ask me later. Use this option if you do not know whether to block or to unblock the program. This
option keeps the program blocked for greater security. This message appears again the next time
that this program is blocked.
Soban Ahmad (036) Firewall Configuration
Waqar-ul-Malik (050)
8 | P a g e
Computer Networks 1/18/2016
Complete these steps if you choose not to receive any notifications.
To configure notifications
1. In Security Center, under Manage security settings for, click Windows Firewall.
2. On the Exceptions tab, either clear or select Display a notification when Windows Firewall
blocks a program.
Figure 7 The Exceptions tab with notifications enabled
3. Click OK.
Configure Exceptions for Programs
You can configure exceptions to the default firewall setting, to allow unsolicited requests to connect to a
program on your computer. You can also be more specific about where the request is allowed to initiate
from by changing its scope.
A scope is an optional configuration that enables you to specify which computers can use the excepted
program on your computer. For home and small office networks, Microsoft recommends that you set the
scope to the local network only where you can do this. If you set the scope to the local network only,
computers on the same network can connect to the program on the computer. However, traffic that
originates from a remote computer is not allowed.
Soban Ahmad (036) Firewall Configuration
Waqar-ul-Malik (050)
9 | P a g e
Computer Networks 1/18/2016
If the program that you want to allow an exception for is not listed on the Exceptions tab, you can search
for it in the list of programs on your computer and then add it.
To configure Windows Firewall Program Exceptions
1. In the Windows Firewall dialog box, click the Exceptions tab.
Figure 8 Windows Firewall Exceptions list
Soban Ahmad (036) Firewall Configuration
Waqar-ul-Malik (050)
10 | P a g e
Computer Networks 1/18/2016
2. Under Programs and Services, select the check box for the program or service that you want to
allow, and then click OK.
3. If the program or service that you want to allow is not listed, click Add Program.
Figure 9 Add a Program
4. From the list, scroll to the program that you want to add, select it, and then click OK.
Note: If the program that you wish to add is not listed in the Add a Program box, click Browse. For
the steps to browse to a program, skip to step 8 in this procedure.
5. Click Change scope.
Note: Change scope is an optional configuration that enables you to specify which computers can
use the excepted program on your computer. If you do not need to set a scope, you can skip to
step 7.
Figure 10 Change Scope
Soban Ahmad (036) Firewall Configuration
Waqar-ul-Malik (050)
11 | P a g e
Computer Networks 1/18/2016
6. Specify the set of computers for which this program is unblocked, and then click OK.
Figure 11 Exceptions list with Messenger added
7. Click OK.
8. If the program that you want to allow is not listed in the Add a Program dialog box, click Add
Program and then click Browse.
Figure 12 Browsing for a program
Soban Ahmad (036) Firewall Configuration
Waqar-ul-Malik (050)
12 | P a g e
Computer Networks 1/18/2016
Programs are usually stored in the Program Files folder on your computer.
9. Browse to the program that you want to add, select it and then click Open.
Figure 13 A program added to the Add a Program dialog box
10. Click OK. The program will now appear in the Add a Program dialog box, under Programs.
Figure 14 The updated Exceptions list
Soban Ahmad (036) Firewall Configuration
Waqar-ul-Malik (050)
13 | P a g e
Computer Networks 1/18/2016
11. Click OK.
Configure Exceptions for Ports
You can configure exceptions to the default Windows Firewall settings, to allow unsolicited requests to
connect to a port. You can also be more specific about where the request is allowed to initiate by defining
scopes.
A port is like a small door in the firewall that allows communications to pass through. You must specify the
exact port number to open but remember to close it again as soon as you have finished using it or else it
will remain open indefinitely.
A scope is an optional configuration that enables you to specify which computers can use the excepted port
on your computer. For home and small office networks, Microsoft recommends that you set the scope to
the local network only where you can do this. If you set the scope to the local network only, computers on
the same network can connect to the port on the computer. However, traffic that originates from a remote
computer is not allowed.
It is better to add a program than it is to open a port because:
 You can do it easily.
 You do not have to know which port number to use.
 The firewall designates that the port is only open while the program waits to receive the connection.
All other times the port is closed and your computer is secure from unsolicited requests. However,
when a user opens a port manually, that port remains open even while the program is not using it.
Only advanced users should open ports for, and configure the scope of, individual connections. This
restriction minimizes opportunities for intruders to connect to a computer or network.
To configure Windows Firewall Port Exceptions
1. In the Windows Firewall dialog box, click the Exceptions tab.
Figure 15 Windows Firewall Exception list
Soban Ahmad (036) Firewall Configuration
Waqar-ul-Malik (050)
14 | P a g e
Computer Networks 1/18/2016
2. Click Add Port.
Figure 16 Add a Port
3. Type a name for the port you want to allow, type the port number, then indicate whether this is a
TCP or UDP port by clicking TCP or UDP.
4. Click Change scope.
Note: Change scope is an optional configuration that enables you to specify which computers can
use the excepted program on your computer. If you do not need to set a scope, you can skip to
step 6.
Figure 17 Change Scope
5. Specify the set of computers for which this port is unblocked, and then click OK.
6. Click OK.
Soban Ahmad (036) Firewall Configuration
Waqar-ul-Malik (050)
15 | P a g e
Computer Networks 1/18/2016
Edit Exceptions
You can edit any program or port exceptions on the Windows Firewall Exceptions tab.
To edit exceptions
1. In the Windows Firewall dialog box, click the Exceptions tab.
2. Under Programs or Services, select a program, a port, or a service exception and then click Edit.
If you chose to edit a program, in the Edit a Program dialog box, click Change scope, select the
options that you require and then click OKtwice.
Note: Change scope is an optional configuration that enables you to specify which computers can
use the excepted program on your computer.
Figure 18 Edit a Program
If you select a port in the Edit a Port dialog box make the necessary edits and then click OK.
Figure 19 Edit a Port
Soban Ahmad (036) Firewall Configuration
Waqar-ul-Malik (050)
16 | P a g e
Computer Networks 1/18/2016
If you select a service in the Edit a Service dialog box select any ports associated with the service
that you wish to open and then click OK.
Figure 20 Edit a Service
Verifying Windows Firewall Exceptions Settings Are Applied
When you verify Windows Firewall settings, some tabs and options in the Windows Firewall dialog box
might be unavailable depending on your configuration.
To verify Windows Firewall Exceptions settings are applied
1. From the Windows XP SP2 desktop, click Start, and then click Control Panel.
2. Under Pick a category, click Security Center.
3. Under Manage security settings for, click Windows Firewall.
4. Click the Exceptions tab and verify that your configuration is applied to Windows Firewall.
Configuring Windows Firewall Advanced Settings
On the Advanced tab in Windows Firewall there are several settings that you can configure. These settings
are divided into four sections:
 Network Connection Settings. Advanced users modify these to define Windows Firewall settings
for individual hardware connections that are available on a computer. For example, you could
configure Windows Firewall to block connections only if they were attempted by a device attached
to a USB port, and allow connections via your network card. The standard configuration on a
standalone computer is for the Firewall to have the same settings for every hardware connection
available.
 Security Logging. Advanced users can create a record of successful connections and unsuccessful
connection attempts across Windows Firewall. When you choose to log unsuccessful attempts,
information is collected about each connection attempt that is detected and blocked by Windows
Firewall.
When you choose to log successful connections, information is collected about each successful
connection that travels across the firewall. Together these create a log of all the transactions going
into and out of the computers environment.
Soban Ahmad (036) Firewall Configuration
Waqar-ul-Malik (050)
17 | P a g e
Computer Networks 1/18/2016
 ICMP. Advanced users can select which parts of Internet Control Message Protocol (ICMP) can be
