Manuals - Manually Configuring Windows Firewall in Windows XP Service Pack 2

Windows XP Service Pack 2 (SP2), now in Beta testing, includes the new Windows Firewall, previously known as the Internet Connection Firewall (ICF). Windows Firewall is a stateful host-based firewall that drops all unsolicited incoming traffic that does not correspond to either traffic sent in response to a request of the computer (solicited traffic) or unsolicited traffic that has been specified as allowed (excepted traffic). Windows Firewall provides a level of protection from malicious users and programs that rely on unsolicited incoming traffic to attack computers on a network.

In Windows XP SP2, there are many new features for Windows Firewall, including the following:

  • Enabled by default for all the connections of the computer
  • New global configuration options that apply to all connections
  • New set of dialog boxes for local configuration
  • Excepted traffic can be specified by scope
  • Excepted traffic can be specified by application filename
  • Built-in support for Internet Protocol version 6 (IPv6) traffic
  • New configuration options with Netsh and Group Policy
  • New operating mode
  • Enabled by default for all the connections of the computer
  • Startup security

This manual describes in detail the set of dialog boxes to manually configure the new Windows Firewall. Unlike ICF in Windows XP (prior to SP2), the configuration dialog boxes configure both IPv4 and IPv6 traffic.

The settings for ICF in Windows XP (prior to SP2) consist of a single checkbox (the Protect my computer and network by limiting or preventing access to this computer from the Internet check box on the Advanced tab of the properties of a connection) and a Settings button from which you can configure excepted traffic, logging settings, and allowed ICMP traffic.

In Windows XP SP2, the check box on the Advanced tab of the properties of a connection has been replaced with a Settings button from which you can configure general settings, permissions for programs and services, connection-specific settings, log settings, and allowed ICMP traffic. The Settings button launches the new Windows Firewall Control Panel applet, which is also available from the Network and Internet Connections and Security Center categories of Control Panel.

The new Windows Firewall dialog box contains the following tabs:

  • General
  • Exceptions
  • Advanced

General Tab

The General tab with its default settings is shown in picture 1.

Picture 1
  • On (recommended)
    Select to enable Windows Firewall for all of the network connections that are selected on the Advanced tab. Windows Firewall is enabled to allow only solicited and excepted incoming traffic. Excepted traffic is configured on the Exceptions tab.
     
  • Don’t allow exceptions
    Click to allow only solicited incoming traffic. Excepted incoming traffic is not allowed. The settings on the Exceptions tab are ignored and all of the network connections are protected, regardless of the settings on the Advanced tab.
     
  • Off (not recommended)
    Select to disable Windows Firewall. This is not recommended, especially for network connections that are directly accessible from the Internet, unless you are already using a third-party host firewall product.

Notice that the default setting for Windows Firewall is On (recommended) for all the connections of a computer running Windows XP SP2 and for newly created connections. This can impact the communications of programs or services that rely on unsolicited incoming traffic. In this case, you must identify those programs that are no longer working and add them or their traffic as excepted traffic. Many programs, such as Internet browsers and email clients (such as Outlook Express), do not rely on unsolicited incoming traffic and operate properly with Windows Firewall enabled.

If you are using Group Policy to configure Windows Firewall for computers running Windows XP SP2, the Group Policy settings you configure might not allow local configuration. In this case, the options on the General tab and the other tabs might be grayed out and unavailable, even when you log on with an account that is a member of the local Administrators group (a local administrator).

Group Policy-based Windows Firewall settings allow you to configure a domain profile (a set of Windows Firewall settings that are applied when you are attached to a network that contains domain controllers) and standard profile (a set of Windows Firewall settings that are applied when you are attached to a network that does not contain domain controllers, such as the Internet). The configuration dialog boxes only display the Windows Firewall settings of the currently applied profile. To view the settings of the profile that are not currently applied, use netsh firewall show commands. To change the settings of the profile that are not currently applied, use netsh firewall set commands.

Exceptions Tab

The Exceptions tab with its default settings is shown in picture 2.

Picture 2

From the Exceptions tab, you can enable or disable an existing program or service or maintain the list of programs and services that define excepted traffic. The excepted traffic is not allowed when the Don’t allow exceptions option is selected on the General tab.

With Windows XP (prior to SP2), you could define the excepted traffic only in terms of Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) ports. With Windows XP SP2, you can define excepted traffic in terms of TCP and UDP ports or by the file name of a program or service. This configuration flexibility makes it easier to configure excepted traffic when the TCP or UDP ports of the program or service are not known or are dynamically determined when the program or service is started.

There are a set of preconfigured programs and services, which include:

  • File and Print Sharing
  • Remote Assistance (enabled by default)
  • Remote Desktop
  • UPnP framework

These predefined programs and services cannot be deleted.

If allowed by Group Policy, you can create additional exceptions based on specifying a program name by clicking Add Program and exceptions based on specifying a TCP or UDP port by clicking AddPort.

When you click Add Program, the Add Program dialog box is displayed from which you can select a program or browse for a program’s file name. An example is shown in picture 3.

