tailieunhanh - Configuring Windows 7 (Training Kit) - Part 43
Configuring Windows 7 (Training Kit) - Part 43. This training kit is designed for IT professionals who operate in enterprise enviroments that use Windows 7 as a desktop operating system. You should have at least one year of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment. | 3. If you want to limit the remote IP address that the rule applies to for example when you want the rule to only apply to inbound traffic from a specific subnet select the These IP Addresses option under Remote IP Addresses and click Add to specify the individual IP addresses network address or IP address range. You can use the Advanced options of a rule s properties to specify which network interfaces the rule applies to. This is similar to limiting the local IP addresses that the rule applies to except it is done by selecting a particular device not the address attached to that device. On the Advanced tab you can also configure how a rule responds to traffic that has passed through an edge device such as a Network Address Translation NAT router. The options are Block edge traversal When selected the target of the rule is blocked from receiving unsolicited traffic from the Internet through a NAT device. Allow edge traversal When selected the target of the rule will process unsolicited traffic directly from the Internet through a NAT device. Defer to user When selected the user receives a message informing them of incoming traffic from a NAT device. If the user has sufficient privileges they can block or allow communication manually. Defer to application When selected application settings determine whether incoming traffic from a NAT device is accepted or rejected. Connection Security Rules Connection security rules are a special type of rule that deal with authenticated and encrypted traffic. You can use connection security rules to manage how communication occurs between different hosts on the network. You use the New Connection Security Rule Wizard shown in Figure 7-10 to create connection security rules. Connections can be authenticated using the Kerberos V5 protocol requiring a domain computer and user account or a domain computer account. If you select advanced properties connections can be authenticated using NTLMv2 computer certificates from a particular .
đang nạp các trang xem trước