SlideShare a Scribd company logo
Windows Firewall
Windows Firewall
Presented by :
Soban Ahmad
036
Waqar-ul-Malik
050
Our Discussing topics
 What is a firewall?
 Firewall types
 How a firewall works
 Default firewall behavior
 Windows 7 firewall features
 Configuring Windows 7 firewall
What is a firewall
 A firewall is software or hardware that helps prevent hackers
and some types of malware from getting to your PC through
a network or the Internet. It does this by checking the info
that’s coming from the Internet or a network and then either
blocking it or allowing it to pass through to your PC.
Firewall Types
Following are the types of Firewall Types
 Packet filtering
 stateful
 proxy
Packet filtering
makes each filtering decision on a packet by packet basis
without regard to previous packets in any directon
Stateful firewall
keeps track of packet flows and filters based on flow
information
Proxy firewall
works on a per-application basis. User sends to proxy,
proxy creates new packet sourced from proxy.
Firewall Types
 Network-based vs host-based
 Network-based runs a router, multi-layer switch or
dedicated firewall
 Host-based firewall runs on computer running OS
such as Windows 7 or UNIX
 Hardware vs software firewall
 Hardware firewall chassis designed for specifically to
operate as a firewall; highest performance
6
Windows Firewall
 Host-based, stateful software firewall
 Evaluates each packet as it arrives or leaves and determines
whether that packet is allowed or denied based on flow
 Windows 7 firewall is improved over XP version
Default Firewall Behavior
 Default is to allow all outbound traffic and
response inbound traffic; deny all other inbound
traffic
How Firewall Works
 Incoming packet is inspected and compared
against a list of allowed traffic.
 If packet matches a list entry, packet passed to
TCP/IP protocol for further processing.
 If the packet does not match a list entry then
packet is discarded
 If logging is enabled, Windows creates an entry in the
Firewall logging file
How List is Populated
 When enabled connection sends a packet, the
firewall creates an entry in the list for response
traffic.
 Allow rules can be manually created with
Advanced Security.
10
Windows 7 Firewall
 Windows Firewall features
 Inbound filtering
 Outbound filtering
 Firewall rules combined with IPsec rules
 Support for complex rules
 Support for logging
Locations and the Firewall
 Windows Firewall with Advanced Security
is a network location aware application
 Windows 7 stores the firewall properties
based on location types
 Configuration for each location type is
called a profile
 In each profile you can:
 Enable or disable Windows Firewall
 Configure inbound and/or outbound connections
 Customize logging and other settings
Locations and Firewall
Settings
 As the network location connected to changes,
the Windows Firewall profile changes.
 Windows Firewall can therefore automatically
allow incoming traffic for a specific desktop
management tool when the computer is on a
domain network but block similar traffic when the
computer is connected to public or private
networks.
Locations and Firewall
Settings
 Location types: domain, public, and private.
 Domain - the connection is authenticated to
a domain controller for the domain of which
it is a member.
 By default, all other networks are initially
classified as public networks.
 User can identify the network as either public
or private.
 Public profile: For use when in locations such as
airports or coffee shops.
 Private profile: For use when connected at a
home or office and behind an edge device.
 To classify a network as a private network, the
user must have administrator credentials.
Locations and Firewall
Settings
 While a computer may be connected to
multiple network locations at the same time,
only one profile can be active at a time. The
active profile is determined as follows:
 If all interfaces are authenticated to the
domain controller for the domain of which
the computer is a member, the domain
profile is applied.
 If at least one interface is connected to a
private network location and all other
interfaces are either authenticated to the
domain controller or are connected to
private network locations, the private profile
is applied.
 Otherwise, the public profile is applied.
Configuring Windows
Firewall
 Control Panel – Windows Firewall
16
Basic Firewall Configuration
17
Advanced Firewall Configuration
 Allows you to configure more complex rules, outgoing filtering,
and IPsec rules
18
Advanced Firewall Configuration
19
Windows Firewall Properties
20
IPSec Settings
 IPsec is a system for securing and authenticating IP-based
network connections
 IPsec defaults - you can configure
 Key exchange protocols
 Data protection protocols
 Authentication Method
21
Advanced Firewall Configuration
22
Advanced Firewall
Configuration
 View and Edit Firewall Rules
 A large number of inbound and outbound rules are created by
default in Windows Vista
23
Advanced Firewall Configuration
24
Advanced Firewall Configuration
 View and Edit Firewall Rules
 You modify an existing rule by opening its properties
 Tabs in the properties of an outbound rule
 General
 Programs and Services
 Computers
 Protocols and Ports
 Scope
 Advanced
 Create New Firewall Rules
 A wizard guides you through the process
25
Advanced Firewall Configuration
26
Advanced Firewall Configuration
 Create New Firewall Rules
 Rule types you can create with the Outbound Rule Wizard
 Program
 Port
 Predefined
 Custom
 Actions for a rule
 Allow the connection
 Allow the connection if it is secure
 Block the connection
27
Advanced Firewall Configuration
28
Advanced Firewall Configuration
 Create New Computer-Connection Security Rules
 Use IPsec to authenticate and secure communication between
two computers
 Security rule types
 Isolation
 Authentication exemption
 Server-to-server
 Tunnel
 Custom
29
Advanced Firewall Configuration
30
Advanced Firewall Configuration
 Monitor Windows Firewall Rules and Connections
 Firewall node allows you to see rules that are enabled in one
screen
 Connection Security node allows you to see the computer
connection security rules that are enabled and any security
associations that are active
 Security association
 Rules for communication between two computers
31
Advanced Firewall Configuration
Windows 7 firewall & its configuration

