How to set IP Security policy The Trojan is blocked at the end

Source: Internet
Author: User

Set IP Security Policy The Trojan is blocked at the end

"Trojan Horse" a user headache word, they silent into our system, people are impossible to guard against. When the Trojans quietly open a "door" (port), uninvited guests will be unknown to the intrusion of your computer. If you are planted in the Trojan actually also need not worry, first we have to cut off their contact with the outside (that is, blocking suspicious port).

In the win 2000/xp/2003 system, Microsoft Management Console (MMC) has pooled the system's configuration capabilities into a configuration module, making it much easier for us to make special settings (for example, the operating system is Windows XP for 23 ports that Telnet uses).

Operation Steps

The "Console 1" window pops up when you first click "Run" to enter "MMC" in the box and then return. We select "file → add/remove snap-in →" click "Add ' →ip Security Policy Management" in the Separate tab bar, and finally follow the prompts to complete the operation. At this point, we have added "IP Security policy, Local computer" (hereinafter referred to as "IP Security Policy") to the "Console root node".

Now double-click IP Security Policy to create a new administrative rule. Right-click IP Security Policy and choose Create IP Security Policy from the shortcut menu that pops up. Open the IP Security Policy Wizard and click next → name defaults to ' New IP Security policy ' → next → do not have to select ' Activate the default response rule ' (Note: When clicking Next, you need to confirm that the "properties" Selected), and then select "Finish → in" New IP Security policy properties → add → do not have to choose ' Use Add Wizard '.

At the source address of the addressing bar, select "Any IP address", and the destination address selects "My IP Address" (No mirroring is selected). In the Protocol tab bar, note that the type should be TCP and set the IP protocol port from any port to this port 23, and then click OK. In the IP filter list, a new IP filter appears, select it, switch to the Filter Action tab bar, click add → name defaults to ' new filter action ' → add → stop → complete.

The new policy needs to be activated to work by right-clicking on the new IP security policy and assigning the policy just developed.

Effect

Now, when we telnet from another computer to the fortified one, the system will report a login failure. Scanning the computer with the scan tool will find that 23 ports are still serving. In the same way, you can kill any other suspicious port.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.