?
Solved

testing MSDE on Win XP SP2

Posted on 2004-04-02
3
Medium Priority
?
220 Views
Last Modified: 2013-12-04
hi all,

i'm testing some of my applications w/c runs on MSDE on the new Windows XP Service Pack2, which actually entails newer & more secure firewall settings.

my application run on both the server & workstations only w/ the firewall switched off.
but the problem comes w/n i have the firewall settings switched on. the applications runs on the server but the workstation applications cannot.

how do i configure my workstations to be in the exception list on the firewall so they can access the server?

i'll already added the workstation's IP address & subnet but still i can't get it connect.

how do i configure my network to use TCP/IP protocol w/ a static port so i can add the workstations to the firewall's exceptions list.

thanks.

praetorean
0
Comment
Question by:praetorean
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 7

Accepted Solution

by:
Chatable earned 200 total points
ID: 10747036
Windows Firewall (formerly known as Internet Connection Firewall) is set by default to block all INCOMING connections and to allow all OUTGOING connections. So your problem is with the machine that is ACCEPTING the connection (I couldn't understand which one from your question, I hope you understand me).
To allow incoming traffic to a specific port, type:
netsh firewall set portopening TCP [portnumber] ENABLE
There is also some ability to filter according to application but I'm not exactly sure how (cause I don't have XP-SP2-RC1). Anyway you can get all Windows Firewall configuration options by typing:
netsh firewall /?
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month11 days, 18 hours left to enroll

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question