More Related Content

What's hot

Virtual private network
Virtual private networkVirtual private network
Virtual private network
Sowmia Sathyan
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
John Ely Masculino
 
FireWall
FireWallFireWall
FireWall
rubal_9
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
Touhidul Fahim
 

What's hot (20)

Routers and Routing Configuration
Routers and Routing ConfigurationRouters and Routing Configuration
Routers and Routing Configuration
 
What is Network Address Translation (NAT)
What is Network Address Translation (NAT)What is Network Address Translation (NAT)
What is Network Address Translation (NAT)
 
Peer To Peer Networking
Peer To Peer NetworkingPeer To Peer Networking
Peer To Peer Networking
 
IP Address
IP AddressIP Address
IP Address
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
File sharing
File sharingFile sharing
File sharing
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar ppt
 
Firewalls
FirewallsFirewalls
Firewalls
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Firewall
Firewall Firewall
Firewall
 
firewall and its types
firewall and its typesfirewall and its types
firewall and its types
 
FireWall
FireWallFireWall
FireWall
 
network Addressing
network Addressingnetwork Addressing
network Addressing
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Addressing
AddressingAddressing
Addressing
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
Firewall
FirewallFirewall
Firewall
 

Viewers also liked

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
Amandeep Kaur
 
Firewall
FirewallFirewall
Firewall
Apo
 
The 20 Common ports
The 20 Common portsThe 20 Common ports
The 20 Common ports
RKabbaniFTW
 

Viewers also liked (20)

Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 
Firewall
FirewallFirewall
Firewall
 
Human Error in Cyber Security
Human Error in Cyber SecurityHuman Error in Cyber Security
Human Error in Cyber Security
 
Port numbers
Port numbersPort numbers
Port numbers
 
Cisco pix firewall configuration for dcsl
Cisco pix firewall configuration for dcslCisco pix firewall configuration for dcsl
Cisco pix firewall configuration for dcsl
 
Common Ports
Common PortsCommon Ports
Common Ports
 
A walk through Windows firewall and Netsh commands
A walk through Windows firewall and Netsh commandsA walk through Windows firewall and Netsh commands
A walk through Windows firewall and Netsh commands
 
Guide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System UtilitiesGuide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System Utilities
 
Webinar Gratuito: "Analisis Forense al Firewall de Windows"
Webinar Gratuito: "Analisis Forense al Firewall de Windows"Webinar Gratuito: "Analisis Forense al Firewall de Windows"
Webinar Gratuito: "Analisis Forense al Firewall de Windows"
 
Procedures in Planning and Conducting Maintenance
Procedures in Planning and Conducting MaintenanceProcedures in Planning and Conducting Maintenance
Procedures in Planning and Conducting Maintenance
 
Windows Firewall & Its Configuration
Windows Firewall & Its ConfigurationWindows Firewall & Its Configuration
Windows Firewall & Its Configuration
 
Ch 22
Ch 22Ch 22
Ch 22
 
The 20 Common ports
The 20 Common portsThe 20 Common ports
The 20 Common ports
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
 
20 common port numbers and their purposes
20 common port numbers and their purposes 20 common port numbers and their purposes
20 common port numbers and their purposes
 
Security Onion: Watching for Leeks
Security Onion: Watching for LeeksSecurity Onion: Watching for Leeks
Security Onion: Watching for Leeks
 
