Block All Ports
Hi, I have a WS08 R2 server, on one particular NIC I need to block everything incoming but allow tarffic on one specific port from one specific IP address, what is the best way to do this?
I've had a look at a custom inbound rule which I think I can use to block all incoming on the NIC but then dont know how to allow the one specific port incoming from one particular IP.
Thanks
Alan
June 21st, 2011 4:43pm
Hi,
Thanks for the post.
I don't think it is a great idea to block everyhing incoming, since there is some network port requirements for the Windows Server system. For more information, you could visit
http://support.microsoft.com/kb/832017
As for how to allow the one specific port incoming from one particular IP, you could refer to the following two articles:
http://technet.microsoft.com/en-us/library/dd759069.aspx
http://technet.microsoft.com/en-us/library/dd759125.aspx
Hope this helps.
MilesPlease remember to click Mark as Answer on the post that helps you, and to click Unmark as Answer if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread.
Free Windows Admin Tool Kit Click here and download it now
June 22nd, 2011 5:20am
Hi, this is a SAN based WS08 R2 server. Disabling all ports except for the iSCSI NICs to the virtualisation hosts is standard practice.
However, I replicate the SAn to a DR site so I need to use a NIC for this replication which is why I want to block everything incoming to it exept one port (139) from opne particular IP.
Thanks
June 22nd, 2011 5:26am
However, I replicate the SAn to a DR site so I need to use a NIC for
this replication which is why I want to block everything incoming to
it exept one port (139) from opne particular IP.
Why don't you just setup an IPSec port filtering policy ?
http://support.microsoft.com/kb/813878
http://support.microsoft.com/kb/313190
the idea is to start by adding a "blocking" filter operation
and then use the "block/allow" to create a stateless packet
filter which may fit your needs, otherwise, you may just use
the standard w2k8 advanced firewall rules to achieve the
same result - as an option you may use netsh to setup the
ruleset and manage it, see
http://support.microsoft.com/kb/947709
http://technet.microsoft.com/en-us/library/cc770887(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/cc771920(v=ws.10).aspx
for details
HTH
Free Windows Admin Tool Kit Click here and download it now
June 22nd, 2011 9:25am
I've blocked all incoming traffic on the NIC in question and as its this server making the communication to the DR replication server, I don;t need to make any exceptions as it's outgoing.
Problem sorted.
June 23rd, 2011 3:29am
I've blocked all incoming traffic on the NIC in question and as its this server making the communication to the DR replication server, I don;t need to make any exceptions as it's outgoing.
Problem sorted.
I think you missed the point, I wasn't suggesting to use IPsec to encrypt the traffic but just as a mean of "filtering" it, that is, to block ports :)
Free Windows Admin Tool Kit Click here and download it now
June 23rd, 2011 3:51am