Beruflich Dokumente
Kultur Dokumente
Query firewall rules: One of the first things you'll probably need to use netsh
for is to discover Windows Firewall's current configuration properties. You can
query Windows Firewall settings using the following netsh command:
2. Enable Remote Desktop Connection: One of the first things I do with most of
the server systems I set up is enable Remote Desktop Connection for easy remote
systems management. The following command shows how to use netsh to open
Windows Firewall for Remote Desktop Connections:
netsh advfirewall firewall set rule group="remote desktop" new enable=Yes
1. Export and import firewall settings: After you get Windows Firewall
configured, it's a good idea to export your settings so that you can easily reapply
them later or import them into another system. In the following netsh commands,
you can see how to export and then import your Windows Firewall configuration:
netsh advfirewall export "C:\temp\WFconfiguration.wfw"
netsh advfirewall import "C:\temp\WFconfiguration.wfw"
Enabling RDP through the Command Prompt will not configure the Windows
Firewall with the appropriate ports to allow RDP connections.
Netsh advfirewall firewall set rule group=”remote desktop” new enable=yes
Causes:
When SQL Server is installed with replication services, the default configuration
marks SQL server to use dynamic ports.
Solution:
These are the steps you need to perform to enable SQL Server to communicate
over static port 1433.
Step 1 : On the server running SQL Server, start SQL Server Configuration
Manager. (This tool configure network protocols for SQL Server) -
Start Menu >> All Programs >> Microsoft SQL Server <version> >> SQL Server
configuration Tools >>SQL Server Configuration Manager
Step 2 : From the SQL Server Configuration manager, scroll down to SQL
Network Configuration option and select the node "Protocols for
AUTODESKVAULT". Then on the right pane, right click on "TCP/IP" and
navigate to the "IP Addresses" Tab.
Step 3 : On the TCP/IP properties configuration window, scroll down to the last
option on "IPALL" configuration and empty the values for the 'TCP Dynamic
Ports' if any and type in the port number 1433 on the TCP Port text box
Click Apply.
INTRODUCTION
This context also provides functionality for more precise control of firewall rules.
These rules include the following per-profile settings:
Domain
Private
Public
The netsh firewall command-line context might be deprecated in a future version
of the Windows operating system. We recommend that you use the netsh
advfirewall firewall context to control firewall behavior.
Note The netsh firewall command line is not recommended for use in Windows
Vista.
This article describes how to use the netsh advfirewall firewall context instead of
the netsh firewallcontext to control Windows Firewall behavior in Windows Server
2008 and in Windows Vista.
More Information
Important If you are a member of the Administrators group, and User Account
Control is enabled on your computer, run the commands from a command prompt
with elevated permissions. To start a command prompt with elevated permissions,
find the icon or Start menu entry that you use to start a command prompt session,
right-click it, and then click Run as administrator.
Some examples of frequently used commands are provided in the following tables.
You can use these examples to help you migrate from the older netsh
firewall context to the new netsh advfirewall firewall context.
Additionally, the netsh advfirewall commands that you can use to obtain detailed
inline help are provided.
For more information about how to add firewall rules, run the following command:
netsh advfirewall firewall add rule ?
Domainprofile
Privateprofile
Publicprofile
Example 6: Enable Windows Firewall
Domainprofile
Privateprofile
Publicprofile