used through Windows Firewall. To configure these settings requires in-depth knowledge of ICMP
mechanisms. Incorrect configuration of ICMP can seriously affect your computers security.
 Default Settings. Users with Administrator rights can use this option to restore Windows Firewall
settings to their original defaults settings.
Requirements to perform this task
 Credentials: You must log on as a member of the local Administrators group and have Windows
Firewall open.
Open Windows Firewall Advanced Settings
To open the Windows Firewall Advanced Settings
1. In the Windows Firewall dialog box, click the Advanced tab.
Figure 21 Windows Firewall Advanced settings
Configure Network Connection Settings
The default configuration for Windows Firewall is enabled for all connections. You can change this for
individual connections, and you can set a different configuration for each connection.
Soban Ahmad (036) Firewall Configuration
Waqar-ul-Malik (050)
18 | P a g e
Computer Networks 1/18/2016
For example, you might wish to disable email on your Internet connection, but allow email on your Local
Area Connection.
To use Network Connection settings
1. In Windows Firewall, on the Advanced tab, under Network Connection Settings, clear all
connections that you do not require Windows Firewall to protect.
2. Click to select the particular connection that you wish to change from the default firewall settings,
and then click Settings.
Figure 22 Windows Firewall Advanced settings per-network connection
3. Select or deselect the particular service that you wish to enable or disable for this connection.
4. If the service you wish to enable for this connection is not displayed, click Add.
Figure 23 Service Settings for a particular network connection
Soban Ahmad (036) Firewall Configuration
Waqar-ul-Malik (050)
19 | P a g e
Computer Networks 1/18/2016
5. Type the specific connection details into each of the fields for the service that you wish to enable,
and then click OK.
Note: For each service, you must supply a description for the service, the name or IP Address of
the computer that hosts the service, and the TCP or UDP internal and external ports used by the
service.
Configure Security Logging Settings
Windows Firewall can keep a log of successful connections that go through the firewall and any connections
that are blocked.
When you choose to log dropped packets, information is collected about each attempt to cross the firewall
that is detected and blocked. When you choose to log successful connections, information is collected
about each successful connection that travels across the firewall. For example, when your computer
successfully connects to a Web site using a Web browser, that connection is recorded in the log.
The security log has two sections:
 Header. This displays information about the version of the security log and the fields that are
available to enter information into.
 Body. This is the complete report of all of the information gathered and recorded about the traffic
across, or attempts to cross the firewall. The body of the security log is a dynamic list, which displays
new data entries at the bottom of the log.
To configure Security Logging settings
1. In Windows Firewall, on the Advanced tab, under Security Logging, click Settings.
Figure 24 Security Logging Settings
2. In the Log Settings dialog box, click Log dropped packets, to record all the connection attempts
rejected by your firewall, andLog successful connections, to record all the connection attempts
allowed by your firewall.
3. Type a path and name for your log, (pfirewall.log is the default).
Soban Ahmad (036) Firewall Configuration
Waqar-ul-Malik (050)
20 | P a g e
Computer Networks 1/18/2016
Note: You must ensure that you specify a secure location for your log to prevent any deliberate or
accidental modification.
4. Configure a size limit, such as 4096KB, to ensure that your log does not grow to an unmanageable
size, and then click OK.
Note: When your log reaches the size limit, it is renamed by having .old added to the end of the
log name. A new log file is created with the original log name and logging continues.
Configure ICMP Settings
The ICMP is used in networks to diagnose many network problems. For example, the ping utility uses ICMP
echo request and response messages to test connectivity between computers.
Windows XP SP2 is not capable of discovering whether the ICMP packets are being used for a genuine test
or are being used for malicious purposes. This is another reason not to change these settings unless you
are an advanced user.
With the ICMP settings in Windows Firewall, you can choose which control messages your computer
responds to.
Note: When you enable File and Printer Sharing on your Exceptions tab, the Allow incoming echo request
option is also enabled.
To configure ICMP options
1. In Windows Firewall on the Advanced tab, under ICMP, click Settings.
Figure 25 ICMP Settings
Soban Ahmad (036) Firewall Configuration
Waqar-ul-Malik (050)
21 | P a g e
Computer Networks 1/18/2016
2. Select the appropriate requests that you want your computer to respond to and then click OK.
Restore Windows Firewall Default Settings
This is a configuration option that allows you to restore all of the Windows Firewall settings to their original
defaults. This is important because Windows Firewall might have been configured to allow incoming
connections, either through adding applications or ports to the Windows Firewall exception list, that are no
longer necessary.
To use Restore Defaults
1. In Windows Firewall, on the Advanced tab, in the Default Settings section,
click Restore Defaults.
Figure 26 Restore Defaults Confirmation
2. In the Restore Defaults Confirmation dialog box, click Yes.
3. Click OK to close Windows Firewall settings.
Verifying Windows Firewall Advanced Settings Are Applied
When you verify Windows Firewall settings, some tabs and options in the Windows Firewall dialog box
might be unavailable depending on your configuration.
To verify Windows Firewall settings are applied
1. From the Windows XP SP2, click Start, and then click Control Panel.
2. Under Pick a category, click Security Center.
3. Under Manage security settings for, click Windows Firewall.
4. Click the Advanced tab and verify that your configuration is applied to Windows Firewall.
Result & Conclusion
In this report we have examined several Internet-centric firewall designs in an attempt to meet security and
performance requirements of multitier applications. In all scenarios, servers hosting application components
were separated from the company's corporate network used to conduct internal business, as an initial step
to segregate resources with different security requirements. To tightly control interactions between the
application's tiers, we looked at hosting tiers of the application on dedicated subnets. By deploying firewalls
in series, we were able to significantly increase the difficulty of obtaining unauthorized access to sensitive
resources from the Internet. At the same time, each firewall layer increased the design's complexity,
contributing to the cost of deploying and maintaining the infrastructure, and increasing the likelihood that
it will be misconfigured.
The network design appropriate for your environment depends on the nature of your application and the
risks that you are trying to mitigate by setting up a security perimeter around your servers. As we discussed,
relying on a single firewall or combining application tiers into a single subnet often decreases the amount
of control that you have over how application components are accessed.
Soban Ahmad (036) Firewall Configuration
Waqar-ul-Malik (050)
22 | P a g e
Computer Networks 1/18/2016
However, beware of jumping to a design that incorporates three firewalls in series without first considering
less expensive alternatives. In this article, we only touched upon some of the many ways of deploying
firewalls with respect to each other, and we did not to examine the relationship between firewalls and other
perimeter-defense devices. When designing your network, consider how other components of its perimeter,
such as intrusion-detection systems, routers, and VPNs, may impact security of the infrastructure, and select
a design that matches your application's architecture and your company's business needs.
_______*_______*_______*_______*_______*_______*_______*_______*/
Reference’s:
 https://www.digitalocean.com/community/tutorials
 http://www.hsc.fr/ressources/presentations/df/df022.html
 http://windows.microsoft.com/en-us/windows/turn-windows-firewall
 https://en.wikipedia.org/wiki/Windows_Firewall
 http://www.informit.com/articles/article.aspx?p=
 http://www.makeuseof.com/tag/manage-windows-firewall-windows-7-firewall-control
 https://www.rackspace.com/knowledge_center/article/ -firewall
 http://www.binisoft.org/wfc.php
 http://www.gfi.com/blog/how-to-solve-windows-firewall-error-code

