1and1 Help Centre Categories

print article

Software Firewalls with Windows Server 2008

Find out how to configure IP Security (ipsec) through a packet filter policy or through the Security Configuration Wizard.

If you do not plan on using the software firewall, we recommend that you create a new firewall ruleset. If you re-image the server you do not have to set up the rules again. Only by deleting the rule set would you need to do this again.

To use the packet filter, follow these steps.

Step 2
Click on IP Filter on the Desktop and then click on IP Security Policies on Local Computer. Local Security Policy window
Local Security Policy window
Step 3
If you are not planning on using the Packet Filter policy right click on it and click Unassign.

Step 4
If you are going to use the packet filter policy, right-click on Packet Filter and click on Properties.
Packet Filter Properties
Packet Filter Properties
Step 5
Check the boxes next to the rules you want active or remove the check boxes from rules you do not want active. Here you can also add, edit, or remove rules. If you want to allow FTP incoming, then check the box next to Open FTP Incoming. The packet filter policy is only compatible with active FTP.
Please note:
There are explicit denies at the bottom of the list for ports such as MS SQL labelled Close MSDE (TCP/IP) because of the security risks associated with allowing direct access to MS SQL from anywhere on the Internet. Take other precautions to mitigate the risk to your data before opening these ports.

For the Security Configuration Wizard
Step 1
Go to Start > Administrative Tools > Security Configuration Wizard.
Step 2
Create a new security policy. This is the new security policy and you are dictating what the configuration file you will create with this wizard will allow.
Step 3
Unless you have joined this server to a domain controller, leave the server name as the default U number. If you do not know what a domain controller is, you have not joined the server to a domain controller and you should leave the name as the default.
Step 4
The first three pages of roles list the different installed roles, features, and options. Go through the lists and check the boxes next to the items you want to allow. Installed Roles
Installed Roles
Step 5
Continue through the wizard picking the different options you want. The bottom of most of the pages has a Learn more about link that goes into detail about each section of the wizard.
Please note:
Name the file where the configuration settings will be saved, along with the date and time. When you edit the policy later, instead of saving over the existing file you once again name the file by date and time so you can distinguish between policies by date.
For additional information, you may want to reference: