MZ@ !L!This program cannot be run in DOS mode. $Rؕ3}3}3}H̴3}H̱3}Rich3}PEL!  0,@.rsrc @@H(@h#(@Xp0H`x 8-P.h/012(8HXhx(8HXhx(8P4$n)*.49>?,@@(AA$CD4  Q,8V8Z]axe(k@qvtw\T`>#thܶXx|88H,"X'MUIu N311: MUIzh-CNR %1!s! n: ----------------------------------------------------------------------* r` %1!s!% 2kpXV{eu %1!s! LocalFirewallRules %1!s! LocalConSecRules %2!s! InboundUserNotification %3!s! RemoteManagement %4!s! UnicastResponseToMulticast %5!s! e_: LogAllowedConnections %1!s! LogDroppedConnections %2!s! FileName %3!s! MaxFileSize %4!s! ;N!j_: KeyLifetime %1!u!min,%2!u!sess SecMethods %3!s! ForceDH %4!s!PA IPsec:` StrongCRLCheck %1!s! SAIdleTimeMin %2!s! DefaultExemptions %3!s! IPsecThroughNAT %4!s! AuthzUserGrp %5!s! AuthzComputerGrp %6!s! AuthzUserGrpTransport %7!s! AuthzComputerGrpTransport %8!s!, StatefulFTP %1!s!, StatefulPPTP %1!s!( V{euX[P %1!s!WMneNN(uMneN]y(uhg:_6Ro ĉR Ty: %1!s! ----------------------------------------------------------------------* c: %1!s!) ]/T(u: %1!s!( MneN: %1!s!* {|W: %1!s!% ,g0WS~~p: %1!s!% ܏ zS~~p: %1!s!( cS{|W: %1!s!) ~~p1: %1!s!) ~~p2: %1!s!* zS1: %1!s!* zS2: %1!s!* OS: %1!s!* d\O: %1!s!, Auth1: %1!s!, Auth1PSK: %1!s!, Auth1CAName: %1!s!, Auth1CertMapping: %1!s!, Auth1ExcludeCAName: %1!s!, Auth1HealthCert: %1!s!, Auth2: %1!s!, Auth2CAName: %1!s!PA, Auth2CertMapping: %1!s!, Auth2HealthCert: %1!s!, MainModeSecMethods: %1!s!9 MainModeKeyLifetime: %1!u!min,%2!u!sess, QuickModeSecMethods: %1!s!, QuickModePFS: %1!s!S_MRMneNN/A (N GPO X[P) ] Rd %1!u! ĉR0  ]fe %1!u! ĉR0 * !j_: %1!s!o ĉR Ty: %1!s! ----------------------------------------------------------------------* c: %1!s!* R~: %1!s!) ]/T(u: %1!s!( MneN: %1!s!PA* ,g0W IP: %1!s!* ܏ z IP: %1!s!' ,g0WzS: 0 %1!s!& ܏ zzS: 0 0 %1!s!* OS: %1!s!* z^: %1!s!* gR: %1!s!( cS{|W: %1!s!3 RemoteComputerGroup: %1!s!' ܏ z(u7b~: %1!s!* [hQ: %1!s!* d\O: %1!s!o ;N!j_ SA (MON %1!s!) ----------------------------------------------------------------------( ,g0W IP 0W@W: %1!s!( ܏ z IP 0W@W: %1!s!, Auth1: %1!s!, Auth2: %1!s!* MM cO: %1!s!$ Cookie [: ( eP^fN: %1!s!p _!j_ SA (MON %1!s!) ----------------------------------------------------------------------( ,g0W IP 0W@W: %1!s!( ܏ z IP 0W@W: %1!s!( ,g0WzS: %1!s!( ܏ zzS: %1!s!* OS: %1!s!* eT: %1!s!* QM cO: %1!s! ] Rd %1!u! *N SA0 R`X[P ]Ǐ Rd %1!u! *NR`ĉR V:N[N NnNR`X[P0 *gMn, el>f:yc[ GPO X[P-Nv %1!s! MainMode n V:N[N\*gMn0 NR GPO wQ g Ty %1!s! :  O(uُN GPO ID KNNegƋ+R@b GPO0 , PFS: %1!s! KeyLifetime %1!s! SecMethods %2!s! ForceDH %3!s!b~ ]Ǐfe %1!u! *NR`ĉR V:N[N NnNR`X[P0 lQ(uMneN( ub Consec ĉR: %1!s!/ {|W Nx9 %1!-4s! %2!-4s!( MS: %1!s!* eT: %1!s!) Auth1 ,g0W ID: %1!s!( Auth1 ܏ z ID: %1!s!*gweN*g NAT Tbv gRhVNAT Tbv gRhVT[7bzsQ/T(uAQ;bkǏeQQ/f&TNUOhQ@\GPO,g0WX[P/T(uy(uRRequireInRequestOutRequestInRequestOutRequireInRequireOutNoAuthenticationDHGroup1DHGroup2 DHGroup14ECDHP256ECDHP384MainModeR`Y`S O$N ComputerKerb ComputerCert ComputerPSK ComputerNTLM?S TUserCertUserKerbUserNTLM3DESDESAES128AES192AES256MD5SHA1TCPUDPICMPv4ICMPv6AHESPNeighborDiscoveryICMPNAuthEnc NotRequirede~LANRASWN(ulQ(u BlockInboundBlockInboundAlways AllowInbound BlockOutbound AllowOutbound:,-+%umin%ukb) Auth2 ,g0W ID: %1!s!