Security Onion
Security OnionSecurity Onion
Security Onion
 
The Basics of Network Troubleshooting
The Basics of Network TroubleshootingThe Basics of Network Troubleshooting
The Basics of Network Troubleshooting
 

Similar to Windows 7 firewall & its configuration

Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix Firewall
Souvik Santra
 
Assignment on windows firewall
Assignment on windows firewallAssignment on windows firewall
Assignment on windows firewall
Md Shihab
 
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinal
mordannon
 
Advanced Internet Final
Advanced Internet FinalAdvanced Internet Final
Advanced Internet Final
mordannon
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
webhostingguy
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
webhostingguy
 
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptCh06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
gocokir267
 

Similar to Windows 7 firewall & its configuration (20)

Firewall and its configuration
Firewall and its configurationFirewall and its configuration
Firewall and its configuration
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix Firewall
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Firewalls
FirewallsFirewalls
Firewalls
 
Ch10 Firewall it-slideshares.blogspot.com
Ch10 Firewall it-slideshares.blogspot.comCh10 Firewall it-slideshares.blogspot.com
Ch10 Firewall it-slideshares.blogspot.com
 
[9] Firewall.pdf
[9] Firewall.pdf[9] Firewall.pdf
[9] Firewall.pdf
 
Network security
Network securityNetwork security
Network security
 
Assignment on windows firewall
Assignment on windows firewallAssignment on windows firewall
Assignment on windows firewall
 
Advanced internetfinal
Advanced internetfinalAdvanced internetfinal
Advanced internetfinal
 
Advanced Internet Final
Advanced Internet FinalAdvanced Internet Final
Advanced Internet Final
 
firrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptxfirrewall and intrusion prevention system.pptx
firrewall and intrusion prevention system.pptx
 
Ch05 Network Defenses
Ch05 Network DefensesCh05 Network Defenses
Ch05 Network Defenses
 
Firewall & packet filter new
Firewall & packet filter newFirewall & packet filter new
Firewall & packet filter new
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
 
Unix Web servers and FireWall
Unix Web servers and FireWallUnix Web servers and FireWall
Unix Web servers and FireWall
 
Lec # 13 Firewall.pptx
Lec # 13 Firewall.pptxLec # 13 Firewall.pptx
Lec # 13 Firewall.pptx
 
Firewall
FirewallFirewall
Firewall
 
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.pptCh06-NetworkSecurity2-firewall-tunneling-IDS.ppt
Ch06-NetworkSecurity2-firewall-tunneling-IDS.ppt
 
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
Firewalls.pdfdifferencesCalculate the number of moles of Mg(NO3)2 in 44.4 g o...
 
VMworld 2013: vCloud Hybrid Service Jump Start Part Two of Five: vCloud Hybri...
VMworld 2013: vCloud Hybrid Service Jump Start Part Two of Five: vCloud Hybri...VMworld 2013: vCloud Hybrid Service Jump Start Part Two of Five: vCloud Hybri...
VMworld 2013: vCloud Hybrid Service Jump Start Part Two of Five: vCloud Hybri...
 

More from Soban Ahmad

More from Soban Ahmad (7)

Online Loan Application & Its Verification System
Online Loan Application & Its Verification SystemOnline Loan Application & Its Verification System
Online Loan Application & Its Verification System
 
The Karnaugh Map
The Karnaugh MapThe Karnaugh Map
The Karnaugh Map
 
Online Loan Management System
Online Loan Management SystemOnline Loan Management System
Online Loan Management System
 
Advertisment Ethics
Advertisment EthicsAdvertisment Ethics
Advertisment Ethics
 
Report writing
Report writingReport writing
Report writing
 
The 7 c,s of communication
The 7 c,s of communicationThe 7 c,s of communication
The 7 c,s of communication
 
Water crisis in pakistan & its solutions
Water crisis in pakistan & its solutionsWater crisis in pakistan & its solutions
Water crisis in pakistan & its solutions
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 

