In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Development >
Share
Shulou(Shulou.com)06/03 Report--
This article mainly introduces how to use batch processing to set IP security policy, the article is very detailed, has a certain reference value, interested friends must read it!
The following content can be viewed only after replying.
Ipseccmd-w REG-p "XIAOWANG"-r "Block ICMP"-f * + 0:ICMP-n BLOCK-x
Open an online neighbor. Bat
The code is as follows:
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/80"-f * + 0:80:TCP-n PASS-x
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/135"-f * + 0:135:TCP-n PASS-x
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/139"-f * + 0:139:TCP-n PASS-x
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/445"-f * + 0:445:TCP-n PASS-x
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1025"-f * + 0:1025:TCP-n PASS-x
Rem ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/3389"-f * + 0:3389:TCP-n PASS-x
Ipseccmd-w REG-p "XIAOWANG"-r "Block UDP/135"-f * + 0:135:UDP-n PASS-x
Ipseccmd-w REG-p "XIAOWANG"-r "Block UDP/139"-f * + 0:139:UDP-n PASS-x
Ipseccmd-w REG-p "XIAOWANG"-r "Block UDP/445"-f * + 0:445:UDP-n PASS-x
Ipseccmd-w REG-p "XIAOWANG"-r "Block UDP/1434"-f * + 0:1434:UDP-n PASS-x
Disable sql ports. Bat
The following content can be viewed only after replying.
The code is as follows:
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1433"-f * + 0:1433:TCP-n BLOCK-x
Ipseccmd-w REG-p "XIAOWANG"-r "Block UDP/1433"-f * + 0:1433:UDP-n BLOCK-x
Dangerous ports are prohibited. Bat
Rem ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/80"-f * + 0:80:TCP-n BLOCK-x
Rem ipseccmd-w REG-p "XIAOWANG"-r "Block UDP/1434"-f * + 0:1434:UDP-n BLOCK-x
Rem ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/3389"-f * + 0:3389:TCP-n BLOCK-x
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/445"-f * + 0:445:TCP-n BLOCK-x > nul
Ipseccmd-w REG-p "XIAOWANG"-r "Block UDP/445"-f * + 0:445:UDP-n BLOCK-x > nul
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1025"-f * + 0:1025:TCP-n BLOCK-x > nul
Ipseccmd-w REG-p "XIAOWANG"-r "Block UDP/139"-f * + 0:139:UDP-n BLOCK-x > nul
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1068"-f * + 0:1068:TCP-n BLOCK-x > nul
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/5554"-f * + 0:5554:TCP-n BLOCK-x > nul
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/9995"-f * + 0:9995:TCP-n BLOCK-x > nul
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/9996"-f * + 0:9996:TCP-n BLOCK-x > nul
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/6129"-f * + 0:6129:TCP-n BLOCK-x > nul
Ipseccmd-w REG-p "XIAOWANG"-r "Block ICMP/255"-f * + 0:255:ICMP-n BLOCK-x > nul
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/43958"-f * + 0:43958:TCP-n BLOCK-x > nul
Echo shuts down popular and dangerous ports. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/20034"-f * + 0:20034:TCP-n BLOCK-x > nul
Echo closes the open port of the Trojan NetBus Pro. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1092"-f * + 0:1092:TCP-n BLOCK-x > nul
Echo closes the open port of the worm LoveGate. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/3996"-f * + 0:3996:TCP-n BLOCK-x > nul
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/4060"-f * + 0:4060:TCP-n BLOCK-x > nul
Echo closes the open port of the Trojan RemoteAnything. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/4590"-f * + 0:4590:TCP-n BLOCK-x > nul
Echo closes the open port of the Trojan ICQTrojan. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1080"-f * + 0:1080:TCP-n BLOCK-x > nul
Echo forbids proxy servers to scan. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/113"-f * + 0:113:TCP-n BLOCK-x > nul
Echo forbids Authentication Service services. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/79"-f * + 0:79:TCP-n BLOCK-x > nul
Echo forbids Finger scanning. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block UDP/53"-f * + 0:53:UDP-n BLOCK-x > nul
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/53"-f * + 0:53:TCP-n BLOCK-x > nul
Echo forbids zone delivery (TCP), deceives DNS (UDP) or hides other communications. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/707"-f * + 0:707:TCP-n BLOCK-x > nul
Echo shuts down the nachi worm listening port. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/808"-f * + 0:808:TCP-n BLOCK-x > nul
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/23"-f * + 0:23:TCP-n BLOCK-x > nul
Echo shuts down Telnet and Trojan Tiny Telnet Server listening ports. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/520"-f * + 0:520:TCP-n BLOCK-x > nul
Echo shuts down the Rip port. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1999"-f * + 0:1999:TCP-n BLOCK-x > nul
Echo closes the default service port of the Trojan BackDoor. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/2001"-f * + 0:2001:TCP-n BLOCK-x > nul
Echo closes the default service port of Horse Program Black Hole 2001. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/2023"-f * + 0:2023:TCP-n BLOCK-x > nul
Echo closes the default service port of the Trojan Ripper. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/2583"-f * + 0:2583:TCP-n BLOCK-x > nul
Echo closes the default service port of the Trojan Wincrash v2. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/3389"-f * + 0:3389:TCP-n BLOCK-x > nul
Echo closes the remote management terminal (remote desktop) listening port of Windows. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/4444"-f * + 0:4444:TCP-n BLOCK-x > nul
Echo shuts down the msblast shockwave worm listening port. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/4899"-f * + 0:4899:TCP-n BLOCK-x > nul
Echo closes the remote control software (remote administrator) service port. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/5800"-f * + 0:5800:TCP-n BLOCK-x > nul
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/5900"-f * + 0:5900:TCP-n BLOCK-x > nul
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/8888"-f * + 0:8888:TCP-n BLOCK-x > nul
Echo closes the two default service ports of the remote control software VNC. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/6129"-f * + 0:6129:TCP-n BLOCK-x > nul
Echo closes the default listening port of the Dameware server (variable! ). OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/6267"-f * + 0:6267:TCP-n BLOCK-x > nul
