Network Firewall should not be a stumbling block to intranet mutual access

Source: Internet
Author: User

Recently, Jelly received "complaints" from several colleagues who reported that they could not access the shared folder of strawberries through their network neighbors. Jelly tried it on their computer. However, access to other computers on a strawberry computer is normal.

But jelly saw the newly installed Skynet firewall, and then he suddenly realized. This firewall blocks everyone out of the door ". It turned out that strawberry had installed a firewall when she worried that her computer would be infected by viruses. According to the requirements of the cainiao, Jelly explained the correct settings of various common firewall software in the LAN.

Skynet Firewall

First of all, we should introduce the "perpetrators" of Skynet firewall (version 2.60. After the firewall is installed, a setting Wizard will pop up. However, many users did not notice this setup wizard and click a few times to complete the installation (strawberry is such a "big horse and tiger"). The incorrect configuration caused a network failure.

If you want to solve a network failure caused by incorrect initial settings, you can call out the wizard again to perform the settings. On the main panel of Skynet firewall, click "system settings". In the "system settings" window that appears, click "Wizard" in "rule Settings" (figure 1 ), the setting wizard is displayed.


Figure 1

In the "Security Level Settings" dialog box, select the security level (users in the LAN can select "low") and then click "Next" to go to the "LAN information Settings" window. If you select "use my computer in LAN", the software will automatically detect the IP address of the Local Machine and display it below. Next, click "Next" to complete the settings.

Jelly prompts that we can only allow a computer in the LAN to access our shared data for the purpose of confidentiality. On the firewall's main panel, click "IP rule management". In the displayed IP rule list, find the rule related to LAN access and double-click it to go to the "IP rule modification" dialog box, set the parameters as shown in figure 2.


Figure 2

Norton Personal Firewall

Click the "Internet region control" option on the left side of the main interface of the software, enter the "Trust Region" tab in the right window, and click the "add" button to open the "specify computer" dialog box. In the dialog box, select "use range" and enter the starting and ending addresses for access.

For example, the IP address range of the jelly office is 172.22.1.2 ~ 172.22.1.253. Now, you only need to enter the start and end IP addresses and click "OK" to enable the settings to take effect. All IP addresses in this segment can access the strawberry computer.

Jelly prompts that we can not include all IP addresses in the CIDR block. You can determine the IP address range based on the actual situation of your local area network.

Jiang min hacker Firewall

Click "IP rule Settings" on the firewall's main interface to bring up the IP rule list. In this IP rule list, you can find two IP rules related to the LAN: "allow the local machine to connect to other machines in the LAN", "other machines in the LAN to access the local machine (TCP) "(Figure 3 ).


Figure 3

If you want to modify the "access the local computer (TCP) by other machines in the LAN" rule, click the edit button corresponding to the rule to open the "anti-Black King rule Settings" dialog box, in the "peer IP Address" drop-down list, select "address range" and add the CIDR Block of the local area network. If you really do not want to be accessed by other users in the network, you can also set it in the rule "access the local machine from other machines in the LAN.


Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.