Windows 7 firewall & its configuration

  • 1. Windows Firewall Windows Firewall Presented by : Soban Ahmad 036 Waqar-ul-Malik 050
  • 2. Our Discussing topics  What is a firewall?  Firewall types  How a firewall works  Default firewall behavior  Windows 7 firewall features  Configuring Windows 7 firewall
  • 3. What is a firewall  A firewall is software or hardware that helps prevent hackers and some types of malware from getting to your PC through a network or the Internet. It does this by checking the info that’s coming from the Internet or a network and then either blocking it or allowing it to pass through to your PC.
  • 4. Firewall Types Following are the types of Firewall Types  Packet filtering  stateful  proxy Packet filtering makes each filtering decision on a packet by packet basis without regard to previous packets in any directon Stateful firewall keeps track of packet flows and filters based on flow information Proxy firewall works on a per-application basis. User sends to proxy, proxy creates new packet sourced from proxy.
  • 5. Firewall Types  Network-based vs host-based  Network-based runs a router, multi-layer switch or dedicated firewall  Host-based firewall runs on computer running OS such as Windows 7 or UNIX  Hardware vs software firewall  Hardware firewall chassis designed for specifically to operate as a firewall; highest performance
  • 6. 6 Windows Firewall  Host-based, stateful software firewall  Evaluates each packet as it arrives or leaves and determines whether that packet is allowed or denied based on flow  Windows 7 firewall is improved over XP version
  • 7. Default Firewall Behavior  Default is to allow all outbound traffic and response inbound traffic; deny all other inbound traffic
  • 8. How Firewall Works  Incoming packet is inspected and compared against a list of allowed traffic.  If packet matches a list entry, packet passed to TCP/IP protocol for further processing.  If the packet does not match a list entry then packet is discarded  If logging is enabled, Windows creates an entry in the Firewall logging file
  • 9. How List is Populated  When enabled connection sends a packet, the firewall creates an entry in the list for response traffic.  Allow rules can be manually created with Advanced Security.
  • 10. 10 Windows 7 Firewall  Windows Firewall features  Inbound filtering  Outbound filtering  Firewall rules combined with IPsec rules  Support for complex rules  Support for logging
  • 11. Locations and the Firewall  Windows Firewall with Advanced Security is a network location aware application  Windows 7 stores the firewall properties based on location types  Configuration for each location type is called a profile  In each profile you can:  Enable or disable Windows Firewall  Configure inbound and/or outbound connections  Customize logging and other settings
  • 12. Locations and Firewall Settings  As the network location connected to changes, the Windows Firewall profile changes.  Windows Firewall can therefore automatically allow incoming traffic for a specific desktop management tool when the computer is on a domain network but block similar traffic when the computer is connected to public or private networks.
  • 13. Locations and Firewall Settings  Location types: domain, public, and private.  Domain - the connection is authenticated to a domain controller for the domain of which it is a member.  By default, all other networks are initially classified as public networks.  User can identify the network as either public or private.  Public profile: For use when in locations such as airports or coffee shops.  Private profile: For use when connected at a home or office and behind an edge device.  To classify a network as a private network, the user must have administrator credentials.
  • 14. Locations and Firewall Settings  While a computer may be connected to multiple network locations at the same time, only one profile can be active at a time. The active profile is determined as follows:  If all interfaces are authenticated to the domain controller for the domain of which the computer is a member, the domain profile is applied.  If at least one interface is connected to a private network location and all other interfaces are either authenticated to the domain controller or are connected to private network locations, the private profile is applied.  Otherwise, the public profile is applied.
  • 15. Configuring Windows Firewall  Control Panel – Windows Firewall
  • 17. 17 Advanced Firewall Configuration  Allows you to configure more complex rules, outgoing filtering, and IPsec rules
  • 20. 20 IPSec Settings  IPsec is a system for securing and authenticating IP-based network connections  IPsec defaults - you can configure  Key exchange protocols  Data protection protocols  Authentication Method
  • 22. 22 Advanced Firewall Configuration  View and Edit Firewall Rules  A large number of inbound and outbound rules are created by default in Windows Vista
  • 24. 24 Advanced Firewall Configuration  View and Edit Firewall Rules  You modify an existing rule by opening its properties  Tabs in the properties of an outbound rule  General  Programs and Services  Computers  Protocols and Ports  Scope  Advanced  Create New Firewall Rules  A wizard guides you through the process
  • 26. 26 Advanced Firewall Configuration  Create New Firewall Rules  Rule types you can create with the Outbound Rule Wizard  Program  Port  Predefined  Custom  Actions for a rule  Allow the connection  Allow the connection if it is secure  Block the connection
  • 28. 28 Advanced Firewall Configuration  Create New Computer-Connection Security Rules  Use IPsec to authenticate and secure communication between two computers  Security rule types  Isolation  Authentication exemption  Server-to-server  Tunnel  Custom
  • 30. 30 Advanced Firewall Configuration  Monitor Windows Firewall Rules and Connections  Firewall node allows you to see rules that are enabled in one screen  Connection Security node allows you to see the computer connection security rules that are enabled and any security associations that are active  Security association  Rules for communication between two computers