Echo closes the default service port of Trojans for Guangwai girls. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/660"-f * + 0:660:TCP-n BLOCK-x > nul
Echo closes the default service port of the Trojan DeepThroat v1.0-3.1. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/6671"-f * + 0:6671:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Indoctrination. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/6939"-f * + 0:6939:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan PRIORITY. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/7306"-f * + 0:7306:TCP-n BLOCK-x > nul
Echo closes the Trojan network wizard default service port. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/7511"-f * + 0:7511:TCP-n BLOCK-x > nul
Echo turns off the default connection port of the smart gene of the Trojan. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/7626"-f * + 0:7626:TCP-n BLOCK-x > nul
Echo turns off the default port of Trojan Glacier (pay attention to variable!) . OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/8011"-f * + 0:8011:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan WAY2.4. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/9989"-f * + 0:9989:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan InIkiller. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/19191"-f * + 0:19191:TCP-n BLOCK-x > nul
Echo closes the telnet port that is opened by default in Malan Flame. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1029"-f * + 0:1029:TCP-n BLOCK-x > nul
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/20168"-f * + 0:20168:TCP-n BLOCK-x > nul
Echo closes the two backdoor ports opened by the lovegate worm. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/23444"-f * + 0:23444:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan network bull. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/27374"-f * + 0:27374:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan SUB7. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/30100"-f * + 0:30100:TCP-n BLOCK-x > nul
Echo closes the default service port of Trojan NetSphere. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/31337"-f * + 0:31337:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan BO2000. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/45576"-f * + 0:45576:TCP-n BLOCK-x > nul
Echo closes the control port of the agent software. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/50766"-f * + 0:50766:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Schwindler. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/61466"-f * + 0:61466:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Telecommando. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/31338"-f * + 0:31338:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Back Orifice. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/8102"-f * + 0:8102:TCP-n BLOCK-x > nul
Echo closes the default service port of Trojan Network Theft. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/2000"-f * + 0:2000:TCP-n BLOCK-x > nul
Echo closes the default service port of Trojan Black Hole 2000. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/31339"-f * + 0:31339:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan NetSpy DK. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/2001"-f * + 0:2001:TCP-n BLOCK-x > nul
Echo closes the default service port of Trojan Black Hole 2001. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/31666"-f * + 0:31666:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan BOWhack. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/34324"-f * + 0:34324:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan BigGluck. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/7306"-f * + 0:7306:TCP-n BLOCK-x > nul
Echo closes the default service port of Trojan Network Genie 3.0 Personality netspy3.0. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/40412"-f * + 0:40412:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan The Spy. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/40421"-f * + 0:40421:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Masters Paradise. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/8011"-f * + 0:8011:TCP-n BLOCK-x > nul
Echo closes Trojan wry, Lai Boy, Fire Phoenix default service port. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/40422"-f * + 0:40422:TCP-n BLOCK-x > nul
Echo closes the default service port of Trojan Masters Paradise 1.x. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/23444"-f * + 0:23444:TCP-n BLOCK-x > nul
Echo shuts down Trojan network bull, netbull default service port. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/40423"-f * + 0:40423:TCP-n BLOCK-x > nul
Echo closes the default service port of Trojan Masters Paradise 2.x. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/23445"-f * + 0:23445:TCP-n BLOCK-x > nul
Echo shuts down Trojan network bull, netbull default service port. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/40426"-f * + 0:40426:TCP-n BLOCK-x > nul
Echo closes the default service port of Trojan Masters Paradise 3.x. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/50505"-f * + 0:50505:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Sockets de Troie. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/27374"-f * + 0:27374:TCP-n BLOCK-x > nul
Echo closes the Trojan horse Sub Seven 2.0, which is the default service port of Oriental Eye. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/50766"-f * + 0:50766:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Fore. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/53001"-f * + 0:53001:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Remote Windows Shutdown. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/61466"-f * + 0:61466:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Telecommando. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/121"-f * + 0:121:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan BO jammerkillahV. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/666"-f * + 0:666:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Satanz Backdoor. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/65000"-f * + 0:65000:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Devil. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1001"-f * + 0:1001:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Silencer. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/6400"-f * + 0:6400:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan The tHing. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1600"-f * + 0:1600:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Shivka-Burka. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/12346"-f * + 0:12346:TCP-n BLOCK-x > nul
