Windows 7 / Networking

Inbound vs . Outbound Rules

Inbound rules filter traffic passing from the network to the local computer based on the filtering conditions specified in the rule. Conversely, outbound rules filter traffic passing from the local computer to the network based on the filtering conditions specified in the rule. Both inbound and outbound rules can be configured to allow or block traffic as needed.

Windows Firewall with Advanced Security includes a number of predefined inbound and outbound rules for filtering traffic typically associated with different Windows features. These rules are organized into rule groups, which identify a collection of rules designed to enable a particular Windows experience or feature. For example, the Remote Assistance rule group is a set of firewall rules designed to enable users of the local computer to use Remote Assistance to help other users on the network or to receive help from them. The Remote Assistance rule group includes the following rules:

  • Remote Assistance (DCOM-In) Inbound rule to allow offering Remote Assistance using Distributed Component Object Model (DCOM)
  • Remote Assistance (PNRP-In) and Remote Assistance (PNRP-Out) Inbound and outbound rules to allow use of the PNRP
  • Remote Assistance (RA Server TCP-In) and Remote Assistance (RA Server TCP-Out) Inbound and outbound rules to allow offering Remote Assistance to other users
  • Remote Assistance (SSDP TCP-In) and Remote Assistance (SSDP TCP-Out) Inbound and outbound rules to allow use of Universal Plug and Play (UPnP) over TCP port 2869
  • Remote Assistance (SSDP UDP-In) and Remote Assistance (SSDP UDP-Out) Inbound and outbound rules to allow use of UPnP over UDP port 1900
  • Remote Assistance (TCP-In) and Remote Assistance (TCP-Out) Inbound and outbound rules to allow Remote Assistance traffic

In addition, some of these rules exist in separate form for different firewall profiles. For example, there are two separate Remote Assistance (TCP-In) rules, one for the domain and private firewall profiles and the other for the public firewall profile. Firewall rules can also be either enabled or disabled. Rules that are enabled actively filter traffic; rules that are disabled exist but are not used for filtering traffic unless they are enabled. For example, by default the Remote Assistance (TCP-In) rule for the domain and private firewall profiles is enabled, while the Remote Assistance (TCP-In) rule for the public firewall profile is disabled. This means that by default, Remote Assistance can be used in domain-based scenarios and on work/home networks, but not at a coffee shop when connecting to the public Internet using a wireless hotspot connection.

The inbound rules for Remote Assistance as displayed in the Windows Firewall with Advanced Security MMC snap-in. Rules that are enabled are indicated by a green check mark before them; rules that are disabled are indicated by a red X before them. Filtering conditions for all rules can be viewed by scrolling horizontally in the central pane of the snap-in. Alternatively, you can display the filtering conditions of a specific rule by doubleclicking the rule. Additional predefined rules may also be displayed if certain Windows features are turned on or off. For example, installing the Telnet Server feature adds a new predefined inbound rule named Telnet Server.

[Previous] [Contents] [Next]

In this tutorial:

  1. Configuring Windows Firewall and IPsec
  2. Understanding Windows Firewall with Advanced Security
  3. Improvements to Windows Firewall Introduced Previously in Windows Vista
  4. Additional Improvements to Windows Firewall in Windows 7
  5. Understanding the Windows Filtering Platform
  6. Windows Firewall and the Startup Process
  7. Understanding Windows Service Hardening
  8. Understanding Service SIDs
  9. Windows Firewall and WSH
  10. Windows Firewall and Service Triggers
  11. Understanding Multiple Active Firewall Profiles
  12. Understanding Rules
  13. Understanding Firewall Rules
  14. Inbound vs . Outbound Rules
  15. Allow vs . Block Rules
  16. Allow If Secure Rules
  17. Authenticated Bypass Rules
  18. Filtering Conditions FOR Firewall RULES
  19. Understanding Connection Security Rules
  20. Types of Connection Security Rules
  21. Supported IPsec Settings for Connection Security Rules
  22. Default IPsec Settings for Connection Security Rules
  23. Windows Firewall and Windows PE
  24. Understanding Default Rules
  25. Understanding WSH Rules
  26. Understanding Rules Processing
  27. Managing Windows Firewall with Advanced Security
  28. Tools for Managing Windows Firewall with Advanced Security
  29. Managing Windows Firewall Using Control Panel
  30. Managing Windows Firewall Using the Windows Firewall with Advanced Security Snap-in
  31. Managing Windows Firewall Using Group Policy
  32. Considerations When Managing Windows Firewall Using Group Policy
  33. Managing Windows Firewall Using the Netsh Command
  34. Common Management Tasks
  35. Enabling or Disabling Windows Firewall
  36. Configuring Firewall Profiles and IPsec Settings by Using Group Policy
  37. Creating and Configuring Firewall Rules
  38. Creating and Configuring Connection Security Rules
  39. Monitoring Windows Firewall
  40. Troubleshooting Windows Firewall
  41. Troubleshooting Windows Firewall Using Firewall Logs
  42. Troubleshooting Windows Firewall Using Event Logs
  43. Troubleshooting Windows Firewall Using Auditing
  44. Troubleshooting IPsec Issues Using Netsh Wfp
  45. Troubleshooting Windows Filtering Platform and IPsec Issues Using Netsh Trace