Mais conteúdo relacionado

Mais procurados

Presentation3
Presentation3Presentation3
Presentation3lovindia
 
Advanced Internet Final
Advanced Internet FinalAdvanced Internet Final
Advanced Internet Finalmordannon
 
Remove chromium from computer
Remove chromium from computerRemove chromium from computer
Remove chromium from computerharoNaroum
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingDsunte Wilson
 
Tek systems it guidelines
Tek systems it  guidelinesTek systems it  guidelines
Tek systems it guidelinesgovsap_84
 
Cis 329 wk 6 quiz 2
Cis 329 wk 6 quiz 2Cis 329 wk 6 quiz 2
Cis 329 wk 6 quiz 2Laynevine
 
Enabling telnet on windows 7
Enabling telnet on windows 7Enabling telnet on windows 7
Enabling telnet on windows 7Ravi Kumar Lanke
 
How to remove Backdoor.Streamex
How to remove Backdoor.StreamexHow to remove Backdoor.Streamex
How to remove Backdoor.Streamexdeniallorance65
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint ProtectionMindRiver Group
 

Mais procurados (15)

Presentation3
Presentation3Presentation3
Presentation3
 
Advanced Internet Final
Advanced Internet FinalAdvanced Internet Final
Advanced Internet Final
 
Remove chromium from computer
Remove chromium from computerRemove chromium from computer
Remove chromium from computer
 
Presentation
PresentationPresentation
Presentation
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
 
Tek systems it guidelines
Tek systems it  guidelinesTek systems it  guidelines
Tek systems it guidelines
 
Romote PC Access
Romote PC Access Romote PC Access
Romote PC Access
 
Remove efishedo.info from Windows PCs
Remove efishedo.info from Windows PCsRemove efishedo.info from Windows PCs
Remove efishedo.info from Windows PCs
 
Cis 329 wk 6 quiz 2
Cis 329 wk 6 quiz 2Cis 329 wk 6 quiz 2
Cis 329 wk 6 quiz 2
 
Enabling telnet on windows 7
Enabling telnet on windows 7Enabling telnet on windows 7
Enabling telnet on windows 7
 
Virginiatools
VirginiatoolsVirginiatools
Virginiatools
 
Effective
EffectiveEffective
Effective
 
How to remove Backdoor.Streamex
How to remove Backdoor.StreamexHow to remove Backdoor.Streamex
How to remove Backdoor.Streamex
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint Protection
 
Huawei Wa1003a
Huawei Wa1003aHuawei Wa1003a
Huawei Wa1003a
 

Destaque

Destaque (16)

Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Firewall & its configurations
Firewall & its configurationsFirewall & its configurations
Firewall & its configurations
 
Security Onion: Watching for Leeks
Security Onion: Watching for LeeksSecurity Onion: Watching for Leeks
Security Onion: Watching for Leeks
 
