Recently, Jelly received "complaints" from several colleagues who reported that they could not access the shared folder of strawberries through their network neighbors. Jelly tried it on their computer. However, access to other computers on a strawberry computer is normal.
But jelly saw the newly installed Skynet firewall, and then he suddenly realized. This firewall blocks everyone out of the door ". It turned out that strawberry had installed a firewall when she worried that her computer would be infected by viruses. According to the requirements of the cainiao, Jelly explained the correct settings of various common firewall software in the LAN.
Skynet Firewall
First of all, we should introduce the "perpetrators" of Skynet firewall (version 2.60. After the firewall is installed, a setting Wizard will pop up. However, many users did not notice this setup wizard and click a few times to complete the installation (strawberry is such a "big horse and tiger"). The incorrect configuration caused a network failure.
If you want to solve a network failure caused by incorrect initial settings, you can call out the wizard again to perform the settings. On the main panel of Skynet firewall, click "system settings". In the "system settings" window that appears, click "Wizard" in "rule Settings" (figure 1 ), the setting wizard is displayed.
Figure 1
In the "Security Level Settings" dialog box, select the security level (users in the LAN can select "low") and then click "Next" to go to the "LAN information Settings" window. If you select "use my computer in LAN", the software will automatically detect the IP address of the Local Machine and display it below. Next, click "Next" to complete the settings.
Jelly prompts that we can only allow a computer in the LAN to access our shared data for the purpose of confidentiality. On the firewall's main panel, click "IP rule management". In the displayed IP rule list, find the rule related to LAN access and double-click it to go to the "IP rule modification" dialog box, set the parameters as shown in figure 2.
Figure 2
Norton Personal Firewall
Click the "Internet region control" option on the left side of the main interface of the software, enter the "Trust Region" tab in the right window, and click the "add" button to open the "specify computer" dialog box. In the dialog box, select "use range" and enter the starting and ending addresses for access.
For example, the IP address range of the jelly office is 172.22.1.2 ~ 172.22.1.253. Now, you only need to enter the start and end IP addresses and click "OK" to enable the settings to take effect. All IP addresses in this segment can access the strawberry computer.
Jelly prompts that we can not include all IP addresses in the CIDR block. You can determine the IP address range based on the actual situation of your local area network.
Jiang min hacker Firewall
Click "IP rule Settings" on the firewall's main interface to bring up the IP rule list. In this IP rule list, you can find two IP rules related to the LAN: "allow the local machine to connect to other machines in the LAN", "other machines in the LAN to access the local machine (TCP) "(Figure 3 ).
Figure 3
If you want to modify the "access the local computer (TCP) by other machines in the LAN" rule, click the edit button corresponding to the rule to open the "anti-Black King rule Settings" dialog box, in the "peer IP Address" drop-down list, select "address range" and add the CIDR Block of the local area network. If you really do not want to be accessed by other users in the network, you can also set it in the rule "access the local machine from other machines in the LAN.