Compartir a través de


Connection Security Rule Properties Page: Protocols and Ports Tab

Updated: January 20, 2009

Applies To: Windows 7, Windows Server 2008 R2

Use this tab of the Connection Security Rule Properties dialog box to specify which protocols and ports in a network packet match this connection security rule. Only network traffic that matches the criteria on both this tab and the endpoints on the Computers tab match the rule and are subject to its authentication requirements.

To get to this tab

  1. In the Windows Firewall with Advanced Security MMC snap-in, click Connection Security Rules.

  2. Right-click the rule that you want to modify, and then click Properties.

  3. Click the Protocols and Ports tab.

Protocol type

Select the protocol whose network traffic will be protected by this connection security rule. If the protocol you want is not in the list, select Custom, and type the protocol number in Protocol number.

If you choose TCP or UDP in the list, then you can specify the TCP or UDP port numbers in Endpoint 1 port and Endpoint 2 port.

Protocol number

When you select a protocol type, the corresponding protocol identification number is automatically displayed in Protocol number and is read-only. If you select Custom for Protocol type, then type the protocol identification number in Protocol number.

Endpoint 1 port

This option is available only if the protocol is set to TCP or UDP. Use this option to specify the port number used by the computer that is part of Endpoint 1. If you select All ports, then all network traffic for the protocol you selected matches this connection security rule. If you select Specific Ports, then you can type the port numbers in the box under the list. Separate port numbers with commas.

Note

If this rule has Do not authenticate on the Authentication tab, then you can type port numbers in a range by separating the low and high values with a hyphen, as shown:
80, 445, 5000-5010

Endpoint 2 port

This option is available only if the protocol is set to TCP or UDP. Use this option to specify the port number used by the computer that is part of Endpoint 2. If you select All ports, then all network traffic for the protocol you selected matches this connection security rule. If you select Specific Ports, then you can type the port numbers in the box under the list. Separate port numbers with commas.

Note

If this rule has Do not authenticate on the Authentication tab, then you can type port numbers in a range by separating the low and high values with a hyphen, as shown:
80, 445, 5000-5010