Security Onion
Security OnionSecurity Onion
Security Onion
 
Intro to NSM with Security Onion - AusCERT
Intro to NSM with Security Onion - AusCERTIntro to NSM with Security Onion - AusCERT
Intro to NSM with Security Onion - AusCERT
 
Security Onion
Security OnionSecurity Onion
Security Onion
 
Suricata
SuricataSuricata
Suricata
 
Security Onion Conference - 2015
Security Onion Conference - 2015Security Onion Conference - 2015
Security Onion Conference - 2015
 
Osi Model
Osi ModelOsi Model
Osi Model
 
Windows 7 firewall & its configuration
Windows 7 firewall & its configurationWindows 7 firewall & its configuration
Windows 7 firewall & its configuration
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
Firewall
Firewall Firewall
Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall
FirewallFirewall
Firewall
 
FireWall
FireWallFireWall
FireWall
 

Semelhante a Windows Firewall & Its Configuration

Best Practices for Running Symantec Endpoint Protection 12.1 on Microsoft Azure
Best Practices for Running Symantec Endpoint Protection 12.1 on Microsoft Azure Best Practices for Running Symantec Endpoint Protection 12.1 on Microsoft Azure
Best Practices for Running Symantec Endpoint Protection 12.1 on Microsoft Azure Symantec
 
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docxeugeniadean34240
 
Host Based Security Best Practices
Host Based Security Best PracticesHost Based Security Best Practices
Host Based Security Best Practiceswebhostingguy
 
Taishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun Owens
 
Wfinf guide
Wfinf guideWfinf guide
Wfinf guideBABIS2
 
Wfinf guide
Wfinf guideWfinf guide
Wfinf guideBABIS2
 
so big ppt
so big pptso big ppt
so big pptcainem
 
so big
so bigso big
so bigcainem
 
TECHNICAL WHITE PAPER▶ Applying Data Center Security with VMware NSX
TECHNICAL WHITE PAPER▶ Applying Data Center Security with VMware NSXTECHNICAL WHITE PAPER▶ Applying Data Center Security with VMware NSX
TECHNICAL WHITE PAPER▶ Applying Data Center Security with VMware NSXSymantec
 
so big 22
so big 22so big 22
so big 22cainem
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Windows tuning guide_for_vspace
Windows tuning guide_for_vspaceWindows tuning guide_for_vspace
Windows tuning guide_for_vspacekaduger
 
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinalmordannon
 

Semelhante a Windows Firewall & Its Configuration (20)

Firewall intro
Firewall introFirewall intro
Firewall intro
 
Best Practices for Running Symantec Endpoint Protection 12.1 on Microsoft Azure
Best Practices for Running Symantec Endpoint Protection 12.1 on Microsoft Azure Best Practices for Running Symantec Endpoint Protection 12.1 on Microsoft Azure
Best Practices for Running Symantec Endpoint Protection 12.1 on Microsoft Azure
 
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
 
Host Based Security Best Practices
Host Based Security Best PracticesHost Based Security Best Practices
Host Based Security Best Practices
 
AltiGen Max In Sight Manual
AltiGen Max In Sight  ManualAltiGen Max In Sight  Manual
AltiGen Max In Sight Manual
 
Taishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_LabTaishaun_OwnensCNS-533_Lab
Taishaun_OwnensCNS-533_Lab
 
Wfinf guide
Wfinf guideWfinf guide
Wfinf guide
 
Wfinf guide
Wfinf guideWfinf guide
Wfinf guide
 
so big ppt
so big pptso big ppt
so big ppt
 
so big
so bigso big
so big
 
TECHNICAL WHITE PAPER▶ Applying Data Center Security with VMware NSX
TECHNICAL WHITE PAPER▶ Applying Data Center Security with VMware NSXTECHNICAL WHITE PAPER▶ Applying Data Center Security with VMware NSX
TECHNICAL WHITE PAPER▶ Applying Data Center Security with VMware NSX
 
Manual Sophos
Manual SophosManual Sophos
Manual Sophos
 
so big 22
so big 22so big 22
so big 22
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Windows tuning guide_for_vspace
Windows tuning guide_for_vspaceWindows tuning guide_for_vspace
Windows tuning guide_for_vspace
 
Note ex
Note exNote ex
Note ex
 
Total Security MAC User Guide
Total Security MAC User GuideTotal Security MAC User Guide
Total Security MAC User Guide
 
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinal
 
10 security enhancements
10 security enhancements10 security enhancements
10 security enhancements
 
MobileXPRT 2015 User Manual
MobileXPRT 2015 User ManualMobileXPRT 2015 User Manual
MobileXPRT 2015 User Manual
 

Mais de Soban Ahmad

Online Loan Application & Its Verification System
Online Loan Application & Its Verification SystemOnline Loan Application & Its Verification System
Online Loan Application & Its Verification SystemSoban Ahmad
 
The Karnaugh Map
The Karnaugh MapThe Karnaugh Map
The Karnaugh MapSoban Ahmad
 
Online Loan Management System
Online Loan Management SystemOnline Loan Management System
Online Loan Management SystemSoban Ahmad
 
Advertisment Ethics
Advertisment EthicsAdvertisment Ethics
Advertisment EthicsSoban Ahmad
 
The 7 c,s of communication
The 7 c,s of communicationThe 7 c,s of communication
The 7 c,s of communicationSoban Ahmad
 
Water crisis in pakistan & its solutions
Water crisis in pakistan & its solutionsWater crisis in pakistan & its solutions
Water crisis in pakistan & its solutionsSoban Ahmad
 

Mais de Soban Ahmad (7)

Online Loan Application & Its Verification System
Online Loan Application & Its Verification SystemOnline Loan Application & Its Verification System
Online Loan Application & Its Verification System
 
The Karnaugh Map
The Karnaugh MapThe Karnaugh Map
The Karnaugh Map
 
Online Loan Management System
Online Loan Management SystemOnline Loan Management System
Online Loan Management System
 
Advertisment Ethics
Advertisment EthicsAdvertisment Ethics
Advertisment Ethics
 
Report writing
Report writingReport writing
Report writing
 
The 7 c,s of communication
The 7 c,s of communicationThe 7 c,s of communication
The 7 c,s of communication
 
