Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How to set IP security policy with batch processing

2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Development >

Share

Shulou(Shulou.com)06/03 Report--

This article mainly introduces how to use batch processing to set IP security policy, the article is very detailed, has a certain reference value, interested friends must read it!

The following content can be viewed only after replying.

Ipseccmd-w REG-p "XIAOWANG"-r "Block ICMP"-f * + 0:ICMP-n BLOCK-x

Open an online neighbor. Bat

The code is as follows:

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/80"-f * + 0:80:TCP-n PASS-x

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/135"-f * + 0:135:TCP-n PASS-x

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/139"-f * + 0:139:TCP-n PASS-x

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/445"-f * + 0:445:TCP-n PASS-x

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1025"-f * + 0:1025:TCP-n PASS-x

Rem ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/3389"-f * + 0:3389:TCP-n PASS-x

Ipseccmd-w REG-p "XIAOWANG"-r "Block UDP/135"-f * + 0:135:UDP-n PASS-x

Ipseccmd-w REG-p "XIAOWANG"-r "Block UDP/139"-f * + 0:139:UDP-n PASS-x

Ipseccmd-w REG-p "XIAOWANG"-r "Block UDP/445"-f * + 0:445:UDP-n PASS-x

Ipseccmd-w REG-p "XIAOWANG"-r "Block UDP/1434"-f * + 0:1434:UDP-n PASS-x

Disable sql ports. Bat

The following content can be viewed only after replying.

The code is as follows:

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1433"-f * + 0:1433:TCP-n BLOCK-x

Ipseccmd-w REG-p "XIAOWANG"-r "Block UDP/1433"-f * + 0:1433:UDP-n BLOCK-x

Dangerous ports are prohibited. Bat

Rem ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/80"-f * + 0:80:TCP-n BLOCK-x

Rem ipseccmd-w REG-p "XIAOWANG"-r "Block UDP/1434"-f * + 0:1434:UDP-n BLOCK-x

Rem ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/3389"-f * + 0:3389:TCP-n BLOCK-x

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/445"-f * + 0:445:TCP-n BLOCK-x > nul

Ipseccmd-w REG-p "XIAOWANG"-r "Block UDP/445"-f * + 0:445:UDP-n BLOCK-x > nul

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1025"-f * + 0:1025:TCP-n BLOCK-x > nul

Ipseccmd-w REG-p "XIAOWANG"-r "Block UDP/139"-f * + 0:139:UDP-n BLOCK-x > nul

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1068"-f * + 0:1068:TCP-n BLOCK-x > nul

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/5554"-f * + 0:5554:TCP-n BLOCK-x > nul

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/9995"-f * + 0:9995:TCP-n BLOCK-x > nul

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/9996"-f * + 0:9996:TCP-n BLOCK-x > nul

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/6129"-f * + 0:6129:TCP-n BLOCK-x > nul

Ipseccmd-w REG-p "XIAOWANG"-r "Block ICMP/255"-f * + 0:255:ICMP-n BLOCK-x > nul

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/43958"-f * + 0:43958:TCP-n BLOCK-x > nul

Echo shuts down popular and dangerous ports. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/20034"-f * + 0:20034:TCP-n BLOCK-x > nul

Echo closes the open port of the Trojan NetBus Pro. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1092"-f * + 0:1092:TCP-n BLOCK-x > nul

Echo closes the open port of the worm LoveGate. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/3996"-f * + 0:3996:TCP-n BLOCK-x > nul

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/4060"-f * + 0:4060:TCP-n BLOCK-x > nul

Echo closes the open port of the Trojan RemoteAnything. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/4590"-f * + 0:4590:TCP-n BLOCK-x > nul

Echo closes the open port of the Trojan ICQTrojan. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1080"-f * + 0:1080:TCP-n BLOCK-x > nul

Echo forbids proxy servers to scan. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/113"-f * + 0:113:TCP-n BLOCK-x > nul

Echo forbids Authentication Service services. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/79"-f * + 0:79:TCP-n BLOCK-x > nul

Echo forbids Finger scanning. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block UDP/53"-f * + 0:53:UDP-n BLOCK-x > nul

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/53"-f * + 0:53:TCP-n BLOCK-x > nul

Echo forbids zone delivery (TCP), deceives DNS (UDP) or hides other communications. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/707"-f * + 0:707:TCP-n BLOCK-x > nul

