Windows firewall block all connection

Windows firewall block all connection

This forum has migrated to Microsoft Q&A. Visit Microsoft Q&A to post new questions.

Answered by:

Question

I’ve got a problem during a Windows 7 deployment project. We want to configure the integrated Windows Firewall to block all outbound network traffic when the client is on a «public» network (public firewall profile). We only want to open the necessary ports that are needed for a VPN into the enterprise environment. These are in our situation DHCP, DNS, different rules for CRLs (for checking the client certificate) and the rules for the VPN itself. These rules are working well, but we have got a problem with the network profile identification.

We configured the firewall with a GPO, that all unknown networks are identified as public networks. The user can’t change the network profile to «Home» or «Work». So the network profiles can only be «public» or «domain».

We have a problem by opening only the ports mentioned above. When our client was on a «public» network it can’t find the way back to the domain profile. This may has something to do with the network identification by Network Location Awareness (NLA). Therefore we logged all dropped packages and found out there were many dropped packages on the following ports:

— 389 (TCP/UDP)
— 135, 137, 138 (UDP/TCP)
— 88 (Kerberos)
— 15032 .

We opened port 389 for UDP and TCP. After that we can sucessfully jump between public networks and the domain network.

But when we are on a public network and connecting to the VPN, the VPN network adapter do not find the way to the «domain» profile. It stays always on the «public» profile. Afterwards we opened the port 88 (Kerberos) and then the network profile on the VPN adapter changed to public with a yellow exclamation mark as the profile icon and the status «(Not authenticated)».

After opening the NetBios ports (135. ) and the strange port 15032, the VPN network adapter could change to the domain profile.

Can anyone tell me which ports are needed for a correct network profile identification by Network Location Awareness (NLA)? And why are these ports needed? It is very important for us to have a clear statement why we should open all these ports, because it is a high secure environment.

I hope you can help me with this problem. I can’t find any documentation from Microsoft about blocking all outbound connections in Windows Firewall.

Thanks a lot!
fox

Answers

Generally speaking, blocking all «outbound» traffic can be very problematic and is not typically recommended. You need to to know and control every port used for communications on the network. For applications that use RPC, this means restricting the ports on which communication can occur.

For more on controlling this behavior, see the following article «How to configure RPC dynamic port allocation to work with firewalls»
http://support.microsoft.com/kb/154596

Читайте также:  Что такое фрамеворк для windows

Though it may not be acceptable due to being a high security environment, you might consider testing a rule allowing all, or at least a wider range of, traffic to the specific IP of the authenticating DC. AuthIP can be tested to enhance security by requiring that a security principle be authenticated before allowing the connection. This is still not without risk if the box is compromised, but then again so are any open ports.

VPN virtual adaptors can also pose a unique challenge. 3rd Party vendors can often times present unique behaviors in the face of NLA. Some, totally ignore the process and will always follow the profile of the physical adaptor. Others, implement a block on all traffic other than what you specifically allow. Still others, force interface configuration information that prevents NLA from operating. It is not stated here, and we may be using the Windows native client making this a moot point, but I offer the info merely to illustrate the added level of complexity introduced by virtual adaptors.

DNS 53, Kerb 88, and LDAP 389 are required for resolving and connecting to the Domain Controller, but you may also see traffic from various name resolution / registration providers, such as NbtNs, LLMNR, WSDiscovery, SSDP, etc. Additional traffic may be required for the VPN authentication. The 15032 is an unknown, but it may be something specific to that box, perhaps even specific to the VPN client software itself if using 3rd party, or RPC. More information from a trace taken using Network Monitor 3.4 may be helpful, for example; additional detail about the frame and the destination IP might provide a little insight. With NetMon you can also add the «Process» column which may help identify the generating process.

Ketan Thakkar | Microsoft Online Community Support

Block Outgoing Connections to the Internet with Windows Firewall

By default, Windows Firewall blocks incoming connections from the Internet unless the receiving program is on the exceptions list, but it does nothing to stop outgoing connections. Even if you uncheck or remove the program from the exceptions list, this change only affects incoming traffic, so the program can still access the Internet.

If you’re worried what a program might do with that privilege, such as sending error reports, submitting user data or automatically updating itself, you can block it with outbound rules through the firewall’s advanced settings. Once a blocking rule has been established, it remains on the list of configured rules, so you can quickly enable or disable it to control the program’s access.

Adding Connection Rules

1. Open the Control Panel (press “Win-X,” then select “Control Panel”) and click “System and Security,” “Windows Firewall” and then “Advanced Settings.”

2. Click “Outbound Rules” in the left pane and select “New Rule” in the right pane. To block incoming traffic, click “Inbound Rules” instead; the procedure for creating a new blocking rule is identical for inbound or outbound rules, except for the initial Inbound Rules or Outbound Rules selection.

3. Select “Program” and click “Next.”

Читайте также:  Файловые системы ос linux ext2 ext3 ext4

4. Select “This Program Path,” click “Browse,” choose the program you wish to block and then click “Next.” If you choose “All Programs,” then Windows Firewall stops all outgoing (or incoming) connections.