Echo closes the default service port of Trojan NetBus 1.x. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1807"-f * + 0:1807:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan SpySender. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/20034"-f * + 0:20034:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan NetBus Pro. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1981"-f * + 0:1981:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Shockrave. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1243"-f * + 0:1243:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan SubSeven. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1001"-f * + 0:1001:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan WebEx. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/30100"-f * + 0:30100:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan NetSphere. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1011"-f * + 0:1011:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Doly Trojan. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1001"-f * + 0:1001:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Silencer. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1170"-f * + 0:1170:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Psyber Stream Server. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/20000"-f * + 0:20000:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Millenium. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1234"-f * + 0:1234:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Ultors Trojan. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/65000"-f * + 0:65000:TCP-n BLOCK-x > nul
Echo closes the default service port of Devil 1.03 Trojan. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1245"-f * + 0:1245:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan VooDoo Doll. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/7306"-f * + 0:7306:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan NetMonitor. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1492"-f * + 0:1492:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan FTP99CMP. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1170"-f * + 0:1170:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Streaming Audio Trojan. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1999"-f * + 0:1999:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan BackDoor. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/30303"-f * + 0:30303:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Socket23. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/2001"-f * + 0:2001:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Trojan Cow. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/6969"-f * + 0:6969:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Gatecrasher. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/2023"-f * + 0:2023:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Ripper. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/61466"-f * + 0:61466:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Telecommando. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/2115"-f * + 0:2115:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Bugs. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/12076"-f * + 0:12076:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Gjamer. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/2140"-f * + 0:2140:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Deep Throat. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/4950"-f * + 0:4950:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan IcqTrojen. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/2140"-f * + 0:2140:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan The Invasor. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/16969"-f * + 0:16969:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Priotrity. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/2801"-f * + 0:2801:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Phineas Phucker. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1245"-f * + 0:1245:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Vodoo. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/30129"-f * + 0:30129:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Masters Paradise. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/5742"-f * + 0:5742:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Wincrash. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/3700"-f * + 0:3700:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Portal of Doom. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/2583"-f * + 0:2583:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Wincrash3. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/4092"-f * + 0:4092:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan WinCrash. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1033"-f * + 0:1033:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Netspy. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/4590"-f * + 0:4590:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan ICQTrojan. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1981"-f * + 0:1981:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan ShockRave. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/5000"-f * + 0:5000:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Sockets de Troie. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/555"-f * + 0:555:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Stealth Spy. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/5001"-f * + 0:5001:TCP-n BLOCK-x > nul
