Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Windows Server 2003 : Monitoring Network Protocol Security (part 4) - Use the IP Security Management Snap-In to Create a Blocking Policy

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
3/24/2011 6:29:06 PM
Use the IP Security Management Snap-In to Create a Blocking Policy

You can access IP security through a GPO, through the Local Security Policy console on Windows Server 2003, Windows 2000, and Windows XP Professional, and by loading IP Security Monitor snap-in in a console. To simplify monitoring of policy activity, in this exercise, you load the tool in the MMC and save the console for later use. The first policy you create is a blocking policy, which is useful in keeping unwanted traffic from being received on specific computers.

To create a blank console

1.
From the Start menu, select MMC to open an MMC.

2.
From the File menu, select Add/Remove Snap-In.

3.
Click the Add button.

4.
In the Add Standalone Snap-In dialog box (Figure 14), select IP Security Policy Management, and then click Add.

Figure 14. Selecting the IP Security Policy Management snap-in


5.
In the Select Computer Of Domain dialog box, click Finish to accept the default selection, Local Computer. Then click Close.

In the Add/Remove Snap-In dialog box, shown in Figure 15, the IP Security Policies On Local Computer snap-in is listed. This tool is used for managing policies; the name is just different than the name displayed in Figure 14.

Figure 15. Verifying the IP Security Policy Management snap-in


6.
Click OK.

7.
From the File menu select Save As, type the filename IP Security Policy Management, and click Save.

To create a blocking policy

1.
Open the IP Security Policy Management console just created.

2.
Right-click the IP Security Policies On Local Computer node and select Create IP Security Policy.

The IP Security Policy Wizard launches.

3.
Click Next on the wizard welcome page that appears.

4.
In the Name text box, type block web server access.

5.
In the Description text box, type a description, and click Next.

6.
Clear Activate The Default Response Rule, and click Next.

The default response rule allows insecure communication. In most cases, you will not want this so you will need to remove the rule. However, you can always reenable it from the interface later.

7.
At the Default Response Rule Authentication Method, leave the default setting and click Next.

8.
Click Finish.

9.
In the new policy properties dialog box, shown in Figure 16, clear the Use Add Wizard check box and click Add.

Figure 16. Clearing the Use Add Wizard check box


The wizard steps you through the creation of more complex policies and introduces confusion and extra work when a simple blocking policy is all you want. Instead of a wizard, you will get the policy properties dialog boxes after clicking Add.

10.
On the IP Filter List tab, shown in Figure 17, click Add to create the filter list.

Figure 17. Adding a filter list


11.
In the Name text box, type blocking as the name for the filter list.

12.
In the Description text box, typeblocking protocols.

13.
Clear the Use Add Wizard check box and click Add to add a filter.

14.
In the Source Address drop-down list, select Any IP Address.

15.
In the Destination Address drop-down list, select My IP Address, as shown in Figure 18. Then click the Protocol tab.

Figure 18. Creating the filter


16.
In the Select A Protocol Type drop-down list, select TCP.

17.
In the Set The IP Protocol Port box, shown in Figure 19, click To This Port, type 80, and then click OK.

Figure 19. Defining filter ports


18.
Select the Blocking entry in the IP Filter Lists box, and then click the Filter Action tab.

19.
Clear the Use Add Wizard check box and click Add to add a filter action.

The filter action determines what happens when the filter is triggered. In this case, the filter will be set to block any traffic arriving at this computer for port 80.

20.
On the Security Methods tab, shown in Figure 20, select the Block option.

Figure 20. Creating the blocking filter action


21.
Click the General tab and type block for the filter name. Then click OK.

22.
Click the Filter Action tab. Select the Block filter action, click Close, and then click OK to finish creating the policy.

Creating a policy does not change network activity on this machine. The policy must be activated before it will be used. You activate a policy by right-clicking it and selecting Assign from the context menu. Only one policy can be active per machine.

Other -----------------
- Windows Server 2003 : Monitoring Network Protocol Security (part 1) - Understanding IPSec & Negotiation Configuration
- SharePoint 2010 : Getting to Know the Excel Services Service Application
- Using Windows PowerShell in an Exchange Server 2010 Environment : Managing Cmdlets
- Using Windows PowerShell in an Exchange Server 2010 Environment : Creating Your Own Scripts
- Windows Server 2008 R2 : Installing Windows Deployment Services (part 3)
- Windows Server 2008 R2 : Installing Windows Deployment Services (part 2)
- Windows Server 2008 R2 : Installing Windows Deployment Services (part 1) - Configuring the WDS Server
- Windows Server 2008 R2 Windows Deployment Services
- Windows Server 2008 R2 Administration Tools for Desktops : Operating System Deployment Options
- Windows Server 2008 R2 Administration Tools for Desktops : Managing Desktops and Servers
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server