Current location - Quotes Website - Collection of slogans - How to open a local port?
How to open a local port?
Question 1: How to open the 8 1 port of this machine? Step 1: Click Start Menu/Settings/Control Panel/Administrative Tools, and double-click to open the local security policy.

Select "IP security policy, on the local computer", click the right mouse button in the blank of the right pane to pop up the shortcut menu.

Select "Create IP Security Policy" (as shown on the right), and a wizard will pop up. Click "Next" button in the wizard,

Name a new security policy; Press Next again, and the Secure Communication Request screen will be displayed. On the screen, put the

Remove the check on the left side of "Activate Default Corresponding Rules" and click "Finish" to create a new IP security policy.

Step 2, right-click the IP security policy, and in the Properties dialog box, uncheck "Use Add Wizard" on the left.

Then click the "Add" button to add a new rule, and then the "New Rule Properties" dialog box pops up. Click the "Add" button on the screen.

Pop up the IP filter list window; In the list, first remove the check mark on the left of "Use the Add Wizard", and then click the "Add" button on the right to add a new filter.

Step 3, enter the Filter Properties dialog box. The first thing you see is addressing, and the source address is "any IP address".

Select "My IP Address" as the destination address; Click the Protocol tab and select TCP from the Select Protocol Type drop-down list.

Then enter "135" in the text box under "To this port" and click the "OK" button (as shown in the left figure), thus adding a.

Shielding the filter of TCP 135(RPC) port can prevent the outside world from connecting to your computer through 135 port.

Click OK and return to the Filter List dialog box. You can see that a policy has been added.

Repeat the above steps to add TCP 137, 139, 445, 593 ports and UDP 135, 139, 445 ports, and establish corresponding filters for them.

Repeat the above steps, add the shielding policies of TCP ports 1025, 2745, 3 127, 6 129 and 3389, establish the filters of the above ports, and finally click OK.

Step 4: In the "New Rule Properties" dialog box, select "New IP Filter List", and then click the circle on its left to add a point.

Indicates that it has been activated, and finally click the Filter Action tab. In the Filter Actions tab, remove the checkmark to the left of Use the Add Wizard.

Click "Add" to add an "intercept" operation (right): in the "Security Measures" tab of "New Filter Operation Properties", select "intercept".

Then click "OK" button.

Step 5: Enter the "New Rule Attribute" dialog box and click "New Filter Action". A point will be added to the circle on the left to indicate that it has been activated.

Click the Close button to close the dialog box; Finally, return to the New IP Security Policy Properties dialog box and check the New IP Filter List on the left.

Press the OK button to close the dialog box. In the Local Security Policy window, right-click the newly added IP security policy and select Assign.

So after the restart, the above network ports in the computer are closed, and viruses and hackers can no longer connect to these ports, thus protecting your computer. By the way, if you are running a website or want to make a website, you can contact us. We can provide a program that can be automatically updated without maintenance, and you can have an unlimited website overnight. Sina news can appear on your website for the first time.

Question 2: How to enable the properties of local link-Properties-Generic-Internet Protocol (TCP/IP)- Properties-Generic-Advanced-Options -ICP/IP Filtering-Local Port, where terminal products can be disabled or ports that need to be opened can be allowed!

Question 3: How to open the 3389 port of this machine? Close port 3389:

1. First of all, port 3389 was opened by the remote management terminal of windows, not a Trojan horse. Please confirm whether the service is started by yourself. If it is not necessary, it is recommended to close the service.

Win2000 server startup-> Program-> Management tools-> Terminal service items can be found in the service. Select the property option to change the startup type to manual and stop the service.

win 2000 pro begins-& gt; Settings-> Control panel->; Management tools-> Terminal service items can be found in the service. Select the property option to change the startup type to manual and stop the service.

Windows xp shutdown method: right-click my computer and select Properties-> Remote, check the Remote Assistance and Remote Desktop boxes. 2. Start-run regedit to open the registry [HKEY _ local _ machine \ system \ control \ terminal server \ WDS \ rdpwd \ TDS \ TCP branch, and select a key named portnumber. Change it from 3389 to something else (such as1234) * * There are two controls here, namely controlSET00 1 and controlSET002. I'm going to push controlSET00 1 one by one. Under controlSET002, we are checking that the current control set [HKEY _ local _ machine \ system \ should have one or more similar subitems in the branch of the current control set \ control \ terminal server \ Winstations \ RDP-TCP \ port number. Similarly, the software used to open the 3389 service of XP system is xp3389.exe, and it can also be opened in reverse.