Water crisis in pakistan & its solutions
Water crisis in pakistan & its solutionsWater crisis in pakistan & its solutions
Water crisis in pakistan & its solutions
 

Último

Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...SelfMade bd
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyAnusha Are
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxalwaysnagaraju26
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park masabamasaba
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedDelhi Call girls
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfkalichargn70th171
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...Nitya salvi
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfVishalKumarJha10
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 

Último (20)

Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
Pharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodologyPharm-D Biostatistics and Research methodology
Pharm-D Biostatistics and Research methodology
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptxBUS PASS MANGEMENT SYSTEM USING PHP.pptx
BUS PASS MANGEMENT SYSTEM USING PHP.pptx
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...Chinsurah Escorts ☎️8617697112  Starting From 5K to 15K High Profile Escorts ...
Chinsurah Escorts ☎️8617697112 Starting From 5K to 15K High Profile Escorts ...
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdfintroduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
introduction-to-automotive Andoid os-csimmonds-ndctechtown-2021.pdf
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 

Windows Firewall & Its Configuration

  • 1. ] FIREWALL CONFIGURATION Report by : Soban Ahmad (036) Waqar-ul-Malik (050) Section : A Program : BS-SE Date 1/18/16
  • 2. Soban Ahmad (036) Firewall Configuration Waqar-ul-Malik (050) 1 | P a g e Computer Networks 1/18/2016 Table of Contents Introduction..................................................................................................................................................2 Configuring Windows Firewall General Settings.........................................................................................2 System Model .........................................................................................................................................2 On (recommended)......................................................................................................................................2 Don't allow exceptions.................................................................................................................................2 Off (not recommended)...............................................................................................................................3 Practical Simulation ............................................................................................................................3 Requirements to perform this task .............................................................................................................3 To open Windows Security Center ..............................................................................................................3 To open Windows Firewall ..........................................................................................................................4 To configure Windows Firewall On with no exceptions mode...................................................................5 To disable Windows Firewall .......................................................................................................................5 Configuring Windows Firewall Exceptions ..................................................................................................6 Requirements to perform this task...............................................................................................................7 Configure Notifications.................................................................................................................................7 To configure notifications ............................................................................................................................8 Configure Exceptions for Programs .............................................................................................................8 To configure Windows Firewall Program Exceptions .................................................................................9 Configure Exceptions for Ports ..................................................................................................................13 To configure Windows Firewall Port Exceptions.......................................................................................13 To edit exceptions......................................................................................................................................15 Configuring Windows Firewall Advanced Settings ...................................................................................16 Requirements to perform this task ...........................................................................................................17 To open the Windows Firewall Advanced Settings...................................................................................17 Configure Network Connection Settings...................................................................................................17 To use Network Connection settings.........................................................................................................18 To configure Security Logging settings ......................................................................................................19 Configure ICMP Settings.............................................................................................................................20 Result & Conclusion ...................................................................................................................................21 Reference’s:................................................................................................................................................22
  • 3. Soban Ahmad (036) Firewall Configuration Waqar-ul-Malik (050) 2 | P a g e Computer Networks 1/18/2016 How to Configure Windows Firewall on a Computer Introduction Windows Firewall is a new feature of Microsoft Windows XP Service Pack 2 (SP2) that is turned on by default. It monitors and restricts the information that travels between your computer and a network such as the Internet. Windows Firewall helps to provide a line of defense against someone who might try to access your computer over a network without your permission. It also helps to block malicious software and worms and provides a means to log security events. Windows Firewall helps to protect your computer by blocking unsolicited traffic. Unsolicited traffic is any attempt to communicate with your computer over a network connection that was not specifically requested by programs running on your computer. Therefore programs such as Microsoft Internet Explorer or Outlook Express will continue to operate successfully with Windows Firewall enabled. This document describes how to configure Windows Firewall on a single computer if the recommended default settings do not meet your requirements. For example, you might need to adjust settings if you use a program that needs an open connection to the Internet, or if you connect your mobile computer to a public network in a hotel or airport. This document focuses on:  How to configure Windows Firewall General Settings  How to configure Windows Firewall Exceptions  How to configure Windows Firewall Advanced settings Configuring Windows Firewall General Settings System Model The Windows Firewall general settings allow you to configure these options: On (recommended). This is the default setting (with Don't allow exceptions not selected). Don't allow exceptions. When this check box is selected, the firewall is placed into On with No Exceptions mode which blocks all unsolicited requests to connect to your computer. This includes requests to programs or services that you select on the Exceptions tab. Use the Don't allow exceptions setting when you need maximum protection for your computer, such as when you connect to a public network in a hotel or airport, or when a vulnerability is discovered and either you have not had time to download a hotfix for your computer or a hotfix is unavailable. After you have installed the latest operating system service packs and software updates, you can restore normal Internet functionality by returning the operational mode to On with Don't allow exceptions cleared.
