Solved

How to command-modify my firewall rule?  Win 2008 Adv Firewall

Posted on 2012-03-19
4
597 Views
Last Modified: 2015-03-04
Advanced Firewall on Windows 2008 R2 server

GIven my firewall rule:  BlockSpammers

How can I add an IP address to the scope via a command line, script, etc...other than going into the GUI?

I see no way to modify a rule with netsh advfirewall.   Can someone post me an example of modifying a FW rule (adding an IP to its scope) using a script?

Thanks!
0
Comment
Question by:arthurh88
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 8

Expert Comment

by:barrykfl
ID: 37740526
0
 

Author Comment

by:arthurh88
ID: 37740549
but i already mentioned netsh in my question.  i can find no example of netsh to add an IP to the scope of an existing rule.  do you have an example?
0
 
LVL 38

Accepted Solution

by:
ChiefIT earned 500 total points
ID: 37740574
The problem with a spammer is they use spam bots on a botnet to spam others. This does two things for a spammer:

1) hides their true identity by using a victimized computer from an unsuspecting person within the botnet
2) makes it difficult to make an IP based filter to filter out spammers.

Your best bet is to buy a hardware spam filtering solution like a mxgaurddog, or mailwasher. This views the subject and often the text of a message to determine if it follows certain text and patters of a known spam..

Hiding behind an IP filter of a firewall is really not going to help you in many cases, UNLESS all you use your email for is INTERNAL MAIL. Then you can block all external mail from entering into your network from external sources.
0
 

Expert Comment

by:Ben Conner
ID: 40644746
While this has already been closed, can anyone provide a sample netsh command requested by the original poster?  There are other reasons one might want this capability.

Thanks!

--Ben
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Background Information Recently I have fixed file server permission issues for one of my client. The client has 1800 users and one Windows Server 2008 R2 domain joined file server with 12 TB of data, 250+ shared folders and the folder structure i…
This is the first one of a series of articles I’ll be writing to address technical issues that are always referred to as network problems. The network boundaries have changed, therefore having an understanding of how each piece in the network  puzzl…
This tutorial will show how to push an installation of Backup Exec to an additional server in both 2012 and 2014 versions of the software. Click on the Backup Exec button in the upper left corner. From here, select Installation and Licensing, then I…
This tutorial will walk an individual through the steps necessary to enable the VMware\Hyper-V licensed feature of Backup Exec 2012. In addition, how to add a VMware server and configure a backup job. The first step is to acquire the necessary licen…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question