05.03.2013 Views

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

15-54 Chapter 15 Configuring Network and Internet Connections<br />

8. Enter the port information for the service.<br />

9. Click OK to close the Service Settings dialog box. Click OK to close the Advanced<br />

Settings dialog box. Click OK again to close the Windows Firewall dialog box.<br />

ICMP Exceptions<br />

ICMP allows routers and host computers to swap basic error and configuration information.<br />

The information includes whether or not the data sent reaches its final destination,<br />

whether it can or cannot be forwarded by a specific router, and what the best<br />

route for the data is. ICMP tools such as Pathping, Ping, and Tracert are often used to<br />

troubleshoot network connectivity.<br />

ICMP troubleshooting tools and their resulting messages are helpful when used by a<br />

network administrator, but harmful when used by an attacker. For instance, a network<br />

administrator sends a ping request in the form of an ICMP packet that contains an echo<br />

request message to the IP address that is being tested. The reply to that echo request<br />

message allows the administrator to verify that the computer is reachable. An attacker,<br />

on the other hand, can send a storm of specially formed pings that can overload a<br />

computer so that it cannot respond to legitimate traffic. Attackers can also use ping<br />

commands to determine the IP addresses of computers on a network. By configuring<br />

ICMP, you can control how a system responds (or does not respond) to such ping<br />

requests. By default, Windows Firewall blocks all ICMP messages.<br />

Table 15-5 provides details about ICMP exceptions you can enable in Windows<br />

Firewall.<br />

Table 15-5 ICMP Options<br />

ICMP Option Description<br />

Allow Incoming<br />

Echo Request<br />

Allow Incoming Timestamp<br />

Request<br />

Allow Incoming Mask<br />

Request<br />

Allow Incoming Router<br />

Request<br />

Controls whether a remote computer can ask for and receive a<br />

response from the computer. Ping is a command that requires<br />

you to enable this option. When enabled (as with other options),<br />

attackers can see and contact the host computer.<br />

Sends a reply to another computer, stating that an incoming<br />

message was received and includes time and date data.<br />

Provides the sender with the subnet mask for the network of<br />

which the computer is a member. The sender already has the<br />

IP address; giving the subnet mask is all an administrator (or<br />

attacker) needs to obtain the remaining network information<br />

about the computer’s network.<br />

Provides information about the routes the computer recognizes<br />

and passes on information it has about any routers to which it is<br />

connected.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!