Question 4: How to check the open network ports of this computer? Click "Start → Run" in turn, enter "cmd" and press enter to open the command prompt window. Type "netstat -a -n" at the command prompt, and then press Enter to view the port number and status of TCP and UDP connections displayed in digital form.

Network statistics-electronics -n -o -s-an

-a shows all active TCP connections and TCP and UDP ports that the computer listens to.

-e indicates the number of bytes and packets sent and received by Ethernet.

-n indicates that only the addresses and port numbers of all active TCP connections are displayed in digital form.

-o displays the active TCP connections, including the process ID(PID) of each connection.

-s indicates that statistics of various connections, including port numbers, are displayed by protocol.

-View all open ports

Question 5: How to check the open ports of this machine? You can use the "netstat" command that comes with Windows to view the open ports of the system. In addition, its main parameters are "-a means to display all connection and detection ports, and -n means to display addresses and port numbers in digital format. Operation method: Enter the command line. Enter: netstat -an, press enter, and the local open system will have many ports, in which: Active Connections refers to the current local connection status, Proto refers to the protocol name used for connection, and Local Address refers to the address of the local computer and the port number being used for connection. The forwarding address refers to the IP address of the remote computer connected to the port and its port number, and the status indicates the connection status of TCP. You can see that the listening port in the following lines is UDP protocol, so it has no status display. Finally, if we know the port number used by Trojan horse when we use the computer in the future, and find that this port number is open and it is located in listening state, then you can judge what Trojan horse has been hit, such as 7626, which is the default listening port of Glacier Trojan horse, and so on. There is no item in my command prompt: Foreing Address, because I have disabled it remotely through the registry. I hope I can correct my mistakes. Ok, bye!

Question 6: How to open the computer port? Each service corresponds to a corresponding port. For example, as we all know, the port of WWW service is 80, TP is 25 and ftp is 2 1. These services are all started by default in win2000 installation. Individual users are really unnecessary. Closing a port means closing useless services. In the control panel "Administrative Tools" in "Services".

1, close ports such as 7.9: close simple TCP/IP services and support the following TCP/IP services: character generator, daytime, discard, echo and quotation of the day.

2. Close port 80: Close the WWW service. The name displayed in "Service" is World Wide Web Publishing Service, which provides web connection and management through the snap-in of Internet information services.

3. Close port 25: Close the Simple Mail Transfer Protocol (SMTP) service, which provides the function of sending e-mail across the network.

4. Close port 2 1: Close the FTP publishing service and provide FTP connection and management through the Internet information service management unit.

5. Close port 23: Close the Telnet service, which allows remote users to log on to the system and run console programs using the command line.

6. It is also important to shut down the server services that provide RPC support, files, printing and naming pipes. Turning it off will turn off win2k's default * * * enjoyment, such as ipc$, c$, admin$ and so on. The shutdown of this service will not affect your other operations.

7. The other port is 139, which is a NetBIOS session port for file and print * * *. Note that the unix machine running samba has also opened the 139 port, which has the same function. In the past, streamer 2000 was not very accurate in judging the host type of the other party. It is estimated that the 139 port is open, and it is considered to be an NT machine, but it is ok now. The way to turn off 139 listening is to select the Internet Protocol (TCP/IP) attribute in the LAN connection in the network and dial-up connection, enter the advanced TCP/IP settings and WINS settings, and there is an item "Disable NETBIOS of TCP/IP", and then tick off the 139 port. For individual users, it can be set to "Disabled" in various service attribute settings to avoid restarting the service and opening the port next time.

Each service corresponds to a corresponding port. For example, as we all know, the port of WWW service is 80, TP is 25 and ftp is 2 1. These services are started by default in win2000 installation. Individual users are really unnecessary. Closing a port means closing useless services.

In the control panel "Administrative Tools" in "Services".

1, close ports such as 7.9: close simple TCP/IP services and support the following TCP/IP services: character generator, daytime, discard, echo and quotation of the day.

2. Close port 80: Close the WWW service. The name displayed in "Service" is World Wide Web Publishing Service, which provides web connection and management through the snap-in of Internet information services.

3. Close port 25: Close the Simple Mail Transfer Protocol (SMTP) service, which provides the function of sending e-mail across the network.

4. Close port 2 1: Close the FTP publishing service and provide FTP connection and management through the Internet information service management unit.

5. Close Port 23: Close Teln......& gt& gt

Question 7: How to open the specified network port? Network connection-Local connection-Properties-Advanced-Exception-Add port-Write the name with performance, write the port to be opened, and confirm.

