Solved

how would i configure a rule in windows firewall to allow connections to a url set

Posted on 2012-03-28
5
1,335 Views
Last Modified: 2013-12-02
We have windows server 2011 with windows firewall enabled.  Is there anyway to I can add a rule in windows firewall to allow connections to a url set (similar to ISA 2004)?

Thanks.
0
Comment
Question by:cllocc
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 37779172
Not as such, no.

What you could do would be to use either a local hosts file or similar for the web sites that you want deny setting their ip addresses to 127.0.0.1
0
 

Author Comment

by:cllocc
ID: 37787475
how would I do that?  Also, if I deny setting their ip addresses to 127.0.0.1, would that mean the firewall would allow connections to that site?
0
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 500 total points
ID: 37788447
Do what - create a local hosts file?

127.0.0.1 is the local loop back of the local PC - so if if wanted to block access to www.microsoft.com you would enter that URL into the hosts file with an address of 127.0.0.1 meaning that it would not be found.

The proper way of doing this of course would be via an appropriate product such as forefront TMG.
0
 

Author Comment

by:cllocc
ID: 37788658
Well I want to allow access to docs.live.net and skydrive.live.net

when our ISA firewall was in place, I had configured rules to allow connections to those urls and I was able to sync our onenote notebooks.

However when we migrated to SBS 2k11, our OneNote stopped syncing online and kept reporting that it couldnt connect to the internet.  

So far, ive added rules in windows firewall on our server and on my client machine to allow the program onenote access to all tcp ports and udp ports inbound outbound.  however its still not able to sync
0
 

Author Closing Comment

by:cllocc
ID: 37851193
Thx
0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have been asked to explain on many, many occasions the correct way to setup network cards and DNS settings on ISA Server 2004, 2006 and forefront Threat management gateway (FTMG) and have willing done so. I have also promised my self everytime tha…
So the following errors occurs in 2 ways that I am aware of at this stage, and you receive one of the following error messages: ERROR 1. When trying to save a rule: No Web listener is specified for the Web publishing rule Autodiscovery Publishin…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question