当前位置:网站首页>Firewall and IP security policy configuration
Firewall and IP security policy configuration
2022-06-23 03:29:00 【shawyang】
One 、 1、 It can't be realized , Third party solutions are required 2、Windows The system does not have this function , Third party software may , For example, the requirement that shared folders do not allow any form of file removal has been billed to Microsoft , Microsoft can't , Third party software solutions such as https://cloud.tencent.com/developer/article/1871398 Two 、 Ordinary users cannot configure administrator users Remote users and remote user groups are required Users who can change the system configuration plus the administrator group The server has limited functions , Third party security software , For example, the server security dog (https://www.safedog.cn/about.html) There are multidimensional security policies , For example, the host name of the client computer is used to set the permission / prohibit 1、 Group policy configures the device and resource redirection policy that prohibits the Remote Desktop Session host 2、 Specify user join remote desktop users Group , Users who are not in this group cannot be remote , It is forbidden to access all external networks through IP The security policy can realize 3、 Access designation IP adopt IP Security policy implementation 4、 Users who are not allowed to modify the system configuration ( Non administrator ) It can't be modified , Including but not limited to restart / Shut down the machine 、 Run the command as an administrator 、 Modify registry 、 Modify group strategy 、 Modify the firewall 、 modify IP The security policy 、 Modify the configuration of local users and groups , Ordinary user permission is enough A firewall 、IP Description of security policy configuration : 1、 Clear the firewall / Inbound rules 、 Keep the firewall open , yes : Inbound prohibit all 、 Exit and release all
2、 The release port is released in the firewall inbound rule ,IP The scope is IP The security policy controls 3、IP The security policy (secpol.msc) Configuration skills : ① First match IP Range ( In or out direction IP、 agreement 、 port ) and action ( allow / prohibit ) ② establish IP The security policy ( Select... During creation ① Created in the IP Range , And for the selected IP Scope application ① Actions created in ) ③ application IP The security policy give an example : Only allowed 221.218.140.195、111.206.145.0/24 Segment's client access server 3389 port , And only the server is allowed to follow 115.159.148.149 Of 80 port 、221.218.140.195 and 111.206.145.0/24 All ports interact with each other , All other prohibitions 1、 Make sure windows firewall A service is a running state , It works like this wf.msc Before firewall rules can be operated . function wf.msc, Then use the mouse and shift Key to select all enabled rules , Right click to disable all rules ( It is equivalent to clearing rules ), Then create release 3389 Inbound rule for , Don't care when creating IP Range , Simply configure the local ALL、 long-range ALL that will do ,
2、 After configuration , Turn on the firewall , step : ① function services.msc find windows firewall service , Check whether it is running , If it is not open ; If not in operation 、 And it is forbidden , First adjust to the automatic state , Then open it .
If not in operation 、 It is automatic , Firewall startup alarm “ Error code 87”, It needs to be deleted HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\WindowsFirewall .
If not in operation 、 It is automatic , Firewall startup alarm " error 1068: Dependent service or group cannot start ", Please check Base Filtering Engine( namely BFE) Is it running , If not, start BFE, Then view the system log , If it is a related driver problem , Fix the driver problem before starting the firewall , If the driver service (mpsdrv) Registry and corresponding driver file (C:\Windows\System32\drivers\mpsdrv.sys) No problem , But still report this mistake , Then we can only use sfc /scannow Try it ,sfc If you can't fix it, it's almost impossible , You can only reinstall the system after backing up the data .
Find out mpsdrv.sys The path of seems to be wrong , Compare with normal system , It is found that the normal system is like this , But compared with other services, it is found that , There are differences , The environmental variables verify that there is no change , Try to change it to %systemroot%\system32\drivers\mpsdrv.sys try , The same error is reported when the machine is restarted after the change
Execute as Administrator sfc /scannow The system file is found to be damaged , Compare it with the normal system carefully , Find out C:\Windows There are many folders missing from the directory , And found This document The problem described , function Different .msc command , Some are normal , Some report mistakes 【MMC Unable to create snap in This snap in may not be installed correctly 】, There is an error report interface CLSID:FX:{GUID}, The solution is to verify C:\windows\assembly Whether this directory exists , If it doesn't exist , Buy a new machine with the same public image , Package and unzip the directory to the same location of the problem machine , The damaged .msc The command is restored , But the firewall service keeps reporting errors , I don't know which files are damaged , Anyway, these commands recommended by Microsoft can't be fixed , but , Finally, you can only back up the data and reinstall the system .
sfc /scannow
DISM.exe /Online /Cleanup-image /Scanhealth
DISM.exe /Online /Cleanup-image /Checkhealth
DISM.exe /Online /Cleanup-image /Restorehealth
Assume that there is no problem starting the firewall service , Or the problem is fixed , This is the premise of enabling firewall rules .
② function firewall.cpl Turn on the firewall rule switch
3、 Refer to the foregoing IP Security policy configuration skill configuration IP The security policy , stay IP Fine control over the range ①IP Groups and actions
there IP Group has 4 individual , The screenshot is as follows
② application IP Groups and actions to create IP The security policy
③ Right click on the application IP The security policy
边栏推荐
- DAAS architecture and Implementation (I)
- Regeorg actual attack and defense
- If there is a smart bus visualization platform, can "beginning" restart indefinitely?
- Official announcement! The Hong Kong Zhuhai Macao Bridge is finally here!
- Exploration on the framework of stream batch integration technology and its practice in kangaroo cloud number stack
- How does native JS get the child elements of the parent element that the current element belongs to
- How to make distribution box label
- 2022-01-25: serialize and deserialize n-ary tree. Serialization means that a
- Free upgrade of 2-core 2GB for old generation 1-core 2GB machines below standard S5 and SA2
- Goframe framework: log configuration management
猜你喜欢