Question 8: How to open the jingyan.baidu/...d?? Local port 50 minutes

Question 9: How to open the port of the computer? Right-click "My Network Places" and select "Properties" in the pop-up menu to open the network connection window. Right-click the connection you use to surf the Internet and select Properties from the pop-up menu to open the Local Connection Properties window. Select the Advanced tab, and then click the Settings button at the bottom of the window to open the Advanced Settings window. There are some common network services on this page. Now we want to add new BT services. Click the Add button below to open the Service Settings window, as shown in Figure 4.

In this window, you can fill in the column of "service description" at will, just fill in the column of "the name or IP address of the computer hosting this service on your network", the column of "external port number of this server" and the column of "external port number of this server" with 68865438.

This will add a "BT" service in the "Services" column of the "Advanced Settings" page, as shown in Figure 5. This service is open to port 688 1. Similarly, you can create a new service with ports 6882~6889.

Now our BT can pass freely in ICF.

2? Open the BT download port in other professional firewalls.

Many computers do not have ICF turned on, but other professional firewalls are installed. Taking the personal firewall 2.5.0, which is common in Skynet, as an example, this paper explains how to set up an open BT download port. Other firewalls can refer to the settings.

Click the "Customize IP Rules" button of Skynet. Click Add Rule on the Customize IP Rule page to open the Modify IP Rule window.

You can fill in the column of "Name" at will, and fill in some simple descriptions of the above names in the column of "Description" at will. Select "receive or send" in the column of "packet direction", select "any address" in the IP address of the other party, then select the TCP page, fill in "from 688 1 to 6889" in the column of "local port", check "SYN" in the column of "TCP flag", and finally check "when it meets" now. Select the check box in front of it, and then click the Save Rule icon above. Everything's fine.

Through the above settings, public users can experience the fun of BT high-speed download.

3389 must be carefully considered! ! ! !

Question 10: How to open the 8 1 port of this machine? Step 1: Click Start Menu/Settings/Control Panel/Administrative Tools, and double-click to open the local security policy.

Select "IP security policy, on the local computer", click the right mouse button in the blank of the right pane to pop up the shortcut menu.

Select "Create IP Security Policy" (as shown on the right), and a wizard will pop up. Click "Next" button in the wizard,

Name a new security policy; Press Next again, and the Secure Communication Request screen will be displayed. On the screen, put the

Remove the check on the left side of "Activate Default Corresponding Rules" and click "Finish" to create a new IP security policy.

Step 2, right-click the IP security policy, and in the Properties dialog box, uncheck "Use Add Wizard" on the left.

Then click the "Add" button to add a new rule, and then the "New Rule Properties" dialog box pops up. Click the "Add" button on the screen.

Pop up the IP filter list window; In the list, first remove the check mark on the left of "Use the Add Wizard", and then click the "Add" button on the right to add a new filter.

Step 3, enter the Filter Properties dialog box. The first thing you see is addressing, and the source address is "any IP address".

Select "My IP Address" as the destination address; Click the Protocol tab and select TCP from the Select Protocol Type drop-down list.

Then enter "135" in the text box under "To this port" and click the "OK" button (as shown in the left figure), thus adding a.

Shielding the filter of TCP 135(RPC) port can prevent the outside world from connecting to your computer through 135 port.

Click OK and return to the Filter List dialog box. You can see that a policy has been added.

Repeat the above steps to add TCP 137, 139, 445, 593 ports and UDP 135, 139, 445 ports, and establish corresponding filters for them.

Repeat the above steps, add the shielding policies of TCP ports 1025, 2745, 3 127, 6 129 and 3389, establish the filters of the above ports, and finally click OK.

Step 4: In the "New Rule Properties" dialog box, select "New IP Filter List", and then click the circle on its left to add a point.

Indicates that it has been activated, and finally click the Filter Action tab. In the Filter Actions tab, remove the check mark to the left of Use the Add Wizard.

Click "Add" to add an "intercept" operation (right): in the "Security Measures" tab of "New Filter Operation Properties", select "intercept".

Then click "OK" button.

Step 5: Enter the "New Rule Attribute" dialog box and click "New Filter Action". A point will be added to the circle on the left to indicate that it has been activated.

Click the Close button to close the dialog box; Finally, return to the New IP Security Policy Properties dialog box and check the New IP Filter List on the left.

Press the OK button to close the dialog box. In the Local Security Policy window, right-click the newly added IP security policy and select Assign.

So after the restart, the above network ports in the computer are closed, and viruses and hackers can no longer connect to these ports, thus protecting your computer. By the way, if you are running a website or want to make a website, you can contact us. We can provide a program that can be automatically updated without maintenance, and you can have an unlimited website overnight. Sina news can appear on your website for the first time.