Understanding Windows Firewall with Advanced Security
Windows Firewall with Advanced Security (also referred to as "Windows Firewall" in this tutorial) is a host-based, stateful firewall included in the Windows Vista operating system and later versions that can be used to specify which types of network traffic are allowed to pass between the local computer and the rest of the network. Specifically, Windows Firewall with Advanced Security is:
- A host-based firewall designed to protect the local computer, as opposed to a perimeter firewall designed to protect the entire internal network.
- A stateful firewall that can inspect and filter both inbound and outbound packets for both IPv4 and IPv6.
Windows Firewall with Advanced Security can also be used to protect network traffic as it passes between the local computer and other computers on the network. To accomplish this, Windows Firewall with Advanced Security uses IPsec.
Windows 7 builds upon the foundation of Windows Vista by adding new features and enhancements to Windows Firewall with Advanced Security. This section begins by outlining the improvements introduced previously in Windows Vista followed by a summary of the new improvements added in Windows 7. The section then continues by describing the underlying architecture of Windows Firewall with Advanced Security and how it works. Unless otherwise indicated, Windows Firewall and IPsec features available in Windows 7 are also available in Windows Server 2008 R2.
In this tutorial:
- Configuring Windows Firewall and IPsec
- Understanding Windows Firewall with Advanced Security
- Improvements to Windows Firewall Introduced Previously in Windows Vista
- Additional Improvements to Windows Firewall in Windows 7
- Understanding the Windows Filtering Platform
- Windows Firewall and the Startup Process
- Understanding Windows Service Hardening
- Understanding Service SIDs
- Windows Firewall and WSH
- Windows Firewall and Service Triggers
- Understanding Multiple Active Firewall Profiles
- Understanding Rules
- Understanding Firewall Rules
- Inbound vs . Outbound Rules
- Allow vs . Block Rules
- Allow If Secure Rules
- Authenticated Bypass Rules
- Filtering Conditions FOR Firewall RULES
- Understanding Connection Security Rules
- Types of Connection Security Rules
- Supported IPsec Settings for Connection Security Rules
- Default IPsec Settings for Connection Security Rules
- Windows Firewall and Windows PE
- Understanding Default Rules
- Understanding WSH Rules
- Understanding Rules Processing
- Managing Windows Firewall with Advanced Security
- Tools for Managing Windows Firewall with Advanced Security
- Managing Windows Firewall Using Control Panel
- Managing Windows Firewall Using the Windows Firewall with Advanced Security Snap-in
- Managing Windows Firewall Using Group Policy
- Considerations When Managing Windows Firewall Using Group Policy
- Managing Windows Firewall Using the Netsh Command
- Common Management Tasks
- Enabling or Disabling Windows Firewall
- Configuring Firewall Profiles and IPsec Settings by Using Group Policy
- Creating and Configuring Firewall Rules
- Creating and Configuring Connection Security Rules
- Monitoring Windows Firewall
- Troubleshooting Windows Firewall
- Troubleshooting Windows Firewall Using Firewall Logs
- Troubleshooting Windows Firewall Using Event Logs
- Troubleshooting Windows Firewall Using Auditing
- Troubleshooting IPsec Issues Using Netsh Wfp
- Troubleshooting Windows Filtering Platform and IPsec Issues Using Netsh Trace