  • 4. Soban Ahmad (036) Firewall Configuration Waqar-ul-Malik (050) 3 | P a g e Computer Networks 1/18/2016 Off (not recommended). Turning off Windows Firewall might make your computer more vulnerable to damage from viruses, worms, or intruders. To modify the recommended Windows Firewall default general settings, perform these tasks:  Open Windows Security Center  Open Windows Firewall  Configure Windows Firewall On with No Exceptions mode  Disable Windows Firewall  Verify Windows Firewall General settings are applied Note: The steps to disable Windows Firewall are listed here but should only be performed by advanced users for computer administration purposes, or if your computer is protected by another hardware or software firewall. Practical Simulation Requirements to perform this task  Credentials: You must be logged on as a member of the local Administrators group. Open Windows Security Center To open Windows Security Center 1. From the Windows XP SP2 desktop, click Start, and then click Control Panel. Figure 1 The Control Panel
  • 5. Soban Ahmad (036) Firewall Configuration Waqar-ul-Malik (050) 4 | P a g e Computer Networks 1/18/2016 2. In Control Panel, click Security Center. Figure 2 The Windows Security Center Open Window Firewall. To open Windows Firewall 1. In Windows Security Center, under Manage security settings for, click Windows Firewall. Figure 3 Windows Firewall
  • 6. Soban Ahmad (036) Firewall Configuration Waqar-ul-Malik (050) 5 | P a g e Computer Networks 1/18/2016 Configure Windows Firewall On With No Exceptions To configure Windows Firewall On with no exceptions mode 1. In the Windows Firewall dialog box, select the Don't allow exceptions check box. Figure 4 Windows Firewall in On with no exceptions mode 2. Click OK. Disable Windows Firewall WARNING: Disabling Windows Firewall will expose your computer to the Internet, if no other firewall exists. The setting discussed in this section should only be used by advanced users for computer administration purposes, or if your computer is protected by another firewall. To disable Windows Firewall 1. In Windows Security Center under Manage security settings for, click Windows Firewall. 2. In the Windows Firewall dialog box, click Off (not recommended).
  • 7. Soban Ahmad (036) Firewall Configuration Waqar-ul-Malik (050) 6 | P a g e Computer Networks 1/18/2016 Figure 5 Disabling Windows Firewall 3. Click OK, then close Security Center, and then close Control Panel. Verifying Windows Firewall General Settings Are Applied When you verify Windows Firewall settings, some tabs and options in the Windows Firewall dialog box might be unavailable depending on your configuration. To verify Windows Firewall General settings are applied 1. From the Windows XP SP2 desktop, click Start, and then click Control Panel. 2. Under Pick a category, click Security Center. 3. Under Manage security settings for, click Windows Firewall. 4. Click the General tab and verify that your configuration is applied to Windows Firewall, and then click OK. Configuring Windows Firewall Exceptions Because Windows Firewall restricts communication between your computer and the Internet, you might have to adjust settings for some programs that require an open connection to the Internet. For any program
  • 8. Soban Ahmad (036) Firewall Configuration Waqar-ul-Malik (050) 7 | P a g e Computer Networks 1/18/2016 on the Windows Firewall exceptions list, Windows opens the necessary connection automatically, regardless of where the application is run from. Note: The firewall designates that the connection is only open while the program is waiting to receive the connection. All other times the port is closed. The firewall designates that the port is only open while the program is waiting to receive the connection. All other times the port is closed and your computer is secure from unsolicited requests. To help minimize your security risk, if you must allow exceptions:  Only allow an exception when you really need it.  Never allow an exception for a program that you don't recognize.  Remove an exception as soon as you no longer need it. To enable Windows Firewall Exceptions, you must perform these tasks:  Configure notifications  Add Exceptions for Programs  Add Exceptions for Ports  Edit Exceptions  Verify Windows Firewall Exceptions settings are applied Requirements to perform this task  Credentials: You must be logged on as a member of the local Administrators group. Configure Notifications By default, Windows Firewall displays a notification dialog box, similar to the one that appears in Figure 6, whenever it blocks a program. Figure 6 Windows Security Alert The dialog indicates which program has been blocked and allows you to choose whether to allow this program. The options available are:  Keep Blocking. Use this option so the program won't connect without your permission.  Unblock. Use this option to place the program in the Windows Firewall exceptions list.  Ask me later. Use this option if you do not know whether to block or to unblock the program. This option keeps the program blocked for greater security. This message appears again the next time that this program is blocked.
  • 9. Soban Ahmad (036) Firewall Configuration Waqar-ul-Malik (050) 8 | P a g e Computer Networks 1/18/2016 Complete these steps if you choose not to receive any notifications. To configure notifications 1. In Security Center, under Manage security settings for, click Windows Firewall. 2. On the Exceptions tab, either clear or select Display a notification when Windows Firewall blocks a program. Figure 7 The Exceptions tab with notifications enabled 3. Click OK. Configure Exceptions for Programs You can configure exceptions to the default firewall setting, to allow unsolicited requests to connect to a program on your computer. You can also be more specific about where the request is allowed to initiate from by changing its scope. A scope is an optional configuration that enables you to specify which computers can use the excepted program on your computer. For home and small office networks, Microsoft recommends that you set the scope to the local network only where you can do this. If you set the scope to the local network only, computers on the same network can connect to the program on the computer. However, traffic that originates from a remote computer is not allowed.
  • 10. Soban Ahmad (036) Firewall Configuration Waqar-ul-Malik (050) 9 | P a g e Computer Networks 1/18/2016 If the program that you want to allow an exception for is not listed on the Exceptions tab, you can search for it in the list of programs on your computer and then add it. To configure Windows Firewall Program Exceptions 1. In the Windows Firewall dialog box, click the Exceptions tab. Figure 8 Windows Firewall Exceptions list
