Exp 3: Exploring Windows Firewall Security
Exp 3: Exploring Windows
Firewall Security
Aim:
To
study and explore about the windows firewall security and observe the
performance of system with firewall and without firewalls
Software
Requirement: Two Computer Systems, Windows 10,Internet Access, Super Scan
Step1 :Opening Windows Firewall
· Select Windows Firewall in Control Panel
Step 2: Configure the firewall
· Be sure that the firewall is On
· Check which programs and services are permitted (Exceptions tab)
· Check the ICMP settings (Advanced tab)
Step 3: Test
the firewall
What
is Windows Firewall with Advanced Settings?
Windows Firewall with
Advanced Security is a management snap-in for the Windows Firewall from which
you can control in all the rules and exceptions that govern how the Windows
Firewall works. In order to access it, you need to open the Windows Firewall as
shown in the previous lesson and then click or tap the “Advanced settings” link
on the column on the left.
Figure 1
Understanding Inbound,
Outbound & Connection Security Rules in Firewall
In Windows Firewall with
Advanced Security you will encounter three important types of rules:
·
Inbound rules – they apply to traffic
that is coming from the network or the Internet to your Windows computer or
device. For example, if you are downloading a file through BitTorrent, the
download of that file is filtered through an inbound rule.
·
Outbound rules – these rules apply to
traffic that is originating from your computer and going to the network and the
Internet. For example, your request to load the How-To Geek website in your web
browser is outbound traffic and it is filtered through an outbound rule. When the
website is downloaded and loaded by your browser, this is inbound traffic.
· Connection security rules –less common rules that are used to secure the traffic between two specific computers while it crosses the network. This type of rule is used in very controlled environments with special security requirements.
Figure
2
You will see lots of inbound and
outbound rules. Some rules will have a green checkmark near their name while
others will have a gray one. The rules with the green checkmark are enabled,
meaning that they are used by Windows Firewall. Those with a gray checkmark are
disabled and they are not used by Windows Firewall.
What
Can Be Monitored from the Windows Firewall with Advanced Security?
Besides the three types of rules mentioned earlier, you will find a section named “Monitoring.” If you expand it, you can view the active firewall rules, the active connection security rules, and view the active security associations.
Figure 3
This is the information maintained about a secure encrypted channel on the local computer or device, so that this information can be used for future network traffic to a specific remote computer or device. Here you can view which peers are currently connected to your computer and which protection suite was used by Windows to form the security association.
How
to Manage Existing Windows Firewall Rules?
When working with the rules that are built into the Windows Firewall is that it is better to disable a rule than delete it. In case you do something ill-advised, then it is very easy to repair everything by re-enabling disabled rules. Rules which get deleted cannot be recovered unless you restore all the Windows Firewall settings to their defaults.
Figure 4
In order to edit a rule and check the way it works, just by double-clicking on it, selecting it, and then pressing “Properties” in the column on the right. All the parameters we have mentioned can be modified in the “Properties” window of that rule.
How
to Create an Inbound Rule for the Windows Firewall?
Let’s go to “Inbound Rules” and press “New Rule” in the column on the right. We have created a rule which blocks all inbound traffic made using the TCP protocol on the port 30770.
Figure 5
Choices are:
·
Program – the rule applies to a
specific program
·
Port – the rule applies to
the network traffic that is performed through a specific port
·
Predefined – rule that controls
the connections performed by a specific Windows service or feature
·
Custom – a custom rule that
can block both programs and ports or a specific combination of both.
Figure 6
Now we
are asked to select the protocol for which the rule applies and the port. The
choices for protocols are TCP and UDP. If you want a rule that applies to both,
you need to create two rules, one for each protocol. Then, we had the choice to
block all ports or only specific ones. We selected “Specific local ports”,
entered “30770,” and pressed “Next.”
Figure 7
Now you are asked to select what action to take when a connection matches the conditions specified earlier. For our example, we have chosen “Block the connection” and pressed “Next.”
Figure 8
Now
you have to select the network locations for which the rule applies. Since we
wanted to block all TCP traffic on port 30770, we selected all three locations
and pressed “Next.”
Figure 9
Now
you are asked to select when the rule applies. This means the network location
when the rule is applied:
·
Domain – the
rule is applied only when the computer is connected to a network domain
·
Private – the
rule is applied only when the computer is connected to trusted private networks
·
Public – the
rule is applied only when the computer is connected to untrusted public
networks
Finally, enter the name and the description for the newly created rule and press “Finish.”
Figure 10
In the similar process to Inbound, the outbound rules can also be created for Allowing, Blocking a program from the System.
Conclusion:
Hence Windows
based firewall tool has been studied and the performance of the systems are
analyzed successfully.
REFERENCES
1.
https://github.com/sharanyavenkat25/Cryptanalysis-TranspositionCiphers/blob/master/project.py
Fetched: 2022-06-10T08:21:22.8600000
2.
https://www.nyit.edu/files/its/SC_Peoplesoft_PopUpBlockerInstructions.pdf
Fetched: 2022-06-10T08:21:31.6500000
3.
http://www.seattle.gov/documents/Departments/FAS/PublicDisclosure/PRRC_troubleshooting.
pdf Fetched: 2022-06-10T08:20:56.0630000
4.
https://eweb4.ccf.org/onlinelearning/browserDetect/BrowserDirections.htm?
txtBrowser=Chrome Fetched: 2022-06-10T08:20:55.7570000
5. URL: https://support.microsoft.com/en-us/windows/delete-and-manage-cookies-168dab11-0753-
043d-7c16-ede5947fc64d Fetched: 2021-05-07T10:49:08.8870000
Comments
Post a Comment