Solved

Restrict Access to Server 2008 R2 by IP Address

Posted on 2009-06-29
3
709 Views
Last Modified: 2012-05-07
I have a new installation of Server 2008 r2 and I'm trying to figure out the firewall.

I thought I'd start simple... restricting access by IP address of the computer trying to connect to it.

But I don't see how to do that.  The list of pre-existing inbound and outbound rules is pretty daunting.

I'd like to turn them all off and just start with one simple rule, restricting access by IP address of source.

Anybody know how to do that?

Thanks.
0
Comment
Question by:gateguard
  • 3
3 Comments
 
LVL 11

Expert Comment

by:loftyworm
ID: 24737922
IPSec is how I would do it
 Although you can do this through the firewall.
0
 
LVL 11

Expert Comment

by:loftyworm
ID: 24737940
If you want to do this through the firewall, go to
Control Panel
Firewall
Change settings
Select 'add program' or 'Add Port'
Change scope

the examples tell the formatting.
0
 
LVL 11

Accepted Solution

by:
loftyworm earned 500 total points
ID: 24737992
I haven't read it through completly, but this looks like a nice IPSec setup for 2008
http://blogs.techrepublic.com.com/networking/?p=481
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

We recently had an issue where out of nowhere, end users started indicating that their logins to our terminal server were just showing a "blank screen." After checking the usual suspects -- profiles, shell=explorer.exe in the registry, userinit.exe,…
A safe way to clean winsxs folder from your windows server 2008 R2 editions
This tutorial will walk an individual through the steps necessary to configure their installation of BackupExec 2012 to use network shared disk space. Verify that the path to the shared storage is valid and that data can be written to that location:…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…

791 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question