Lab - Configure the Firewall in Windows 7 and Vista

Similar documents
Lab - Configure the Firewall in Windows 8

In this lab you will explore the Windows Vista Firewall and configure some advanced settings.

Lab - Remote Desktop in Windows 7 and Vista

Lab IP Addresses and Network Communication

Lab - Remote Desktop in Windows 8

Lab - Share a Printer in Windows 7 and Vista

Lab - Share Resources in Windows

Lab - Task Scheduler in Windows 7 and Vista

Use of the TCP/IP Protocols and the OSI Model in Packet Tracer

Lab - Remote Assistance in Windows

Lab - Task Manager in Windows 8

Lab - Configure a NIC to Use DHCP in Windows

Lab - Task Scheduler in Windows 8

Lab - Data Migration in Windows

5.4.8 Optional Lab: Managing System Files with Built-in Utilities in Windows Vista

Lab - Manage Virtual Memory in Windows 7 and Vista

Cisco QuickVPN Installation Tips for Windows Operating Systems

Lab - Connect to a Router for the First Time

Lab - Create User Accounts in Windows 8

Lab - Configure Browser Settings in Windows 8

Lab - Task Manager in Windows 7 and Vista

Lab - Create a Partition in Windows 8

Lab - System Restore in Windows 7 and Vista

Lab - Managing System Files in Windows

Lab - Monitor and Manage System Resources in Windows 7 and Vista

Lab - System Utilities in Windows

Lab - System Restore in Windows 8

GAME100 Lab 5. Before beginning the lab, please download and install Cisco Packet Trace

8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista

Docusnap X - Windows Firewall Exceptions. Configuring Windows Firewall Exceptions for Docusnap

Sharing Data between Applications Connecting 2 PC s running ic/icontrol

Database Sharing of the Smartcard Lock System With Two Computers (no router)

Step 7 How to convert a YouTube Video to Music As I mentioned in the YouTube Introduction, you can convert a Video to a MP3 file using Free Video To

Lab 3.4.2: Managing a Web Server

Optional Lab: Customize Settings in Windows Vista

Lab Configure Service Object Groups using ASDM

Lab - Using Wireshark to Examine TCP and UDP Captures

How To Manually Open Ports In Internet Connection Firewall In Windows 8 >>>CLICK HERE<<<

BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic. Topology. Objectives. Background / Scenario

Lab - Configure Data Backup and Recovery in Windows 7 and Vista

Lab - Troubleshooting ACL Configuration and Placement Topology

Introduction to the Packet Tracer Interface using a Hub Topology

Budget Reports for All Users

Step 1 Turn on the device and log in with the password, PIN, or other passcode, if necessary.

Lab Using Wireshark to Examine Ethernet Frames

Lab 1.3.2: Review of Concepts from Exploration 1 - Challenge

Packet Tracer Simulation - TCP and UDP Communications

Lab - Troubleshooting Standard IPv4 ACL Configuration and Placement Topology

Windows 2000 Safe Mode

Monitoring Windows Systems with WMI

Price Checker Setup Guide for AIMsi

Lab Subnetting Network Topologies (Instructor Version)

OneSecure VPN Remote User Installation & Configuration Guide

Lab - Configure Data Backup and Recovery in Windows 8

Lab - Configure Users and Groups in Windows

Supporting Networked Computers

IT Essentials v6.0 Windows 10 Software Labs

Application Note Creating a Composite Report For Managed Hosts 12-Oct-2016 Revision 1.0 Compiled by: Larry Balon

PT Activity 5.6.1: Packet Tracer Skills Integration Challenge Topology Diagram

Packet Tracer - Configure Cisco Routers for Syslog, NTP, and SSH Operations (Instructor Version)

A specific IP with specific Ports and Protocols uses a dedicated WAN (Load Balance Policy).

TECHNICAL SUPPORT GUIDE

Packet Tracer Create a Simple Network Using Packet Tracer

Lab: Configure Wireless Security

Packet Tracer - Investigating the TCP/IP and OSI Models in Action (Instructor Version Optional Packet Tracer)

Lab Configuring and Verifying Standard ACLs Topology

Print Manager Plus 2010 Workgroup Print Tracking and Control

Configuring Windows Security Features

1 Introduction. ThinPrint Client Installation Page 1

Lab DHCP Client Setup

Installing Your Multifunction to Additional Computers on Your Network

Lab Applying a Logical Layered Model to a Physical Network

Packet Tracer - Connect a Router to a LAN (Instructor Version)

