Solved

Block a range of IP's on IIS 6.0 - HELP!

Posted on 2004-04-26
3
1,470 Views
Last Modified: 2008-03-10
I Need to block a range of IP's from using my service, and it's a big range, so i don't want to add them 1 by 1.

I am using MS WINDOWS SERVER 2003, IIS 6.0


Any comments are welcomed
0
Comment
Question by:jamie37
3 Comments
 
LVL 8

Assisted Solution

by:anil_u
anil_u earned 100 total points
Comment Utility
You can restrict access to your site through TCP/IP address restrictions.
for example, if you want to block ftp using an ip range, then you can deny all access to your FTP site (FTP site Properties | Directory Security tab), then grant access to the IP addresses or address ranges you want. This way, they will be the only ones with access.


Background Info:
http://www.microsoft.com/resources/documentation/WindowsServ/2003/all/deployguide/en-us/Default.asp?url=/resources/documentation/WindowsServ/2003/all/deployguide/en-us/iisdg_sec_jhmp.asp

Further Info:
http://www.iisfaq.com/
0
 

Accepted Solution

by:
fgejo earned 100 total points
Comment Utility
To deny access to resources for a group of computers

In IIS Manager, expand the local computer, right-click a Web site, directory, or file you want to configure, and click Properties.
Click the Directory Security or File Security tab. In the IP address and domain name restrictions section, click Edit.
Click Denied access.
When you select Denied access, you deny access to all computers and domains, except to those that you specifically grant access.
Click Add.
Click Group of computers.
In the Network ID box, type the IP address of the host computer.
In the Subnet mask box, type the subnet ID for the computer you want grant or deny access to.
Click OK three times.
0
 

Author Comment

by:jamie37
Comment Utility
Thanks!
0

Featured Post

How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

Join & Write a Comment

This story has been written with permission from the scammed victim, a valued client of mine – identity protected by request.
Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now