TAILIEUCHUNG - Configuring Windows 7 (Training Kit) - Part 43

Configuring Windows 7 (Training Kit) - Part 43. This training kit is designed for IT professionals who operate in enterprise enviroments that use Windows 7 as a desktop operating system. You should have at least one year of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment. | 3. If you want to limit the remote IP address that the rule applies to for example when you want the rule to only apply to inbound traffic from a specific subnet select the These IP Addresses option under Remote IP Addresses and click Add to specify the individual IP addresses network address or IP address range. You can use the Advanced options of a rule s properties to specify which network interfaces the rule applies to. This is similar to limiting the local IP addresses that the rule applies to except it is done by selecting a particular device not the address attached to that device. On the Advanced tab you can also configure how a rule responds to traffic that has passed through an edge device such as a Network Address Translation NAT router. The options are Block edge traversal When selected the target of the rule is blocked from receiving unsolicited traffic from the Internet through a NAT device. Allow edge traversal When selected the target of the rule will process unsolicited traffic directly from the Internet through a NAT device. Defer to user When selected the user receives a message informing them of incoming traffic from a NAT device. If the user has sufficient privileges they can block or allow communication manually. Defer to application When selected application settings determine whether incoming traffic from a NAT device is accepted or rejected. Connection Security Rules Connection security rules are a special type of rule that deal with authenticated and encrypted traffic. You can use connection security rules to manage how communication occurs between different hosts on the network. You use the New Connection Security Rule Wizard shown in Figure 7-10 to create connection security rules. Connections can be authenticated using the Kerberos V5 protocol requiring a domain computer and user account or a domain computer account. If you select advanced properties connections can be authenticated using NTLMv2 computer certificates from a particular .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.