反馈已提交

网络繁忙

You are viewing 5.1 help doc. More details are displayed in the latest help doc.

Windows Server Setting inbound and outbound rules

  • Recent Updates: August 29, 2022
  • I.  Overview

    1. application scenario

    After the project is deployed to the windows system, the windows system needs to open the project port so that the project address can be accessed by other computers.

    2. introduction to entry and exit rules of windows system

    1) Windows system default rules: block inbound connections by default and allow outbound connections by default. That is to say, for all inbound connections, any program and port must configure inbound rules on the firewall, otherwise it will be prohibited.

    2) The rule scanning of windows firewall has its own specific order. Its priority is: only allow secure connections > block connections > allow connections > Default Rules (if not set, it is the default block).

    3) Outbound rules: outbound rules are used to restrict external access. That is to say, if the request object is prohibited from the local machine, the request will be intercepted. The expression is network disconnection.

    4) Inbound rule: the inbound rule is used to restrict the remote host from accessing the local service, that is, if the requested program or specific port is restricted in the request received by the local machine, the request will be intercepted.

    II. Operation steps

    In this paper, the inbound rule setting is taken as an example. The outbound rule setting is consistent with the inbound rule setting.

    1. open settings

    Open「Control Panel > System and Security > Windows Defender Firewall > Advanced settings」, as shown in the following figure:

    2. new inbound rule

    1) new rule (take port as an example)

    Click 「Inbound Rules > New Rule > Port」, as shown in the following figure:

    2)

    2) designated port

    As shown in the following figure:

    Note: selecting "all local ports" means that all ports are open.

    3) select connection operation

    As shown in the following figure:

    According to the requirements, you need to open the port and select allow connection.

    4) select the effective range of rules

    As shown in the following figure:

    5) definition of rule name

    As shown in the following figure:

    3. effect viewing

    As shown in the following figure:

    The above rules define that remote hosts are allowed to access local services and only open ports are allowed; Requests to access other ports are blocked.

    III. Precautions

    • The premise for the entry and exit rules to take effect is that the firewall is open.

    • The ECS needs to set additional security groups and open relevant ports.

    Attachment List


    Theme: Deployment Integration
    Already the First
    Already the Last
    • Helpful
    • Not helpful
    • Only read

    售前咨询电话

    400-811-8890转1

    在线技术支持

    在线QQ:800049425

    热线电话:400-811-8890转2

    总裁办24H投诉

    热线电话:173-1278-1526

    文 档反 馈

    鼠标选中内容,快速反馈问题

    鼠标选中存在疑惑的内容,即可快速反馈问题,我们将会跟进处理。

    不再提示

    10s后关闭