Echo shuts down the nachi worm listening port. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/808"-f * + 0:808:TCP-n BLOCK-x > nul

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/23"-f * + 0:23:TCP-n BLOCK-x > nul

Echo shuts down Telnet and Trojan Tiny Telnet Server listening ports. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/520"-f * + 0:520:TCP-n BLOCK-x > nul

Echo shuts down the Rip port. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1999"-f * + 0:1999:TCP-n BLOCK-x > nul

Echo closes the default service port of the Trojan BackDoor. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/2001"-f * + 0:2001:TCP-n BLOCK-x > nul

Echo closes the default service port of Horse Program Black Hole 2001. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/2023"-f * + 0:2023:TCP-n BLOCK-x > nul

Echo closes the default service port of the Trojan Ripper. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/2583"-f * + 0:2583:TCP-n BLOCK-x > nul

Echo closes the default service port of the Trojan Wincrash v2. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/3389"-f * + 0:3389:TCP-n BLOCK-x > nul

Echo closes the remote management terminal (remote desktop) listening port of Windows. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/4444"-f * + 0:4444:TCP-n BLOCK-x > nul

Echo shuts down the msblast shockwave worm listening port. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/4899"-f * + 0:4899:TCP-n BLOCK-x > nul

Echo closes the remote control software (remote administrator) service port. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/5800"-f * + 0:5800:TCP-n BLOCK-x > nul

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/5900"-f * + 0:5900:TCP-n BLOCK-x > nul

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/8888"-f * + 0:8888:TCP-n BLOCK-x > nul

Echo closes the two default service ports of the remote control software VNC. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/6129"-f * + 0:6129:TCP-n BLOCK-x > nul

Echo closes the default listening port of the Dameware server (variable! ). OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/6267"-f * + 0:6267:TCP-n BLOCK-x > nul

Echo closes the default service port of Trojans for Guangwai girls. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/660"-f * + 0:660:TCP-n BLOCK-x > nul

Echo closes the default service port of the Trojan DeepThroat v1.0-3.1. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/6671"-f * + 0:6671:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Indoctrination. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/6939"-f * + 0:6939:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan PRIORITY. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/7306"-f * + 0:7306:TCP-n BLOCK-x > nul

Echo closes the Trojan network wizard default service port. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/7511"-f * + 0:7511:TCP-n BLOCK-x > nul

Echo turns off the default connection port of the smart gene of the Trojan. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/7626"-f * + 0:7626:TCP-n BLOCK-x > nul

Echo turns off the default port of Trojan Glacier (pay attention to variable!) . OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/8011"-f * + 0:8011:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan WAY2.4. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/9989"-f * + 0:9989:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan InIkiller. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/19191"-f * + 0:19191:TCP-n BLOCK-x > nul

Echo closes the telnet port that is opened by default in Malan Flame. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1029"-f * + 0:1029:TCP-n BLOCK-x > nul

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/20168"-f * + 0:20168:TCP-n BLOCK-x > nul

Echo closes the two backdoor ports opened by the lovegate worm. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/23444"-f * + 0:23444:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan network bull. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/27374"-f * + 0:27374:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan SUB7. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/30100"-f * + 0:30100:TCP-n BLOCK-x > nul

Echo closes the default service port of Trojan NetSphere. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/31337"-f * + 0:31337:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan BO2000. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/45576"-f * + 0:45576:TCP-n BLOCK-x > nul

Echo closes the control port of the agent software. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/50766"-f * + 0:50766:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Schwindler. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/61466"-f * + 0:61466:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Telecommando. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/31338"-f * + 0:31338:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Back Orifice. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/8102"-f * + 0:8102:TCP-n BLOCK-x > nul

Echo closes the default service port of Trojan Network Theft. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/2000"-f * + 0:2000:TCP-n BLOCK-x > nul

Echo closes the default service port of Trojan Black Hole 2000. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/31339"-f * + 0:31339:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan NetSpy DK. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/2001"-f * + 0:2001:TCP-n BLOCK-x > nul

Echo closes the default service port of Trojan Black Hole 2001. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/31666"-f * + 0:31666:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan BOWhack. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/34324"-f * + 0:34324:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan BigGluck. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/7306"-f * + 0:7306:TCP-n BLOCK-x > nul

