This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
networking:firewall:windows_troubleshooting [2016/03/24 09:59] jcooper |
networking:firewall:windows_troubleshooting [2021/07/07 12:14] (current) gcooper |
||
---|---|---|---|
Line 3: | Line 3: | ||
===== Enable Logging of port dropping packets ===== | ===== Enable Logging of port dropping packets ===== | ||
- | - Control Panel -> Windows Firewall -> Advanced Settings | + | **Control Panel -> Windows Firewall -> Advanced Settings** |
- | | + | |
+ | Right click on the < | ||
{{: | {{: | ||
Line 14: | Line 15: | ||
- | | + | * Change Log dropped packets to yes. Note the location of the log in the Name field. |
- | + | ||
- | - Change Log dropped packets to yes. Note the location of the log in the Name field. | + | |
{{: | {{: | ||
Line 22: | Line 21: | ||
* Run the failing process then check the log for which port dropped packets. | * Run the failing process then check the log for which port dropped packets. | ||
- | |||
- | One-liner to block evil hosts grep'd from Apache error logs: | ||
- | |||
- | < | ||
- | for ip in `grep Itau.com.br / | ||
- | </ | ||
- | |||
- | ===== Block Hosts by User Agent String ===== | ||
- | |||
- | http:// | ||
- | |||
- | < | ||
- | vim .htaccess | ||
- | </ | ||
- | |||
- | < | ||
- | # Block bots by User Agent string | ||
- | SetEnvIfNoCase User-Agent " | ||
- | # Block empty User Agent string | ||
- | SetEnvIfNoCase User-Agent ^$ bad_bot | ||
- | SetEnvIfNoCase User-Agent " | ||
- | SetEnvIfNoCase User-Agent " | ||
- | SetEnvIfNoCase User-Agent " | ||
- | |||
- | <Limit GET POST HEAD> | ||
- | Order Allow,Deny | ||
- | Allow from all | ||
- | Deny from env=bad_bot | ||
- | </ | ||
- | </ | ||
- | |||
- | < | ||
- | service httpd restart | ||
- | </ |