.windows xp sp2 firewall settings explain

  

computer store news The English version of Windows XP Service Pack 2 (SP2) has been released to include the new Windows Firewall, formerly known as Internet Connection Firewall (ICF). Windows Firewall is a host-based stateful firewall that discards all unsolicited incoming traffic, that is, traffic that does not correspond to a request sent to the responding computer (requested traffic), nor does it correspond to what has been specified as Allowed unrequested traffic (abnormal traffic). Windows Firewall provides some level of protection against malicious users and programs that rely on unsolicited incoming traffic to attack computers on the network. In Windows XP SP2, Windows Firewall has many new features, including: Default enable for all connections to the computer New global configuration options for all connections New dialog set for global configuration New operating mode Startup Security Local Network Restrictions Abnormal traffic can be specified by application file name. Built-in support for Internet Protocol version 6 (IPv6) New configuration options with Netsh and Group Policy This article details the manual configuration of the new Windows Firewall. Dialog set. Unlike ICF in Windows XP (pre-SP2), these configuration dialogs can configure both IPv4 and IPv6 traffic. The ICF settings in Windows XP (pre-SP2) include a single checkbox (on the <quo;Advanced” tab of the connection properties) to protect my computer and network by restricting or blocking access to this computer from the Internet. ” checkbox) and a "Settings" button that you can use to configure traffic, log settings, and allowed ICMP traffic. In Windows XP SP2, the checkbox on the "Advanced" tab of the connection properties is replaced with a "Settings" button that you can use to configure general settings, permissions for programs and services, and to specify Settings for the connection, log settings, and allowed ICMP traffic. The “Settings> button will run the new Windows Firewall Control Panel program (available in the "Network and Internet Connections & Security Center" category). The new Windows Firewall dialog box contains the following tabs: “General” “Exceptions “Advanced” “General” Tabs On the “General” tab, you can choose from the following options: &ldquo ;Enable (Recommended)” Select this option to enable Windows Firewall for all network connections selected on the “Advanced tab. When the Windows Firewall is enabled, only the requested and abnormal incoming traffic will be allowed. Abnormal traffic can be configured on the "Exceptions" tab. “About abnormal traffic is allowed> Click this option to allow only incoming traffic for the request. This will not allow abnormal incoming traffic. The settings on the "Exceptions" tab will be ignored and all connections will be protected regardless of the settings on the “Advanced" tab. “Disable” Select this option to disable the Windows Firewall. This is not recommended, especially for network connections that are directly accessible over the Internet. Note that for all connections and newly created connections to computers running Windows XP SP2, the default setting for Windows Firewall is “Enable (recommended)”. This can affect the communication of programs or services that rely on unsolicited incoming traffic. In such cases, you must identify those programs that are no longer working and add them or their traffic as abnormal traffic. Many programs, such as Internet browsers and email clients (such as Outlook Express), do not rely on unsolicited incoming traffic, so they can operate correctly with Windows Firewall enabled. If you are using Group Policy to configure Windows Firewall for computers running Windows XP SP2, the Group Policy settings that you configure may not allow local configuration. In such cases, the options on the "General" tab and other tabs may be grayed out and cannot be selected, even local administrators cannot make selections. Group Policy-based Windows Firewall settings allow you to configure a domain profile (a set of Windows Firewall settings that will be applied when you connect to a network that contains a domain controller) and a standard profile (a set will be connected to you like Windows Firewall settings that are applied when the Internet does not have a network that contains domain controllers.) These configuration dialogs only show the Windows Firewall settings for the currently applied profile. To view the settings of a profile that is not currently applied, use the netsh firewall show command. To change the settings of a profile that is not currently applied, use the netsh firewall set command. “Exceptions' tabs On the "Exceptions" tab, you can enable or disable an existing program or service, or maintain a list of programs or services that define unusual traffic. Abnormal traffic will be rejected when the “Allow Unwanted Traffic" option is selected on the “General" tab. For Windows XP (pre-SP2), you can only define abnormal traffic based on Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) ports. For Windows XP SP2, you can define abnormal traffic based on TCP and UDP ports or file names of programs or services. This configuration flexibility makes