In a small-sized local area network, several other computers with Windows XP system are connected to ADSL through a computer with Windows Server 2008 system, but one of the Internet users is not very conscious. When everyone visits the network normally, the user is free to use the Thunder tool to download large-capacity video movies or other large-capacity information in the LAN, causing the entire LAN to be very slow when accessing the Internet. Other users are not. I am very eager to stop him from maliciously using the Thunder program to download in the LAN.
In order to effectively ensure the stability of the Windows Server 2008 network, can we prohibit any user on the LAN from using the Thunder tool at any time in the Windows Server 2008 system acting as the ADSL dial-up host? Malicious download?
It's actually very simple! We just need to find a way to disable the TCP3077 and 3078 ports that the Thunder tool needs to access in the Windows Server 2008 system host, so that others can be prohibited from using the Thunder tool in the LAN. The purpose of malicious downloading. We can use a variety of methods to block the TCP port 3077, 3078 port, for example, you can set the built-in firewall parameters of the Windows Server 2008 system, you can also enable the TCP /IP filtering function, the specific setting method is not exhaustive here. Here we set the Windows Server 2008 system's advanced firewall parameters to block TCP3077, 3078 ports. Here are the specific steps:
First click "Start" /"" in the Windows Server 2008 system desktop Program /Server Manager command, in the pop-up Server Manager console window, click the "Configure" /"Advanced Security Windows Firewall" /"Inbound Rules" branch option, corresponding to the "Inbound Rules" The right side of the branch option displays the area, click the "New Rule" option to open the New Inbound Rule Wizard dialog box;
Secondly, select the "Port" option from the wizard window, and then click "Next" Button, enter the setting dialog box shown in Figure 2, select the "TCP" option, then select the "Specific Local Port" option, enter the "3077, 3078" port number in the text box corresponding to the option, continue to click "Next" button;
When the wizard screen asks us to specify what to do when the connection matches the criteria specified in the rule, we Select the "Block Connection" option, click the "Next" button, then set the appropriate configuration file for the current security rule, then take a suitable name for the new security rule, and finally click the "Finish" button. The Advanced Security Firewall in Windows Server 2008 automatically disables the Thunder tool to access the network, so that no one on the LAN can use the Thunder tool to perform illegal downloads.
Of course, if we feel that the above settings are troublesome, we can also download and use professional tools to help from the Internet. For example, we can install a professional tool called Bandwidth Controller Standard to limit the LAN. The bandwidth bandwidth resources of each ordinary computer, thereby achieving the purpose of restricting malicious use of Thunderbolt tools for illegal downloading.
As the saying goes, I am afraid of 10,000, I am afraid of it. The important data information stored
Data Circulation Capability is an important performance indicator and valuable resource for servers.
The upcoming Windows 7 has attracted a lot of users attention, and various predictions and early tri
WDS (Windows Deployment Servic), the Windows deployment service, is Microsofts latest image deployme
Using the command line to improve the management efficiency of Windows Server 2008
How does Win2008 Server Core work? 5 steps to learn Win2008 Server Core operation
Modify the system boot information method of win8 system boot manager
CentOS6 installed under Windows 2008R2 HyperV, network card painless settings
Details Windows Server 2008 Comprehensive Review Strategy
Backup function in Windows Server 2008 is fully transparent
Win2008 wireless network is not properly configured to use IP protocol error solution
Windows Server 2008 Enterprise Edition Activation Method
Windows2008 vs. Windows Vista Advantage
Understand the common skills of windows2008
WinXP common system service introduction (7)
The method of clearing the less common application under win8 system
Win7/Win8.1/Win10 command line configuration static IP address method
Win7 system 80 port is occupied by the program process detailed resolution step
How does the 360 browser clear the username? 360 browser to clear the user name method
Win8.1 computer can not connect to CMCC, Chinanet and other WiFi hotspots
XP can not stop the general volume solution
WP8 mobile phone only 4GB storage can not upgrade Win10 Mobile (5GB) how to do?