Echo closes the default service port of Trojan Network Genie 3.0 Personality netspy3.0. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/40412"-f * + 0:40412:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan The Spy. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/40421"-f * + 0:40421:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Masters Paradise. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/8011"-f * + 0:8011:TCP-n BLOCK-x > nul

Echo closes Trojan wry, Lai Boy, Fire Phoenix default service port. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/40422"-f * + 0:40422:TCP-n BLOCK-x > nul

Echo closes the default service port of Trojan Masters Paradise 1.x. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/23444"-f * + 0:23444:TCP-n BLOCK-x > nul

Echo shuts down Trojan network bull, netbull default service port. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/40423"-f * + 0:40423:TCP-n BLOCK-x > nul

Echo closes the default service port of Trojan Masters Paradise 2.x. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/23445"-f * + 0:23445:TCP-n BLOCK-x > nul

Echo shuts down Trojan network bull, netbull default service port. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/40426"-f * + 0:40426:TCP-n BLOCK-x > nul

Echo closes the default service port of Trojan Masters Paradise 3.x. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/50505"-f * + 0:50505:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Sockets de Troie. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/27374"-f * + 0:27374:TCP-n BLOCK-x > nul

Echo closes the Trojan horse Sub Seven 2.0, which is the default service port of Oriental Eye. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/50766"-f * + 0:50766:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Fore. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/53001"-f * + 0:53001:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Remote Windows Shutdown. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/61466"-f * + 0:61466:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Telecommando. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/121"-f * + 0:121:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan BO jammerkillahV. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/666"-f * + 0:666:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Satanz Backdoor. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/65000"-f * + 0:65000:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Devil. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1001"-f * + 0:1001:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Silencer. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/6400"-f * + 0:6400:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan The tHing. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1600"-f * + 0:1600:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Shivka-Burka. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/12346"-f * + 0:12346:TCP-n BLOCK-x > nul

Echo closes the default service port of Trojan NetBus 1.x. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1807"-f * + 0:1807:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan SpySender. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/20034"-f * + 0:20034:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan NetBus Pro. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1981"-f * + 0:1981:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Shockrave. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1243"-f * + 0:1243:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan SubSeven. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1001"-f * + 0:1001:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan WebEx. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/30100"-f * + 0:30100:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan NetSphere. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1011"-f * + 0:1011:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Doly Trojan. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1001"-f * + 0:1001:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Silencer. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1170"-f * + 0:1170:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Psyber Stream Server. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/20000"-f * + 0:20000:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Millenium. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1234"-f * + 0:1234:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Ultors Trojan. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/65000"-f * + 0:65000:TCP-n BLOCK-x > nul

Echo closes the default service port of Devil 1.03 Trojan. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1245"-f * + 0:1245:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan VooDoo Doll. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/7306"-f * + 0:7306:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan NetMonitor. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1492"-f * + 0:1492:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan FTP99CMP. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1170"-f * + 0:1170:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Streaming Audio Trojan. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1999"-f * + 0:1999:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan BackDoor. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/30303"-f * + 0:30303:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Socket23. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/2001"-f * + 0:2001:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Trojan Cow. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/6969"-f * + 0:6969:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Gatecrasher. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/2023"-f * + 0:2023:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Ripper. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/61466"-f * + 0:61466:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Telecommando. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/2115"-f * + 0:2115:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Bugs. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/12076"-f * + 0:12076:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Gjamer. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/2140"-f * + 0:2140:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Deep Throat. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/4950"-f * + 0:4950:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan IcqTrojen. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/2140"-f * + 0:2140:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan The Invasor. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/16969"-f * + 0:16969:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Priotrity. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/2801"-f * + 0:2801:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Phineas Phucker. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1245"-f * + 0:1245:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Vodoo. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/30129"-f * + 0:30129:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Masters Paradise. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/5742"-f * + 0:5742:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Wincrash. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/3700"-f * + 0:3700:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Portal of Doom. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/2583"-f * + 0:2583:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Wincrash3. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/4092"-f * + 0:4092:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan WinCrash. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1033"-f * + 0:1033:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Netspy. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/4590"-f * + 0:4590:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan ICQTrojan. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/1981"-f * + 0:1981:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan ShockRave. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/5000"-f * + 0:5000:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Sockets de Troie. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/555"-f * + 0:555:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Stealth Spy. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/5001"-f * + 0:5001:TCP-n BLOCK-x > nul