  • 11. Soban Ahmad (036) Firewall Configuration Waqar-ul-Malik (050) 10 | P a g e Computer Networks 1/18/2016 2. Under Programs and Services, select the check box for the program or service that you want to allow, and then click OK. 3. If the program or service that you want to allow is not listed, click Add Program. Figure 9 Add a Program 4. From the list, scroll to the program that you want to add, select it, and then click OK. Note: If the program that you wish to add is not listed in the Add a Program box, click Browse. For the steps to browse to a program, skip to step 8 in this procedure. 5. Click Change scope. Note: Change scope is an optional configuration that enables you to specify which computers can use the excepted program on your computer. If you do not need to set a scope, you can skip to step 7. Figure 10 Change Scope
  • 12. Soban Ahmad (036) Firewall Configuration Waqar-ul-Malik (050) 11 | P a g e Computer Networks 1/18/2016 6. Specify the set of computers for which this program is unblocked, and then click OK. Figure 11 Exceptions list with Messenger added 7. Click OK. 8. If the program that you want to allow is not listed in the Add a Program dialog box, click Add Program and then click Browse. Figure 12 Browsing for a program
  • 13. Soban Ahmad (036) Firewall Configuration Waqar-ul-Malik (050) 12 | P a g e Computer Networks 1/18/2016 Programs are usually stored in the Program Files folder on your computer. 9. Browse to the program that you want to add, select it and then click Open. Figure 13 A program added to the Add a Program dialog box 10. Click OK. The program will now appear in the Add a Program dialog box, under Programs. Figure 14 The updated Exceptions list
  • 14. Soban Ahmad (036) Firewall Configuration Waqar-ul-Malik (050) 13 | P a g e Computer Networks 1/18/2016 11. Click OK. Configure Exceptions for Ports You can configure exceptions to the default Windows Firewall settings, to allow unsolicited requests to connect to a port. You can also be more specific about where the request is allowed to initiate by defining scopes. A port is like a small door in the firewall that allows communications to pass through. You must specify the exact port number to open but remember to close it again as soon as you have finished using it or else it will remain open indefinitely. A scope is an optional configuration that enables you to specify which computers can use the excepted port on your computer. For home and small office networks, Microsoft recommends that you set the scope to the local network only where you can do this. If you set the scope to the local network only, computers on the same network can connect to the port on the computer. However, traffic that originates from a remote computer is not allowed. It is better to add a program than it is to open a port because:  You can do it easily.  You do not have to know which port number to use.  The firewall designates that the port is only open while the program waits to receive the connection. All other times the port is closed and your computer is secure from unsolicited requests. However, when a user opens a port manually, that port remains open even while the program is not using it. Only advanced users should open ports for, and configure the scope of, individual connections. This restriction minimizes opportunities for intruders to connect to a computer or network. To configure Windows Firewall Port Exceptions 1. In the Windows Firewall dialog box, click the Exceptions tab. Figure 15 Windows Firewall Exception list
  • 15. Soban Ahmad (036) Firewall Configuration Waqar-ul-Malik (050) 14 | P a g e Computer Networks 1/18/2016 2. Click Add Port. Figure 16 Add a Port 3. Type a name for the port you want to allow, type the port number, then indicate whether this is a TCP or UDP port by clicking TCP or UDP. 4. Click Change scope. Note: Change scope is an optional configuration that enables you to specify which computers can use the excepted program on your computer. If you do not need to set a scope, you can skip to step 6. Figure 17 Change Scope 5. Specify the set of computers for which this port is unblocked, and then click OK. 6. Click OK.
  • 16. Soban Ahmad (036) Firewall Configuration Waqar-ul-Malik (050) 15 | P a g e Computer Networks 1/18/2016 Edit Exceptions You can edit any program or port exceptions on the Windows Firewall Exceptions tab. To edit exceptions 1. In the Windows Firewall dialog box, click the Exceptions tab. 2. Under Programs or Services, select a program, a port, or a service exception and then click Edit. If you chose to edit a program, in the Edit a Program dialog box, click Change scope, select the options that you require and then click OKtwice. Note: Change scope is an optional configuration that enables you to specify which computers can use the excepted program on your computer. Figure 18 Edit a Program If you select a port in the Edit a Port dialog box make the necessary edits and then click OK. Figure 19 Edit a Port
  • 17. Soban Ahmad (036) Firewall Configuration Waqar-ul-Malik (050) 16 | P a g e Computer Networks 1/18/2016 If you select a service in the Edit a Service dialog box select any ports associated with the service that you wish to open and then click OK. Figure 20 Edit a Service Verifying Windows Firewall Exceptions Settings Are Applied When you verify Windows Firewall settings, some tabs and options in the Windows Firewall dialog box might be unavailable depending on your configuration. To verify Windows Firewall Exceptions settings are applied 1. From the Windows XP SP2 desktop, click Start, and then click Control Panel. 2. Under Pick a category, click Security Center. 3. Under Manage security settings for, click Windows Firewall. 4. Click the Exceptions tab and verify that your configuration is applied to Windows Firewall. Configuring Windows Firewall Advanced Settings On the Advanced tab in Windows Firewall there are several settings that you can configure. These settings are divided into four sections:  Network Connection Settings. Advanced users modify these to define Windows Firewall settings for individual hardware connections that are available on a computer. For example, you could configure Windows Firewall to block connections only if they were attempted by a device attached to a USB port, and allow connections via your network card. The standard configuration on a standalone computer is for the Firewall to have the same settings for every hardware connection available.  Security Logging. Advanced users can create a record of successful connections and unsuccessful connection attempts across Windows Firewall. When you choose to log unsuccessful attempts, information is collected about each connection attempt that is detected and blocked by Windows Firewall. When you choose to log successful connections, information is collected about each successful connection that travels across the firewall. Together these create a log of all the transactions going into and out of the computers environment.
  • 18. Soban Ahmad (036) Firewall Configuration Waqar-ul-Malik (050) 17 | P a g e Computer Networks 1/18/2016  ICMP. Advanced users can select which parts of Internet Control Message Protocol (ICMP) can be used through Windows Firewall. To configure these settings requires in-depth knowledge of ICMP mechanisms. Incorrect configuration of ICMP can seriously affect your computers security.  Default Settings. Users with Administrator rights can use this option to restore Windows Firewall settings to their original defaults settings. Requirements to perform this task  Credentials: You must log on as a member of the local Administrators group and have Windows Firewall open. Open Windows Firewall Advanced Settings To open the Windows Firewall Advanced Settings 1. In the Windows Firewall dialog box, click the Advanced tab. Figure 21 Windows Firewall Advanced settings Configure Network Connection Settings The default configuration for Windows Firewall is enabled for all connections. You can change this for individual connections, and you can set a different configuration for each connection.
