This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
networking:firewall:windows_troubleshooting [2016/03/23 13:23] jcooper created |
networking:firewall:windows_troubleshooting [2021/07/07 12:14] (current) gcooper |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== | + | ====== |
- | See also **[[networking: | + | ===== Enable Logging of port dropping packets ===== |
- | :!: You can use '' | + | **Control Panel -> Windows Firewall -> Advanced Settings** |
- | < | + | Right click on the < |
- | iptables -I INPUT -s 66.184.141.132 -j DROP | + | |
- | </ | + | |
- | Delete the rules: | + | {{:networking: |
- | < | + | |
- | iptables -D INPUT -s 66.184.141.132 -j DROP | + | |
- | </ | + | |
- | Show the rules: | + | - On the Domain Profile Tab under Logging tab select Customize |
+ | {{:networking: | ||
- | < | ||
- | iptables -L INPUT | ||
- | </ | ||
- | One-liner | + | * Change Log dropped packets |
- | < | + | {{: |
- | for ip in `grep Itau.com.br / | + | |
- | </ | + | |
- | ===== Block Hosts by User Agent String ===== | + | * Run the failing process then check the log for which port dropped packets. |
- | http:// | ||
- | |||
- | < | ||
- | vim .htaccess | ||
- | </ | ||
- | |||
- | < | ||
- | # Block bots by User Agent string | ||
- | SetEnvIfNoCase User-Agent " | ||
- | # Block empty User Agent string | ||
- | SetEnvIfNoCase User-Agent ^$ bad_bot | ||
- | SetEnvIfNoCase User-Agent " | ||
- | SetEnvIfNoCase User-Agent " | ||
- | SetEnvIfNoCase User-Agent " | ||
- | |||
- | <Limit GET POST HEAD> | ||
- | Order Allow,Deny | ||
- | Allow from all | ||
- | Deny from env=bad_bot | ||
- | </ | ||
- | </ | ||
- | |||
- | < | ||
- | service httpd restart | ||
- | </ |