Analysis on the development of China's satellite navigation industry chain in 2021: satellite navigation is fully integrated into production and life, and the satellite navigation industry is also boo

Analysis on the development of China's graphene industry chain in 2021: with the support of energy conservation and environmental protection policies, the scale of graphene industry will continue to e
![Analysis of China's integrated circuit industry chain in 2021: huge downstream market demand [figure]](/img/de/d73805aaf4345ca3d2a7baf85aab8d.jpg)
Analysis of China's integrated circuit industry chain in 2021: huge downstream market demand [figure]
![Analysis of the number of urban residents covered by basic medical insurance, their treatment and medical treatment in other places in China in 2021 [figure]](/img/81/4d3cb059f700dd9243645e64023be7.jpg)
Analysis of the number of urban residents covered by basic medical insurance, their treatment and medical treatment in other places in China in 2021 [figure]

Gakataka student end to bundle Version (made by likewendy)
![Analysis on the development status of China's watch industry in 2021: a large number of electric watches are imported [figure]](/img/ca/672bfe49c8123da8679b2abeb43a2e.jpg)
Analysis on the development status of China's watch industry in 2021: a large number of electric watches are imported [figure]
![Analysis on development history, industrial chain, output and enterprise layout of medical polypropylene in China in 2020 [figure]](/img/28/ebfc25ec288627706e15a07e6bdb77.jpg)
Analysis on development history, industrial chain, output and enterprise layout of medical polypropylene in China in 2020 [figure]

Fetch request details

Jmeter- (V) simulated user concurrent login for interface test
![Analysis on the development prospect of China's brain computer interface industry in 2021: wide application prospect, sustained and rapid growth of market scale [figure]](/img/84/192d152ceb760264b6b555b321f129.jpg)
Analysis on the development prospect of China's brain computer interface industry in 2021: wide application prospect, sustained and rapid growth of market scale [figure]
随机推荐
Auto rename when uploading pictures on WordPress media
2022-01-25: serialize and deserialize n-ary tree. Serialization means that a
What are the advantages and difficulties of introducing AI into ISP Technology
How to make distribution box label
Know res.send() and res.end() of Express
DDoS attack under Kali
Account MFA usage scheme
China's economy has entered the stage of "the third mock examination coexisting", and JD and Shopify have jointly arranged global DTC
Pre and post processing of pytest
Troubleshooting and resolution of asydss virtual live broadcast status synchronization and service downtime
JS remove first character of string
Goframe framework (RK boot): enable tls/ssl
DAAS architecture and Implementation (I)
Great WPF open source control library newbeecoder UI
Easynvr is displayed online after cascading the upper platform, but what is the reason for the video playback timeout?
Initialize MySQL Gorm through yaml file
Operating wechat cache by using wechat low code
The logical operators |, & &!
How does easyplayer embed a video snapshot into a demo?
WordPress modifying fixed links and pseudo statics