Access Switch VLAN Y Y.1 /24

Immotec Systems, Inc. SQL Server 2008 Installation Document

5.4.8 Lab: Managing System Files with Built-in Utilities in Windows XP

Chapter 4. EtherTalk Configuration

5.5.3 Lab: Managing Administrative Settings and Snap-ins in Windows XP

ENCOMPASS. Support. ipod/iphone + Zebra Printer Combination. Setup Setting up a Printer for Initial Use... 2

Lab: Install a NIC in Windows XP

Basic Cisco Router Configuration: Multiple Routers

DCP585CW Windows Network Connection Repair Instructions

Requirements. Cisco VPN Client setup file. Cisco VPN Client software installation

Lab Using Wireshark to Examine Ethernet Frames

12.1 Setup Instructions

Packet Tracer - Explore a Network

LynxPad 3.0 Quick Start Guide

Lab Configuring and Verifying Standard IPv4 ACLs Topology

Lab - Configure Wireless Router in Windows

Application Note #5494 Upgrading Plus Ethernet Radio Firmware September 9, 2013

PC Agent Quick Start. Opening the Agent. Logging in to the Agent. Connected Backup. Version 8.6. Revision 0

20698 Installing and Configuring Windows 10

Job Aid. Remote Access BAIRS Printing and Saving a Report. Table of Contents

Installing and Configuring Windows 10

Before installing this product, ensure that the following prerequisites are completed.

Search for Mail Step 3 Click the Accounts button.

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

Table of Contents TABLE OF CONTENTS... 1 INTRODUCTION... 3 FEATURES... 3 CONNECTING TO OVIDA... 4 INSTALLATION WIZARD... 5

Module 9. Configuring IPsec. Contents:

NETWORK LAB 2 Configuring Switch Desktop

Transcription:

Introduction In this lab, you will explore the Windows Firewall and configure some advanced settings. Recommended Equipment Two computers directly connected or connected on a network Windows installed on both computers Computers are in the same workgroup and share the same subnet mask Part 1: Configure the Firewall in Windows 7 Step 1: Create and share a folder. a. On computer 1, right-click on the desktop and select New > Folder. Name the folder Cisco. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 22

b. Right-click the Cisco folder, and then select Share with > Advanced Sharing. The Advanced Sharing window opens. Share the folder. Use the default name Cisco. c. On computer 2, click Control Panel > Network and Sharing Center. Click the icon with the network name to which your are connected. d. Double-click computer 1.Can you see the shared folder Cisco? Note: If you answered no, ask the instructor for help. e. Close Network. Note: Use computer 1 for the rest of the lab unless otherwise stated. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 22

Step 2: Open Windows Firewall. a. To open the Windows Firewall, use the following path: Control Panel > System and Security > Windows Firewall b. The normal state for the Windows Firewall is On. c. What are the benefits of Windows Firewall? Step 3: Investigate the Windows Firewall Allowed Programs feature. a. Click Allow a program or feature through Windows Firewall. b. The Allowed Programs window opens. Programs and services that Windows Firewall is not blocking will be listed with a check mark. You can add applications to this list. This may be necessary if your customer has an application that requires outside communications but for some reason the Windows Firewall cannot perform 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 3 of 22

the configuration automatically. You must be logged on to this computer as an administrator to complete this procedure. c. Click What are the risks of allowing a program to communicate? The Windows Help and Support window opens. Creating too many exceptions in your Programs and Services file can have negative consequences. Describe a negative consequence of having too many exceptions. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 4 of 22

d. Close the Windows Help and Support window. Step 4: Configure the Windows Firewall Allowed Programs feature. a. On computer 1, click the Allowed Programs window so it is active. Click Change settings, if necessary. To turn off an exception, remove the check mark from File and Printer Sharing, and then click OK. b. On computer 2, attempt to open a connection to computer 1, using the following path: Control Panel > Network and Sharing Center > Network icon. Can you connect to computer 1? 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 5 of 22

c. On computer 1, add a check mark to File and Printer Sharing. Click OK. d. On computer 2, refresh the Network screen and attempt to connect to computer 1. Can you connect to computer 1? e. Log off computer 2. Use computer 1 for the rest of the lab. Step 5: Configure Advanced Security features in Windows Firewall. a. To configure advanced security, use the following path: Control Panel > Administrative Tools > Windows Firewall with Advanced Security b. In the panel on the left, you can select items to configure Inbound Rules, Outbound Rules, or Connection Security Rules. You can also click Monitoring to view the status of configured rules. Click Inbound Rules. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 6 of 22