Echo closes the default service port of Trojan Sockets de Troie 1.x. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/2023"-f * + 0:2023:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Pass Ripper. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/5321"-f * + 0:5321:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Firehotcker. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/666"-f * + 0:666:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Attack FTP. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/5400"-f * + 0:5400:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Blade Runner. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/21554"-f * + 0:21554:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan GirlFriend. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/5401"-f * + 0:5401:TCP-n BLOCK-x > nul

Echo closes the default service port of Trojan Blade Runner 1.x. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/50766"-f * + 0:50766:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Fore Schwindler. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/5402"-f * + 0:5402:TCP-n BLOCK-x > nul

Echo closes the default service port of Trojan Blade Runner 2.x. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/34324"-f * + 0:34324:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Tiny Telnet Server. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/5569"-f * + 0:5569:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Robo-Hack. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/30999"-f * + 0:30999:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Kuang. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/6670"-f * + 0:6670:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan DeepThroat. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/11000"-f * + 0:11000:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Senna Spy Trojans. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/6771"-f * + 0:6771:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan DeepThroat. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/23456"-f * + 0:23456:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan WhackJob. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/6969"-f * + 0:6969:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan GateCrasher. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/555"-f * + 0:555:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Phase0. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/6969"-f * + 0:6969:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Priority. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/5400"-f * + 0:5400:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Blade Runner. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/7000"-f * + 0:7000:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Remote Grab. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/4950"-f * + 0:4950:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan IcqTrojan. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/7300"-f * + 0:7300:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan NetMonitor. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/9989"-f * + 0:9989:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan InIkiller. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/7301"-f * + 0:7301:TCP-n BLOCK-x > nul

Echo closes the default service port of Trojan NetMonitor 1.x. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/9872"-f * + 0:9872:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Portal Of Doom. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/7306"-f * + 0:7306:TCP-n BLOCK-x > nul

Echo closes the default service port of Trojan NetMonitor 2.x. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/11223"-f * + 0:11223:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Progenic Trojan. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/7307"-f * + 0:7307:TCP-n BLOCK-x > nul

Echo closes the default service port of Trojan NetMonitor 3.x. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/22222"-f * + 0:22222:TCP-n BLOCK-x > nul

Echo closes the default service port of Prosiak 0.47Trojan. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/7308"-f * + 0:7308:TCP-n BLOCK-x > nul

Echo closes the default service port of Trojan NetMonitor 4.x. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/53001"-f * + 0:53001:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Remote Windows Shutdown. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/7789"-f * + 0:7789:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan ICKiller. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/5569"-f * + 0:5569:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan RoboHack. OK!

Ipseccmd-w REG-p "XIAOWANG"-r "Block TCP/9872"-f * + 0:9872:TCP-n BLOCK-x > nul

Echo turns off the default service port of Trojan Portal of Doom. OK!

Use ipsecpol with 2000, which is more or less the same as IPSeccmd.

Attached is the description of Microsoft.

Create a static policy to block traffic

Computer based on Windows Server 2003 and Windows XP

For systems that do not have locally defined IPSec policies enabled, create a new local static policy to block traffic directed to specific protocols and ports on Windows Server 2003 and Windows XP computers. To do this, follow these steps: 1. Verify that the IPSec Policy Agent service is enabled and started in the Services MMC snap-in.

two。 Install IPSeccmd.exe. IPSeccmd.exe is part of the Windows XP Service Pack 2 (SP2) support tool.

Note: IPSeccmd.exe will run on Windows XP and Windows Server 2003 operating systems, but this tool is only available in the Windows XP SP2 support toolkit.

For additional information about downloading and installing Windows XP Service Pack 2 support tools, click the article number below to view the appropriate article in the Microsoft knowledge Base:

838079 Windows XP Service Pack 2 support tools

3. Open a command prompt window and set the working folder to the folder where Windows XP Service Pack 2 support tools are installed.

Note: the default folder for Windows XP SP2 support tools is C:\ Program Files\ Support Tools.

4. To create a new local IPSec policy and filter rule and apply it to network traffic sent from any IP address to the IP address of the Windows Server 2003 or Windows XP computer you want to configure, use the following command.

