titled "MS recommends users firewall all connections on a LAN?"...
*******************************************
Sooner Al said:
In light of the recent advice by Microsoft to firewall *ALL* connections on a LAN to protect the
networked PCs from other infected PCs, how does one enable ICF on the private LAN NIC of an ICS box?
[...]
Hmm, you spotted that too.
This question was raised during the request for feedback on this article.
I'm not aware of any satisfactory official response on how you are meant to
perform F+P sharing with every interface firewalled, other than a vague
commect that normal LAN functionality may be compromised. A linked article
shows how to make holes in the firewall, but does not explicitly tell how to
enable F+P sharing.
IMHO, the advice is bad, and does not consider the various network
configurations.
Typically, you want f+p sharing to be permitted between LAN machines, but
closed to the Internet.
ICF does not permit this distinction.
For that reason, I still recommend NOT enabling the XP firewall on an
internal LAN connection, in spite of what the article says.
If you want to firewall an internal LAN connection in addition to the
firewalling provided by NAT, then I'd suggest you use a 3-rd party product
like ZoneAlarm, where you can define a local zone and permit F+P sharing on
the local zone.
--
Best Regards
Ron Lowe
MVP - Windows Networking
*******************************************
--
Al
Please post *ALL* questions and replies to the news group for the mutual
benefit of all of us...Unsolicited personal emails are *NOT* answered.
Bill Sanderson said:
Actually, current Microsoft recommendations are to enable ICF on all
interfaces, if I understand this correctly, so it's worth learning how to
enable ICF and open RD and file and print sharing through it for everybody.
Microsoft 3-step security plan here:
http://www.microsoft.com/security/protect/default.asp
ICF Firewall configuring instructions here:
http://www.microsoft.com/security/protect/ports.asp