Programming4us
         
 
 
Windows

Windows Vista: Windows Firewall Settings - Computer Connection Security Rules

1/5/2011 2:43:11 PM
Because the Internet is inherently insecure, businesses still need to preserve the privacy of data travelling over the network. IPSec creates a standard platform to develop secure networks and electronic tunnels between two machines. The two machines are known as endpoints. After the tunnel has been defined and both endpoints agree on the same parameters, the data will be encrypted on one end, encapsulated in a packet, and sent to the other endpoint (where the data is decrypted).

In Windows XP and Windows Server 2003, you configure the Windows Firewall and IPSec separately. Unfortunately, because both can block or allow incoming traffic, it is possible that the firewall and IPSec rules can conflict with each other. In Windows Vista, Windows Firewall with Advanced Security provides a single, simplified interface for managing both firewall filters and IPSec rules.

Windows Firewall with Advanced Security uses authentication rules to define IPSec policies. No authentication rules are defined by default. To create a new authentication rule, follow these steps:

1.
In Windows Firewall with Advanced Security, select the Computer Connection Security node.

2.
Right-click the Computer Connection Security node in the console tree, and then click New Rule to start the New Connection Security Rule Wizard.

3.
From the Rule Type page of the New Authentication Rule Wizard, you can select the following:

  • Isolation. Used to specify that computers are isolated from other computers based on membership in a common Active Directory domain or current health status. You must specify when you want authentication to occur (for example, for incoming or outgoing traffic and whether you want to require or only request protection), the authentication method for protected traffic, and a name for the rule.

  • Authentication exemption. Used to specify computers that do not have to authenticate or protect traffic by their IP addresses.

  • Server to server. Used to specify traffic protection between specific computers, typically servers. You must specify the set of endpoints that will exchange protected traffic by IP address, when you want authentication to occur, the authentication method for protected traffic, and a name for the rule.

  • Tunnel. Used to specify traffic protection that is tunneled, typically used when sending packets across the Internet between two security gateway computers. You must specify the tunnel endpoints by IP address, the authentication method, and a name for the rule.

  • Custom. Used to create a rule that does not specify a protection behavior. You would select this option when you want to manually configure a rule, perhaps based on advanced properties that cannot be configured through the pages of the New Authentication Rule Wizard. You must specify a name for the rule.

To configure advanced properties for the rule, follow these steps:

1.
Right-click the name of the rule, and then click Properties.

2.
From the Properties dialog box for a rule, you can configure settings on the following tabs:

  • General. The rule’s name and description and whether the rule is enabled.

  • Computers. The set of computers, by IP address, for which traffic is protected.

  • Authentication. When you want authentication for traffic protection to occur (for example, for incoming or outgoing traffic and whether you want to require or only request protection) and the authentication method for protected traffic.

  • Advanced. The profiles and types of interfaces to which the rule applies and IPSec tunneling behavior.
Other -----------------
- Windows7: Troubleshooting Networking from the Command Line (part 2)
- Windows7: Troubleshooting Networking from the Command Line (part 1)
- Windows7: General Solutions to Network Problems (part 2) - Updating the Router Firmware
- Windows7: General Solutions to Network Problems (part 1) - Turning On Network Discovery
- Windows 7: Troubleshooting Networking - Checking the Connection Status
- Windows 7: Troubleshooting Networking - Repairing a Network Connection
- Windows 7: Troubleshooting Startup Using the System Configuration Utility
- Windows 7: Troubleshooting Startup - Recovering Using the System Recovery Options
- Windows 7: Troubleshooting Startup - When to Use the Various Advanced Startup Options
- Windows Vista: Windows Firewall Settings - Advanced Configuration
- Windows Vista: Windows Firewall Settings - Basic Configuration
- Windows 7: Troubleshooting Device Problems (part 3)
- Windows 7: Troubleshooting Device Problems (part 2) - Displaying a List of Nonworking Devices
- Windows 7: Troubleshooting Device Problems (part 1) - Troubleshooting with Device Manager
- Windows 7: Working with Device Security Policies
- Windows Vista : Configuring Network Security - Windows Defender
- Windows 7: Managing Your Hardware with Device Manager (part 4) - Writing a Complete List of Device Drivers to a Text File
- Windows 7: Managing Your Hardware with Device Manager (part 3) - Configuring Windows to Ignore Unsigned Device Drivers
- Windows 7: Managing Your Hardware with Device Manager (part 2) - Working with Device Drivers
- Windows 7: Managing Your Hardware with Device Manager (part 1)
 
 
REVIEW
- First look: Apple Watch

- 10 Amazing Tools You Should Be Using with Dropbox
VIDEO TUTORIAL
- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

- How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
Popular tags
Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8 BlackBerry Android Ipad Iphone iOS
Most View
- Exchange 2007: How Do I Modify a Database Size Limit?
- Windows 7 : Enhancing Your Browsing Security (part 1) - Blocking Pop-Up Windows
- Enable the Global Audit Policy by Using the Command Line
- Windows Phone 7 : Updating Your Phone Software
- SOA with .NET and Windows Azure : WCF Discovery (part 1) - Discovery Modes
- Microsoft ASP.NET 3.5 : WCF Services for ASP.NET AJAX Applications
- Securing Windows 7 : Thwarting Snoops and Crackers (part 2) - Locking Your Computer Manually, Automatically
- Windows 7 : Accessing a Shared Printer
- SQL Server 2008 : Data Encryption - SQL Server Key Management
- Windows 7 : Firing Up the Registry Editor