Echo closes the default service port of Trojan Sockets de Troie 1.x. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/2023"-f * + 0:2023:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Pass Ripper. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/5321"-f * + 0:5321:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Firehotcker. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/666"-f * + 0:666:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Attack FTP. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/5400"-f * + 0:5400:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Blade Runner. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/21554"-f * + 0:21554:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan GirlFriend. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/5401"-f * + 0:5401:TCP-n BLOCK-x > nul
Echo closes the default service port of Trojan Blade Runner 1.x. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/50766"-f * + 0:50766:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Fore Schwindler. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/5402"-f * + 0:5402:TCP-n BLOCK-x > nul
Echo closes the default service port of Trojan Blade Runner 2.x. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/34324"-f * + 0:34324:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Tiny Telnet Server. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/5569"-f * + 0:5569:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Robo-Hack. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/30999"-f * + 0:30999:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Kuang. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/6670"-f * + 0:6670:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan DeepThroat. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/11000"-f * + 0:11000:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Senna Spy Trojans. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/6771"-f * + 0:6771:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan DeepThroat. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/23456"-f * + 0:23456:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan WhackJob. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/6969"-f * + 0:6969:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan GateCrasher. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/555"-f * + 0:555:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Phase0. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/6969"-f * + 0:6969:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Priority. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/5400"-f * + 0:5400:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Blade Runner. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/7000"-f * + 0:7000:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Remote Grab. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/4950"-f * + 0:4950:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan IcqTrojan. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/7300"-f * + 0:7300:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan NetMonitor. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/9989"-f * + 0:9989:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan InIkiller. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/7301"-f * + 0:7301:TCP-n BLOCK-x > nul
Echo closes the default service port of Trojan NetMonitor 1.x. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/9872"-f * + 0:9872:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Portal Of Doom. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/7306"-f * + 0:7306:TCP-n BLOCK-x > nul
Echo closes the default service port of Trojan NetMonitor 2.x. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/11223"-f * + 0:11223:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Progenic Trojan. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/7307"-f * + 0:7307:TCP-n BLOCK-x > nul
Echo closes the default service port of Trojan NetMonitor 3.x. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/22222"-f * + 0:22222:TCP-n BLOCK-x > nul
Echo closes the default service port of Prosiak 0.47Trojan. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/7308"-f * + 0:7308:TCP-n BLOCK-x > nul
Echo closes the default service port of Trojan NetMonitor 4.x. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/53001"-f * + 0:53001:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Remote Windows Shutdown. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/7789"-f * + 0:7789:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan ICKiller. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/5569"-f * + 0:5569:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan RoboHack. OK!
Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/9872"-f * + 0:9872:TCP-n BLOCK-x > nul
Echo turns off the default service port of Trojan Portal of Doom. OK!
Use ipsecpol with 2000, which is more or less the same as IPSeccmd.
Attached is the description of Microsoft.
Create a static policy to block traffic
Computer based on Windows Server 2003 and Windows XP
For systems that do not have locally defined IPSec policies enabled, create a new local static policy to block traffic directed to specific protocols and ports on Windows Server 2003 and Windows XP computers. To do this, follow these steps: 1. Verify that the IPSec Policy Agent service is enabled and started in the Services MMC snap-in.
two。 Install IPSeccmd.exe. IPSeccmd.exe is part of the Windows XP Service Pack 2 (SP2) support tool.
Note: IPSeccmd.exe will run on Windows XP and Windows Server 2003 operating systems, but this tool is only available in the Windows XP SP2 support toolkit.
For additional information about downloading and installing Windows XP Service Pack 2 support tools, click the article number below to view the appropriate article in the Microsoft knowledge Base:
838079 Windows XP Service Pack 2 support tools
3. Open a command prompt window and set the working folder to the folder where Windows XP Service Pack 2 support tools are installed.
Note: the default folder for Windows XP SP2 support tools is C:\ Program Files\ Support Tools.
4. To create a new local IPSec policy and filter rule and apply it to network traffic sent from any IP address to the IP address of the Windows Server 2003 or Windows XP computer you want to configure, use the following command.