Note: in the following command, Protocol and PortNumber are variables.

IPSeccmd.exe-w REG-p "Block ProtocolPortNumber Filter"-r "Block Inbound ProtocolPortNumber Rule"-f * = 0:PortNumber:Protocol-n BLOCK-x

For example, to block network traffic from any IP address and any source port to the destination port UDP 1434 on the Windows Server 2003 or Windows XP computer, type the following command. This strategy can effectively protect computers running Microsoft SQL Server 2000 from the "Slammer" worm.

IPSeccmd.exe-w REG-p "Block UDP 1434 Filter"-r "Block Inbound UDP 1434 Rule"-f * = 0:1434:UDP-n BLOCK-x

The following example blocks inbound access to TCP port 80, but still allows outbound TCP 80 access. This strategy can effectively protect computers running Microsoft Internet Information Services (IIS) 5.0 from "Code Red" and "Nimda" worms.

IPSeccmd.exe-w REG-p "Block TCP 80 Filter"-r "Block Inbound TCP 80 Rule"-f * = 0:80:TCP-n BLOCK-x

Note: the-x switch specifies the policy immediately. If you enter this command, you will unspecify the "Block UDP 1434 Filter" policy and specify "Block TCP 80 Filter". To add but not specify the policy, type the command without the-x switch at the end.

5. To add additional filtering rules to the existing "Block UDP 1434 Filter" policy that blocks network traffic from Windows Server 2003 or Windows XP-based computers to any IP address, use the following command.

Note: in this command, Protocol and PortNumber are variables:

IPSeccmd.exe-w REG-p "Block ProtocolPortNumber Filter"-r "Block Outbound ProtocolPortNumber Rule"-f * 0=:PortNumber:Protocol-n BLOCK

For example, to block any network traffic from a Windows Server 2003 or Windows XP-based computer to UDP 1434 on any other host, type the following command. This strategy effectively prevents computers running SQL Server 2000 from spreading the "Slammer" worm.

IPSeccmd.exe-w REG-p "Block UDP 1434 Filter"-r "Block Outbound UDP 1434 Rule"-f 0=*:1434:UDP-n BLOCK

Note: you can use this command to add any number of filter rules to the policy. For example, you can use this command to block multiple ports through the same policy.

6. The policy in step 5 will now take effect and will take effect each time the computer is restarted. However, if a domain-based IPSec policy is later specified for the computer, this local policy will be overwritten and will no longer apply.

To verify that your filter rules have been successfully specified, set the working folder to C:\ Program Files\ Support Tools at the command prompt, and then type the following command:

Netdiag / test:ipsec / debug

As shown in these examples, if you specify a policy for both inbound and outbound communications, you will receive the following message:

IP security testing. . . . . . . . . :

Local IPSec policy activity passed: 'Block UDP 1434 Filter' IP Security Policy path: SOFTWARE\ Policies\ Microsoft\ Windows\ IPSec\ Policy\ Local\ ipsecPolicy {D239C599-F945-47A3-A4E3-B37BC12826B9}

There are 2 filters

No name

Filter ID: {5EC1FD53-EA98-4C1B-A99F-6D2A0FF94592}

Policy ID: {509492EA-1214-4F50-BF43-9CAC2B538518}

Source address: 0.0.0.0 Source Mask: 0.0.0.0

Destination address: 192.168.1.1 destination mask: 255.255.255.255

Tunnel address: 0.0.0.0 source port: 0 destination port: 1434

Protocol: 17 TunnelFilter: none

Tags: inbound blocking

No name

Filter ID: {9B4144A6-774F-4AE5-B23A-51331E67BAB2}

Policy ID: {2DEB01BD-9830-4067-B58A-AADFC8659BE5}

Source address: 192.168.1.1 Source Mask: 255.255.255.255

Destination address: 0.0.0.0 destination mask: 0.0.0.0

Tunnel address: 0.0.0.0 source port: 0 destination port: 1434

Protocol: 17 TunnelFilter: none

Tags: outbound blocking

Note: the IP address and graphical user interface (GUID) number will vary depending on whether it is a Windows Server 2003-based or Windows XP-based computer.

The above is all the contents of the article "how to set IP Security Policy with batch processing". Thank you for reading! Hope to share the content to help you, more related knowledge, welcome to follow the industry information channel!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Development

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report