  • 19. Soban Ahmad (036) Firewall Configuration Waqar-ul-Malik (050) 18 | P a g e Computer Networks 1/18/2016 For example, you might wish to disable email on your Internet connection, but allow email on your Local Area Connection. To use Network Connection settings 1. In Windows Firewall, on the Advanced tab, under Network Connection Settings, clear all connections that you do not require Windows Firewall to protect. 2. Click to select the particular connection that you wish to change from the default firewall settings, and then click Settings. Figure 22 Windows Firewall Advanced settings per-network connection 3. Select or deselect the particular service that you wish to enable or disable for this connection. 4. If the service you wish to enable for this connection is not displayed, click Add. Figure 23 Service Settings for a particular network connection
  • 20. Soban Ahmad (036) Firewall Configuration Waqar-ul-Malik (050) 19 | P a g e Computer Networks 1/18/2016 5. Type the specific connection details into each of the fields for the service that you wish to enable, and then click OK. Note: For each service, you must supply a description for the service, the name or IP Address of the computer that hosts the service, and the TCP or UDP internal and external ports used by the service. Configure Security Logging Settings Windows Firewall can keep a log of successful connections that go through the firewall and any connections that are blocked. When you choose to log dropped packets, information is collected about each attempt to cross the firewall that is detected and blocked. When you choose to log successful connections, information is collected about each successful connection that travels across the firewall. For example, when your computer successfully connects to a Web site using a Web browser, that connection is recorded in the log. The security log has two sections:  Header. This displays information about the version of the security log and the fields that are available to enter information into.  Body. This is the complete report of all of the information gathered and recorded about the traffic across, or attempts to cross the firewall. The body of the security log is a dynamic list, which displays new data entries at the bottom of the log. To configure Security Logging settings 1. In Windows Firewall, on the Advanced tab, under Security Logging, click Settings. Figure 24 Security Logging Settings 2. In the Log Settings dialog box, click Log dropped packets, to record all the connection attempts rejected by your firewall, andLog successful connections, to record all the connection attempts allowed by your firewall. 3. Type a path and name for your log, (pfirewall.log is the default).
  • 21. Soban Ahmad (036) Firewall Configuration Waqar-ul-Malik (050) 20 | P a g e Computer Networks 1/18/2016 Note: You must ensure that you specify a secure location for your log to prevent any deliberate or accidental modification. 4. Configure a size limit, such as 4096KB, to ensure that your log does not grow to an unmanageable size, and then click OK. Note: When your log reaches the size limit, it is renamed by having .old added to the end of the log name. A new log file is created with the original log name and logging continues. Configure ICMP Settings The ICMP is used in networks to diagnose many network problems. For example, the ping utility uses ICMP echo request and response messages to test connectivity between computers. Windows XP SP2 is not capable of discovering whether the ICMP packets are being used for a genuine test or are being used for malicious purposes. This is another reason not to change these settings unless you are an advanced user. With the ICMP settings in Windows Firewall, you can choose which control messages your computer responds to. Note: When you enable File and Printer Sharing on your Exceptions tab, the Allow incoming echo request option is also enabled. To configure ICMP options 1. In Windows Firewall on the Advanced tab, under ICMP, click Settings. Figure 25 ICMP Settings
  • 22. Soban Ahmad (036) Firewall Configuration Waqar-ul-Malik (050) 21 | P a g e Computer Networks 1/18/2016 2. Select the appropriate requests that you want your computer to respond to and then click OK. Restore Windows Firewall Default Settings This is a configuration option that allows you to restore all of the Windows Firewall settings to their original defaults. This is important because Windows Firewall might have been configured to allow incoming connections, either through adding applications or ports to the Windows Firewall exception list, that are no longer necessary. To use Restore Defaults 1. In Windows Firewall, on the Advanced tab, in the Default Settings section, click Restore Defaults. Figure 26 Restore Defaults Confirmation 2. In the Restore Defaults Confirmation dialog box, click Yes. 3. Click OK to close Windows Firewall settings. Verifying Windows Firewall Advanced Settings Are Applied When you verify Windows Firewall settings, some tabs and options in the Windows Firewall dialog box might be unavailable depending on your configuration. To verify Windows Firewall settings are applied 1. From the Windows XP SP2, click Start, and then click Control Panel. 2. Under Pick a category, click Security Center. 3. Under Manage security settings for, click Windows Firewall. 4. Click the Advanced tab and verify that your configuration is applied to Windows Firewall. Result & Conclusion In this report we have examined several Internet-centric firewall designs in an attempt to meet security and performance requirements of multitier applications. In all scenarios, servers hosting application components were separated from the company's corporate network used to conduct internal business, as an initial step to segregate resources with different security requirements. To tightly control interactions between the application's tiers, we looked at hosting tiers of the application on dedicated subnets. By deploying firewalls in series, we were able to significantly increase the difficulty of obtaining unauthorized access to sensitive resources from the Internet. At the same time, each firewall layer increased the design's complexity, contributing to the cost of deploying and maintaining the infrastructure, and increasing the likelihood that it will be misconfigured. The network design appropriate for your environment depends on the nature of your application and the risks that you are trying to mitigate by setting up a security perimeter around your servers. As we discussed, relying on a single firewall or combining application tiers into a single subnet often decreases the amount of control that you have over how application components are accessed.
  • 23. Soban Ahmad (036) Firewall Configuration Waqar-ul-Malik (050) 22 | P a g e Computer Networks 1/18/2016 However, beware of jumping to a design that incorporates three firewalls in series without first considering less expensive alternatives. In this article, we only touched upon some of the many ways of deploying firewalls with respect to each other, and we did not to examine the relationship between firewalls and other perimeter-defense devices. When designing your network, consider how other components of its perimeter, such as intrusion-detection systems, routers, and VPNs, may impact security of the infrastructure, and select a design that matches your application's architecture and your company's business needs. _______*_______*_______*_______*_______*_______*_______*_______*/ Reference’s:  https://www.digitalocean.com/community/tutorials  http://www.hsc.fr/ressources/presentations/df/df022.html  http://windows.microsoft.com/en-us/windows/turn-windows-firewall  https://en.wikipedia.org/wiki/Windows_Firewall  http://www.informit.com/articles/article.aspx?p=  http://www.makeuseof.com/tag/manage-windows-firewall-windows-7-firewall-control  https://www.rackspace.com/knowledge_center/article/ -firewall  http://www.binisoft.org/wfc.php  http://www.gfi.com/blog/how-to-solve-windows-firewall-error-code