5. Select “Block the Connection” and click “Next.”

6. Check when you want the rule applied and click “Next.” To totally block the program, select all the check boxes. If you only want to block the program when connected to, for example, a coffee shop’s public hotspot, only check “Public.”

7. Enter a descriptive name and click “Finish.” If you are establishing similar rules, make sure this name enables you to tell them apart, such as “Block Installed Chrome” versus “Block Chrome Portable.”

8. Test that the program is blocked by firing it up and attempting to access the Internet.

9. To later disable the rule, click the entry in the Inbound or Outbound Rules list and click “Disable Rule” in the lower right panel. If you see “Enable Rule” instead, it means the rule is currently disabled; click “Enable Rule” to make it active again.

10. Repeat the process, but select “Inbound Rules” in Step 2 to also block incoming traffic to the program.

Steps to Block All Outgoing Connections in Windows Firewall

Windows Firewall allows you to block all outgoing connections to restrict applications from connecting to the internet. Here’s how.

Windows comes with a default firewall application that gives you granular control over the internet access and also allows you to configure all the incoming and outgoing connections. By default, the Windows firewall is configured to allow all outgoing connections unless they are blacklisted and block all incoming connections unless they are whitelisted.

Most Windows programs have almost unrestricted access to outgoing connections. This means that the applications can phone home and perform other activities without any restrictions.

If you don’t like this behavior then you can use the Windows Firewall options to block all outgoing connections. Blocking oubound connections is helpful when you want granular control over which applications can send data over the internet.

The method shown below is verified to work with Windows 10, 8, & 7. Before making any changes, I strongly recommend you to backup Windows Firewall settings.

Steps to Block All Outgoing Connections with Windows Firewall

These are the steps you should follow to block outgoing connections in Windows Firewall.

  1. Open the Start menu.
  2. Search for “Windows Defender Firewall” and open it.
  3. Click on the “Advanced Settings” link in the Firewall application.
  4. Here, select the “Windows Defender Firewall with Advanced Security on Local Computer” option on the left panel.
  5. Click on the “Windows Defender Firewall Properties” link in the middle panel.
  6. In the Firewall properties window, go to the profile tab of your choice.
    • Domain profile tab: If the system is joined in a domain.
    • Private profile tab: If the system is connected to a private network (like home or office network).
    • Public profile tab: If the system is connected to a public network (like a coffee shop WiFi)

In my case, I’m selecting the Private profile tab because I’m connected to a private network. For a vast majority of users, this is the option to select.

  • Here, select “Block” from the drop-down menu next to “Outbound connections“.
  • Click on the “Apply” and “Ok” buttons to save changes.
  • Close Windows Firewall application.
  • The changes are instant. From now on, all outbound connections are blocked and applications cannot send any data over the network.

    Whitelist Applications to Allow Outbound Connections

    To allow outgoing connections for specific applications, you need to manually whitelist them. Whitelisted application takes priority over the general block rule for outbound connections. For example, maybe you want the Chrome browser to work even when you blocked the outbound connections.

    Follow these steps to whitelist applications for outbound connections.

    1. Open Windows Firewall.
    2. Click on the “Advanced Settings” link.
    3. Select “Outbound rules” on the left panel.
    4. Click on the “New rule” option in the right panel.
    5. Select “Program” and click “Next“.
    6. Select “This program path” and click “Browse“.
    7. Find the application’s exe file, select it, and click on the “Open” button.
    8. Click “Next“.
    9. Select “Allow this connection” and click “Next“.
    10. Select Domain, Private, and Public checkboxes and click “Next“.
    11. Name the rule and click “Finish“.

    As soon as you click the Finish button, the outbound rule will be created and applied to the firewall. From now, the whitelisted application should be able to send data over the network even if the outbound connections are blocked.

    FIXED: Some Applications can Still Connect to the Internet After Blocking Outgoing Connections

    Even after block all outbound connections, some applications can still send data over the network. For example, most built-in Windows applications and services can send data over the network. This is because those applications are whitelisted by the system.

    If you don’t want those applications accessing the outgoing connections, you have to manually disable the outbound rule for those applications in the Firewall settings. Let me show you how.

    1. Open the Windows Firewall application.
    2. On the left panel, click on the “Advanced Settings” link.
    3. Here, select the “Outbound Rules” option on the left panel.
    4. In the middle panel, find the rule related to the application you want to block.
    5. For example, I want to block the Windows 10 Email app. So, I selected it.
    6. Right-click on the rule and select the “Disable Rule” option.

    That is it. The changes are instant. For demonstration purposes, I also blocked the outbound rule for the legacy Edge browser. As you can see from the image below, it cannot connect to the internet due to the restriction of the outgoing rule. Do this to all the applications you don’t want connecting to the internet.

    I hope that helps. If you are stuck or need some help, comment below and I will try to help as much as possible.

    Читайте также:  Можно ли снести windows 10
    Оцените статью