Note: in the following command, Protocol and PortNumber are variables.
IPSeccmd.exe-w REG-p "Block ProtocolPortNumber Filter"-r "Block Inbound ProtocolPortNumber Rule"-f * = 0:PortNumber:Protocol-n BLOCK-x
For example, to block network traffic from any IP address and any source port to the destination port UDP 1434 on the Windows Server 2003 or Windows XP computer, type the following command. This strategy can effectively protect computers running Microsoft SQL Server 2000 from the "Slammer" worm.
IPSeccmd.exe-w REG-p "Block UDP 1434 Filter"-r "Block Inbound UDP 1434 Rule"-f * = 0:1434:UDP-n BLOCK-x
The following example blocks inbound access to TCP port 80, but still allows outbound TCP 80 access. This strategy can effectively protect computers running Microsoft Internet Information Services (IIS) 5.0 from "Code Red" and "Nimda" worms.
IPSeccmd.exe-w REG-p "Block TCP 80 Filter"-r "Block Inbound TCP 80 Rule"-f * = 0:80:TCP-n BLOCK-x
Note: the-x switch specifies the policy immediately. If you enter this command, you will unspecify the "Block UDP 1434 Filter" policy and specify "Block TCP 80 Filter". To add but not specify the policy, type the command without the-x switch at the end.
5. To add additional filtering rules to the existing "Block UDP 1434 Filter" policy that blocks network traffic from Windows Server 2003 or Windows XP-based computers to any IP address, use the following command.
Note: in this command, Protocol and PortNumber are variables:
IPSeccmd.exe-w REG-p "Block ProtocolPortNumber Filter"-r "Block Outbound ProtocolPortNumber Rule"-f * 0=:PortNumber:Protocol-n BLOCK
For example, to block any network traffic from a Windows Server 2003 or Windows XP-based computer to UDP 1434 on any other host, type the following command. This strategy effectively prevents computers running SQL Server 2000 from spreading the "Slammer" worm.
IPSeccmd.exe-w REG-p "Block UDP 1434 Filter"-r "Block Outbound UDP 1434 Rule"-f 0=*:1434:UDP-n BLOCK
Note: you can use this command to add any number of filter rules to the policy. For example, you can use this command to block multiple ports through the same policy.
6. The policy in step 5 will now take effect and will take effect each time the computer is restarted. However, if a domain-based IPSec policy is later specified for the computer, this local policy will be overwritten and will no longer apply.
To verify that your filter rules have been successfully specified, set the working folder to C:\ Program Files\ Support Tools at the command prompt, and then type the following command:
Netdiag / test:ipsec / debug
As shown in these examples, if you specify a policy for both inbound and outbound communications, you will receive the following message:
IP security testing. . . . . . . . . :
Local IPSec policy activity passed: 'Block UDP 1434 Filter' IP Security Policy path: SOFTWARE\ Policies\ Microsoft\ Windows\ IPSec\ Policy\ Local\ ipsecPolicy {D239C599-F945-47A3-A4E3-B37BC12826B9}
There are 2 filters
No name
Filter ID: {5EC1FD53-EA98-4C1B-A99F-6D2A0FF94592}
Policy ID: {509492EA-1214-4F50-BF43-9CAC2B538518}
Source address: 0.0.0.0 Source Mask: 0.0.0.0
Destination address: 192.168.1.1 destination mask: 255.255.255.255
Tunnel address: 0.0.0.0 source port: 0 destination port: 1434
Protocol: 17 TunnelFilter: none
Tags: inbound blocking
No name
Filter ID: {9B4144A6-774F-4AE5-B23A-51331E67BAB2}
Policy ID: {2DEB01BD-9830-4067-B58A-AADFC8659BE5}
Source address: 192.168.1.1 Source Mask: 255.255.255.255
Destination address: 0.0.0.0 destination mask: 0.0.0.0
Tunnel address: 0.0.0.0 source port: 0 destination port: 1434
Protocol: 17 TunnelFilter: none
Tags: outbound blocking
Note: the IP address and graphical user interface (GUID) number will vary depending on whether it is a Windows Server 2003-based or Windows XP-based computer.
The above is all the contents of the article "how to set IP Security Policy with batch processing". Thank you for reading! Hope to share the content to help you, more related knowledge, welcome to follow the industry information channel!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.