Block All Ports
Hi, I have a WS08 R2 server, on one particular NIC I need to block everything incoming but allow tarffic on one specific port from one specific IP address, what is the best way to do this? I've had a look at a custom inbound rule which I think I can use to block all incoming on the NIC but then dont know how to allow the one specific port incoming from one particular IP. Thanks Alan
June 21st, 2011 4:43pm

Hi, Thanks for the post. I don't think it is a great idea to block everyhing incoming, since there is some network port requirements for the Windows Server system. For more information, you could visit http://support.microsoft.com/kb/832017 As for how to allow the one specific port incoming from one particular IP, you could refer to the following two articles: http://technet.microsoft.com/en-us/library/dd759069.aspx http://technet.microsoft.com/en-us/library/dd759125.aspx Hope this helps. MilesPlease remember to click Mark as Answer on the post that helps you, and to click Unmark as Answer if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread.
Free Windows Admin Tool Kit Click here and download it now
June 22nd, 2011 5:20am

Hi, this is a SAN based WS08 R2 server. Disabling all ports except for the iSCSI NICs to the virtualisation hosts is standard practice. However, I replicate the SAn to a DR site so I need to use a NIC for this replication which is why I want to block everything incoming to it exept one port (139) from opne particular IP. Thanks
June 22nd, 2011 5:26am

However, I replicate the SAn to a DR site so I need to use a NIC for this replication which is why I want to block everything incoming to it exept one port (139) from opne particular IP. Why don't you just setup an IPSec port filtering policy ? http://support.microsoft.com/kb/813878 http://support.microsoft.com/kb/313190 the idea is to start by adding a "blocking" filter operation and then use the "block/allow" to create a stateless packet filter which may fit your needs, otherwise, you may just use the standard w2k8 advanced firewall rules to achieve the same result - as an option you may use netsh to setup the ruleset and manage it, see http://support.microsoft.com/kb/947709 http://technet.microsoft.com/en-us/library/cc770887(v=ws.10).aspx http://technet.microsoft.com/en-us/library/cc771920(v=ws.10).aspx for details HTH
Free Windows Admin Tool Kit Click here and download it now
June 22nd, 2011 9:25am

I've blocked all incoming traffic on the NIC in question and as its this server making the communication to the DR replication server, I don;t need to make any exceptions as it's outgoing. Problem sorted.
June 23rd, 2011 3:29am

I've blocked all incoming traffic on the NIC in question and as its this server making the communication to the DR replication server, I don;t need to make any exceptions as it's outgoing. Problem sorted. I think you missed the point, I wasn't suggesting to use IPsec to encrypt the traffic but just as a mean of "filtering" it, that is, to block ports :)
Free Windows Admin Tool Kit Click here and download it now
June 23rd, 2011 3:51am

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics