Table of Contents

Windows - Firewall

About

Network - Firewall in Windows

Default

Windows has a built-in firewall that blocks inbound connections.

Default Windows Firewall Rule

Profile

netsh advfirewall show currentprofile
Domain Profile Settings:
----------------------------------------------------------------------
State                                 ON
Firewall Policy                       BlockInbound,AllowOutbound
LocalFirewallRules                    N/A (GPO-store only)
LocalConSecRules                      N/A (GPO-store only)
InboundUserNotification               Enable
RemoteManagement                      Disable
UnicastResponseToMulticast            Enable

Logging:
LogAllowedConnections                 Disable
LogDroppedConnections                 Disable
FileName                              %systemroot%\system32\LogFiles\Firewall\pfirewall.log
MaxFileSize                           4096

Ok.

Local Rule Applied

Firewall Windows Local Rules Applied

One liner to get the config for all profiles with Windows - netsh (Netshell)

netsh advfirewall monitor show firewall
Public Profile Settings:
----------------------------------------------------------------------
State                                 ON
Firewall Policy                       BlockInbound,AllowOutbound
LocalFirewallRules                    Enable
LocalConSecRules                      Enable
InboundUserNotification               Enable
RemoteManagement                      Disable
UnicastResponseToMulticast            Enable

Logging:
LogAllowedConnections                 Disable
LogDroppedConnections                 Disable
FileName                              %systemroot%\system32\LogFiles\Firewall\pfirewall.log
MaxFileSize                           4096

Rules Properties

Configuration Properties for a rule

Outbound vs Inbound

Profile

netsh advfirewall monitor show currentprofile
Domain Profile:
----------------------------------------------------------------------
HotITem.local
Ok.

Order of precedence (Priority)

As soon as a network packet matches a rule, that rule is applied, and processing stops.

Windows Firewall Override Block Rules

Utility

netsh advfirewall ... # where advfirewall is the context

Rules Procedure for a Web Server

Program Tcp Port

Documentation / Reference