当前位置:网站首页>A problem of testing security group access in windows10
A problem of testing security group access in windows10
2022-06-24 03:39:00 【donkexu】
background :
Customer side backend services 80,443 Monitored . The customer said that the security team didn't put it away 80,443 But you can telnet through 80 and 443, But browser access is blocked . Security group add 80 and 443 After the direction policy, the browser can access .
analysis :
Based on this feedback from customers, analyze , I wonder why the security group can be set up without it telnet Well ???
test :
Windows10 Client simulation test :
It seems that the following results are feasible :
Colleague sideways :
It feels like mine Windows10 The version is the feedback like the above , Not successful .
use Linux I measured :
When the security group is not placed, the port cannot Connected Of .
Conclusion :
So the current positioning problem is different from the terminal display Windows10 The system is different , There is no problem with the security group mechanism .
边栏推荐
- [code Capriccio - dynamic planning] t392 Judgement subsequence
- Build a small program + management background in 7 days, and this goose factory HR is blessed!
- News | detailed explanation of network security vulnerabilities of branch enterprises
- How to use elastic scaling in cloud computing? What are the functions?
- Coding Ci of Devops
- Installation of pytorch in pycharm
- What are the advantages of EIP? What is the relationship between EIP and fixed IP?
- 内存泄漏之KOOM
- How to choose excellent server hosting or server leasing in Beijing
- Understand Devops from the perspective of leader
猜你喜欢

ModStartCMS 企业内容建站系统(支持 Laravel9)v4.2.0

halcon知识:区域(Region)上的轮廓算子(2)

618 promotion: mobile phone brand "immortal fight", high-end market "who dominates the ups and downs"?

在pycharm中pytorch的安装
![[Numpy] Numpy对于NaN值的判断](/img/aa/dc75a86bbb9f5a235b1baf5f3495ff.png)
[Numpy] Numpy对于NaN值的判断

Old popup explorer Exe has stopped working due to problems. What should I do?

Sorting out of key vulnerabilities identified by CMS in the peripheral management of red team (I)

老弹出explorer.exe遇到问题已停止工作,怎么办?

元气森林推“有矿”,农夫山泉们跟着“卷”?

Koom of memory leak
随机推荐
TRTC audio quality problem
Chapter 5: key led demo case of PS bare metal and FreeRTOS case development
RI Geng series: write a simple shell script, but it seems to have technical content
Event id:7001: after restarting the machine, the World Wide Web failed to start automatically, resulting in inaccessible websites
Create a telepresence USB drive using the DD command
Record the creation process of a joke widget (I)
What is an edge calculator? How is the unit price of the edge calculator calculated?
Why install code signing certificate to scan and eliminate virus software from security
Rasa 3. X learning series -rasa 3.2.0 new release
Technical dry goods - how to use AI technology to accurately identify mining Trojans
Understand Devops from the perspective of leader
What port does the fortress machine use? What is the role of the fortress machine?
Web penetration test - 5. Brute force cracking vulnerability - (3) FTP password cracking
Build a small program + management background in 7 days, and this goose factory HR is blessed!
web rdp Myrtille
Slide left from small window to large windowdispatchframelayout
Sorting out of key vulnerabilities identified by CMS in the peripheral management of red team (I)
Why can't the fortress machine log in? What are the ways to solve the problem
元气森林推“有矿”,农夫山泉们跟着“卷”?
What is the fortress machine? What role does the fortress machine play?