Picture 3

When you click AddPort, the Add a Port dialog box is displayed, from which you can configure a TCP or UDP port. An example is shown in picture 4.

Picture 4

The new Windows Firewall allows you to specify the scope of excepted traffic. The scope defines the portion of the network from which the excepted traffic is allowed to originate. To define the scope for a program or port, click Change Scope. An example is shown in picture 5.

Picture 5

You have three options when defining the scope for a program or a port:

  • Any computer (including those on the Internet)
    Excepted traffic is allowed from any IPv4 address. This setting might make your computer vulnerable to attacks from malicious users or programs on the Internet.
     
  • My network (subnet) only
    Excepted traffic is allowed only from an IPv4 address that matches the local network segment (subnet) to which the network connection that received the traffic is attached. For example, if the network connection is configured with an IPv4 address of 192.168.0.99 with a subnet mask of 255.255.0.0, excepted traffic is only allowed from IPv4 addresses in the range 192.168.0.1 to 192.168.255.254.
     
  • Custom list
    You can specify one or more IPv4 addresses or IPv4 address ranges separated by commas. IPv4 address ranges typically correspond to subnets. For IPv4 addresses, type the IPv4 address in dotted decimal notation. For IPv4 address ranges, you can specify the range using a dotted decimal subnet mask or a prefix length. When you use a dotted decimal subnet mask, you can specify the range as an IPv4 network ID (such as 10.47.81.0/255.255.255.0) or by using an IPv4 address within the range (such as 10.47.81.231/255.255.255.0). When you use a network prefix length, you can specify the range as an IPv4 network ID (such as 10.47.81.0/24) or by using an IPv4 address within the range (such as 10.47.81.231/24). An example custom list is the following: 10.91.12.56, 10.7.14.9/255.255.255.0, 10.116.45.0/255.255.255.0, 172.16.31.11/24, 172.16.111.0/24.

The My network (subnet) only scope is useful when you want to allow access to a program or service for the computers on a local home network that are all connected to the same subnet, but not to potentially malicious Internet users.

Once the program or port is added, it is disabled by default in the Programs and Services list.

All of the programs or services enabled from the Exceptions tab are enabled for all of the connections that are selected on the Advanced tab.


Advanced Tab

The Advanced tab is shown in picture 6.

Picture 6

The Advanced tab contains the following sections:

  • Network Connection Settings
  • Security Logging
  • ICMP
  • Default Settings

Network Connections Settings

In Network Connection Settings, you can:

  • Specify the set of interfaces on which Windows Firewall is enabled. To enable, select the check box next to the network connection name. To disable, clear the check box. By default, all of the network connections have Windows Firewall enabled. If a network connection does not appear in this list, then it is not a standard networking connection. Examples include some custom dialers from Internet service providers (ISPs).
  • Configure advanced settings of an individual network connection by clicking the network connection name, and then clicking Settings.

If you clear all of the check boxes in the Network Connection Settings, then Windows Firewall is not protecting your computer, regardless of whether you have selected On (recommended) on the General tab. The settings in Network Connection Settings are ignored if you have selected Don’t allow exceptions on the General tab, in which case all interfaces are protected.

When you click Settings, the Advanced Settings dialog box is displayed, as shown in picture 7.

Picture 7

From the Advanced Settings dialog box, you can configure specific services from the Services tab (by TCP or UDP port only) or enable specific types of ICMP traffic from the ICMP tab. These two tabs are equivalent to the settings tabs for ICF configuration in Windows XP (prior to SP2).

Security Logging

In Security Logging, click Settings to specify the configuration of Windows Firewall logging in the Log Settings dialog box, as shown in picture 8.

Picture 8

From the Log Settings dialog box, you can configure whether to log discarded (dropped) packets or successful connections and specify the name and location of the log file (by default set to Systemroot\pfirewall.log) and its maximum size.

ICMP

In ICMP, click Settings to specify the types of ICMP traffic that are allowed in the ICMP dialog box, as shown in picture 9.

Picture 9

From the ICMP dialog box, you can enable and disable the types of incoming ICMP messages that Windows Firewall allows for all the connections selected on the Advanced tab. ICMP messages are used for diagnostics, reporting error conditions, and configuration. By default, no ICMP messages in the list are allowed.

A common step in troubleshooting connectivity problems is to use the Ping tool to ping the address of the computer to which you are trying to connect. When you ping, you send an ICMP Echo message and get an ICMP Echo Reply message in response. By default, Windows Firewall does not allow incoming ICMP Echo messages and therefore the computer cannot send an ICMP Echo Reply in response. To configure Windows Firewall to allow the incoming ICMP Echo message, you must enable the Allow incoming echo request setting.

Default Settings

Click Restore Defaults to reset Windows Firewall back to its originally installed state. When you click Restore Defaults, you are prompted to verify your decision before Windows Firewall settings are changed.

For more information

For more information about Windows XP SP2, consult the following resources:

 


Author:

Lex van der Horst

Date Added:

06-11-2004

Last Reviewed:

06-11-2004