c. In the middle panel, scroll down until you find the inbound rule named Files and Printer Sharing (Echo Request ICMPv4-In). Right-click on the rule and select Properties > Advanced tab > Customize. d. The Advanced tab displays the profile(s) used by the computer and the Customize Interface Types window displays the different connections configured for your computer. Click OK. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 7 of 22

e. Click the Programs and Services tab. Click Settings... The Customize Service Settings window opens. In the space below, list the short name of four services that are available. When done, click Cancel. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 8 of 22

f. There are many applications that users do not normally see that also need to get through the Windows Firewall to access your computer. These are the network level programs that direct traffic on the network and the Internet. Click Protocols and Ports tab. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 9 of 22

g. For the ICMP settings, click the Customize button. The Customize ICMP Settings window opens. In the example here, allowing incoming echo requests is what allows network users to ping your computer to determine if it is present on the network. In the space below, list four of the Specific ICMP types. h. Close all windows. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 10 of 22

Part 2: Configure the Firewall in Windows Vista Step 1: Create and share a folder. a. On computer 1, right-click on the desktop, select New > Folder. Name the folder Cisco. b. Right-click the Cisco folder, and then select Share > Continue. The Advanced Sharing window opens. Share the folder. Use the default name Cisco. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 11 of 22

c. On computer 2 click Control Panel > Network and Sharing Center > Network icon (icon with the network name to which you are connected). d. Double-click computer 1.Can you see the shared folder Cisco? Note: If you answered no, ask the instructor for help. e. Close Network. Note: Use computer 1 for the rest of the lab unless otherwise stated. Step 2: Open Windows Firewall. a. To open the Windows Firewall, use the following path: Control Panel > Security Center b. The normal state for the Windows Firewall is On. Click Windows Firewall in the left panel. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 12 of 22

c. The Windows Firewall window opens. Click Change settings > Continue. d. The Windows Firewall Settings window opens. Why is turning off the Windows Firewall not advised? 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 13 of 22

Step 3: Investigate the Windows Firewall Exceptions tab. a. In the Windows Firewall Settings window, select the Exceptions tab. Programs and services that Windows Firewall is not blocking will be listed with a checkmark. You can add applications to this list. This may be necessary if your customer has an application that requires outside communications but for some reason the Windows Firewall cannot perform the configuration automatically. You must be logged on to this computer as an administrator to complete this procedure. Click What are the risks of unblocking a program? b. The Window Help and Support window opens. Creating too many exceptions in your Programs and Services file can have negative consequences. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 14 of 22

Describe a negative consequence to having too many exceptions. c. Close the Windows Help and Support window. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 15 of 22

Step 4: Configure exceptions to the Windows Firewall. a. On computer 1, click the Windows Firewall Settings window so it is active. Click Change settings, if necessary. To turn off an exception, remove the check mark from File and Printer Sharing. Click OK. b. From computer 2, attempt to open the network connect to computer 1, using the following path: Control Panel > Network and Sharing Center > Network icon. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 16 of 22

Can you connect to computer 1? c. On computer 1, add back the execption for File and Printer Sharing. Click OK. d. On computer 2, refresh Network screen and attempt connect to computer 1. Can you connect to computer 1? e. Log off computer 2. Use computer 1 for the rest of the lab. Step 5: Configure Advanced Security features in Windows Firewall a. To configure advanced security, use the following path: Control Panel > Administrative Tools > Windows Firewall with Advanced Security 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 17 of 22

b. In the panel on the left, you can select items to configure Inbound Rules, Outbound Rules, or Connection Security Rules. You can also click Monitoring to view the status of configured rules. Click Inbound Rules. c. In the middle panel, scroll down until you find the inbound rule named Files and Printer Sharing (Echo Request ICMPv4-In). Right-click on the rule and select Properties > Advanced tab > Customize. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 18 of 22

d. The Advanced tab displays the profile(s) used by the computer and the Customize Interface Types window displays the different connections configured for your computer. Click OK. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 19 of 22

e. Click the Programs and Services tab. Click Settings... The Customize Service Settings window opens. In the space below, list the short name of four services that are available. When done, click Cancel. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 20 of 22

f. There are many applications that users do not normally see that also need to get through the Windows Firewall to access your computer. These are the network level programs that direct traffic on the network and the Internet. Click Protocols and Ports tab. g. For the ICMP settings, click the Customize button. The Customize ICMP Settings window opens. In the example here, allowing incoming echo requests is what allows network users to ping your computer to determine if it is present on the network. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 21 of 22

List four of the Specific ICMP types. h. Close all windows. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 22 of 22