IT tutorials
 
Technology
 

Windows Server 2012 : Configuring Windows Firewall with Advanced Security (part 5) - Configuring firewall rules - Types of firewall rules, Rules processing, Rule groups

10/13/2014 9:35:54 PM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

Configuring firewall rules

The core functionality of Windows Firewall with Advanced Security is expressed by rules. A rule is basically a set of criteria that determines whether a network packet should be handled. The two basic types of rules you can configure in Windows Firewall with Advanced Security are

  • Firewall rule A set of criteria that specifies whether a particular type of traffic passing between the local computer and other computers on the network should be accepted (passed) or rejected (blocked).

  • Connection security rule A set of criteria that specifies how traffic passing between the local computer and other computers on the network should be protected using IPsec.


Types of firewall rules

As Figure 5 shows, you can use Windows Firewall with Advanced Security to configure two types of firewall rules:

  • Inbound rule A rule that specifies how incoming network traffic should be handled—that is, traffic originating from other computers and having the local computer as its destination.

  • Outbound rule A rule that specifies how outgoing network traffic should be handled—that is, traffic originating from the local computer and having other computers or network devices as its destination.

Firewall rules can be either inbound or outbound.
Figure 5. Firewall rules can be either inbound or outbound.

Both inbound and outbound rules can be configured to either allow (permit) or deny (block) traffic based on the criteria contained in the rule. Because there are many types of network traffic possible, Windows Firewall with Advanced Security also has special rules called default rules that determine how traffic should be handled when it doesn’t match any of the criteria contained in any of the inbound and outbound rules. Unless otherwise configured by the system’s administrator, the default rules for all three firewall profiles are as follows:

  • Inbound default rule Block all traffic originating from other computers and having the local computer as its destination.

  • Outbound default rule Allow all traffic originating from the local computer and having other computers or network devices as its destination.

The inbound and outbound default rules for each firewall profile can be configured on the corresponding tab of the properties sheet of the root node in the Windows Firewall with Advanced Security snap-in. 

Rules processing

When a packet of network traffic is processed by Windows Firewall with Advanced Security, one or more rules might apply to that particular packet. Figure 6 shows that the order in which rules are applied to both inbound and outbound traffic is as follows:

  1. Any rules that allow traffic that would otherwise be blocked are applied first.  If the packet matches such a rule, the rule is applied and rules processing stops at this point.

  2. Rules that explicitly block traffic are applied second. If the packet matches such a rule, the rule is applied and rules processing stops at this point.

  3. Rules that explicitly allow traffic are applied third. If the packet matches such a rule, the rule is applied and rules processing stops at this point.

  4. The default rule is applied last.

When firewall rules are processed by Windows Firewall with Advanced Security, as soon as a packet matches a rule, the rule is applied and rules processing stops at that point. For example, if a block rule (described in step 2) blocks a particular type of packet, an allow rule (described in step 3) for the same type of packet would not be applied because allow rules have a lower priority than block rules. So the net result is to block that particular type of packet.

The order in which Windows Firewall with Advanced Security processes rules.
Figure 6. The order in which Windows Firewall with Advanced Security processes rules.

Rule groups

Windows Firewall with Advanced Security includes a number of predefined inbound and outbound rules. These rules are used for filtering the different types of traffic associated with different Windows features and services. As Figure 7 shows, these predefined rules are grouped together into rule groups. Each rule group contains one or more rules used to control traffic for a particular Windows feature or service. For example, the Windows Remote Management (HTTP-In) rule group contains two rules: one that applies to only the public profile, and another that applies to both the domain and private profiles.

An example of a rule group.
Figure 7. An example of a rule group.
 
Others
 
- Windows Server 2012 : Configuring Windows Firewall with Advanced Security (part 4) - Managing firewall profiles - Configuring logging, Configuring profiles using Windows PowerShell
- Windows Server 2012 : Configuring Windows Firewall with Advanced Security (part 3) - Managing firewall profiles - Configuring profiles, Configuring profile settings
- Windows Server 2012 : Configuring Windows Firewall with Advanced Security (part 2) - Managing firewall profiles
- Windows Server 2012 : Configuring Windows Firewall with Advanced Security (part 1) - Understanding Windows Firewall with Advanced Security
- Microsoft Exchange Server 2013 : Addressing Exchange - Hierarchical address book
- Microsoft Exchange Server 2013 : Addressing Exchange - The Offline Address Book (part 3) - Creating and using customized OABs
- Microsoft Exchange Server 2013 : Addressing Exchange - The Offline Address Book (part 2) - How Exchange 2013 generates the Offline Address Book
- Microsoft Exchange Server 2013 : Addressing Exchange - The Offline Address Book (part 1) - The OAB and Outlook
- Microsoft Exchange Server 2013 : Addressing Exchange - Address book policies - Creating and implementing an ABP
- Microsoft Exchange Server 2013 : Addressing Exchange - Address lists
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us