configuring anomalous traffic easier when the TCP or UDP port of the program or service is unknown or needs to be dynamically determined at the start of the program or service. There is a set of pre-configured programs and services, including: File and Print Sharing Remote Assistant (enabled by default) Remote Desktop UPnP Framework These predefined programs and services are not removable. If Group Policy allows, you can also create additional anomalous traffic based on the specified program name by clicking "Add Program", and create an exception based on the specified TCP or UDP port by clicking “Add Port” flow. When you click “Add Programs, the “Add Programs” dialog box will pop up, where you can select a program or browse the file name of a program. When you click “Add Port”, the “Add Port” dialog box will pop up, where you can configure a TCP or UDP port. One of the features of the new Windows Firewall is the ability to define the range of incoming traffic. The scope defines the network segment that is allowed to initiate abnormal traffic. When defining the scope of a program or port, you have two options: “any computer” allows abnormal traffic from any IP address. “Only my network (subnet)” Only abnormal traffic is allowed from the following IP address, ie it matches the local network segment (subnet) to which the network connection receiving the traffic is connected. For example, if the IP address of the network connection is configured to 192.168.0.99 and the subnet mask is 255.255.0.0, then the abnormal traffic only allows IP addresses from 192.168.0.1 to 192.168.255.254. When you want to allow a local home network to connect to a computer on the same subnet to access a program or service, but you don't want to allow potentially malicious Internet users to access it, then “only my network (subnet)&rdquo The set address range is useful. Once a program or port has been added, it is disabled by default in the "Programs & Services" list. All programs or services enabled on the "Exceptions" tab are enabled for all connections selected on the “Advanced" tab. “Advanced"tab“Advanced" tab contains the following options: Network Connection Settings Security Log ICMP Default Settings “Network Connection Settings> In “Network Connection Settings”, you can: The set of interfaces on which Windows Firewall is enabled. To enable Windows Firewall, check the box next to the network connection name. To disable the Windows Firewall, clear the check box. By default, Windows Firewall is enabled for all network connections. If a network connection does not appear in this list, then it is not a standard network connection. Examples of this include custom dialers provided by Internet Service Providers (ISPs). 2. Configure the advanced configuration of the individual network connections by clicking on the network connection name and then clicking on “Settings". If you clear all the checkboxes in “Network Connection Settings  then Windows Firewall will not protect your computer, regardless of whether you selected “Enable (Recommended)> on the “General” tab . If you select "Allow abnormal traffic" on the “General" tab, then the settings in "Network Connection Settings" will be ignored, in which case all interfaces will be protected. When you click “Set", the “Advanced Settings” dialog box will pop up. On the “Advanced Settings” dialog, you can configure specific services (configured only on TCP or UDP ports) in the “Services” tab, or enable specific types in the “ICMP” tab. ICMP traffic. These two tabs are equivalent to the settings tab of the ICF configuration in Windows XP (pre-SP2). “Security log" In the "Security log", click “Set" to specify the configuration of the Windows Firewall log in the "Log Settings" dialog box, in the "Log Settings” dialog In the box, you can configure whether you want to log dropped packets or successful connections, as well as specify the name and location of the log file (the default setting is Systemrootpfirewall.log) and its maximum capacity. “ICMP” In “ICMP", click “Set" to specify the allowed ICMP traffic type in the "ICMP" dialog box. In the “ICMP” dialog, you can enable and disable Windows. The firewall allows the type of incoming ICMP messages for all connections selected on the “Advanced tab. ICMP messages are used to diagnose, report error conditions, and configuration. By default, no ICMP messages are allowed in this list. A common step in diagnosing connection problems is to use the Ping tool to verify the address of the computer you are trying to connect to. At the time of verification, you can send an ICMP Echo message and then get an ICMP Echo Reply message as a response. By default, Windows Firewall does not allow incoming ICMP Echo messages, so the computer cannot send back an ICMP Echo Reply message in response. In order to configure the Windows Firewall to allow incoming ICMP Echo messages, you must enable “Allow incoming echo requests” settings. “Default Settings Click “Restore Defaults  to reset the Windows Firewall back to its initial installation state. When you click “Restore Defaults>, the system prompts you to verify your decision before the Windows Firewall settings change.

Copyright © Windows knowledge All Rights Reserved