( Auth2 ܏ z ID: %1!s!%1!02x!ComputerCertECDSAP256ComputerCertECDSAP384UserCertECDSAP256UserCertECDSAP384 AESGCM128 AESGCM192 AESGCM256SHA256SHA384 AESGCM128 AESGCM192 AESGCM256 AESGMAC128 AESGMAC192PA AESGMAC256 Auth1ECDSAP256CAName: %1!s! Auth1ECDSAP256CertMapping: %2!s! Auth1ECDSAP256ExcludeCAName: %3!s! Auth1ECDSAP256CertType: %4!s! Auth1ECDSAP256HealthCert: %5!s! Auth1ECDSAP384CAName: %1!s! Auth1ECDSAP384CertMapping: %2!s! Auth1ECDSAP384ExcludeCAName: %3!s! Auth1ECDSAP384CertType: %4!s! Auth1ECDSAP384HealthCert: %5!s! Auth2ECDSAP256CAName: %1!s! Auth2ECDSAP256CertMapping: %2!s! Auth2ECDSAP256CertType: %3!s! Auth2ECDSAP256HealthCert: %4!s! Auth2ECDSAP384CAName: %1!s! Auth2ECDSAP384CertMapping: %2!s! Auth2ECDSAP384CertType: %3!s! Auth2ECDSAP384HealthCert: %4!s! Auth2ECDSAP256CAName: %1!s! Auth2ECDSAP256CertMapping: %2!s! Auth2ECDSAP256CertType: %3!s! Auth2ECDSAP384CAName: %1!s! Auth2ECDSAP384CertMapping: %2!s! Auth2ECDSAP384CertType: %3!s!O %1!s!: ---------------------------------------------------------------------- %1!s! AuthDynEnc BootTimeRuleCategory %1!s! FirewallRuleCategory %2!s! StealthRuleCategory %3!s! ConSecRuleRuleCategory %4!s! Windows 2kpX {|+R:o ĉR Ty: %1!s! ----------------------------------------------------------------------* c: %1!s!( MneN: %1!s!9 KeyLifetime: %1!u!min,%2!u!sess) ~~p1: %1!s!) ~~p2: %1!s!, Auth1: %1!s!, Auth1PSK: %1!s!, Auth1CAName: %1!s!, Auth1CertMapping: %1!s!, Auth1ExcludeCAName: %1!s!, Auth1HealthCert: %1!s!, SecMethods: %1!s!) ]/T(u: %1!s! c6e1Y% : %1!S! S1Y% : %1!S! UcX'Y\ : %1!S! c6eX'Y\ : %1!S! OSFU1Y% : %1!S! c6e0ReHev Cookie : %1!S! ;`qQUc : %1!S!$ TotalGetSpi : %1!S!$ TotalKeyAdd : %1!S!$ TotalKeyUpdate : %1!S!$ GetSpiFail : %1!S!$ KeyAddFail : %1!S!$ KeyUpdateFail : %1!S!$ IsadbListSize : %1!S!$ ConnListSize : %1!S! c6e0ReHepencS : %1!S! IPsec ~ ----------------  IPsecStatistics NS(u0 ;mRsQT : %1!S!" xS} SA : %1!S!PA cwv[ : %1!S! [mR : %1!S! [ Rd : %1!S! ͑eub[ : %1!S! ;mRS : %1!S! v SPI pencS : %1!S! l g[vpencS : %1!S! *gvpencS : %1!S! g͑>ehKmvpencS : %1!S! Sv:g[W[ : %1!S! c6ev:g[W[ : %1!S! Sv~ǏvW[ : %1!S! c6ev~ǏvW[ : %1!S! Sv OW[ : %1!S! c6ev OW[ : %1!S! SvxS}W[ : %1!S! c6evxS}W[ : %1!S!  (WS-NSvW[ : %1!S! (WS-Nc6evW[ : %1!S! IKE ~ --------  IKEStatistics NS(u0 ! ;N!j_ : %1!S! _!j_ : %1!S!# o SA : %1!S! N1Y% : %1!S! ;mRUc : %1!S! ;mRc6e : %1!S! Uc1Y% : %1!S!$ ĉRn: %1!s! _!j_:X QuickModeSecMethods %1!s! QuickModePFS %2!s!PA [hQsQT:* GPO Ty %1!s!O hQ@\V{eur`: ----------------------------------------------------------------------V Windows 2kpXĉR: ---------------------------------------------------------------------- ޏc[hQĉR:, Auth1CertType: %1!s!, Auth2CertType: %1!s! AuthNoEncap, ExemptIPsecProtectedConnections: %1!s!RequireInClearOut, ApplyAuthorization: %1!s!uN^(u z^uN(u7bb~,g0W~V{eun,g0WnR`n, ForceDH: %1!s! ;N!j_ĉR:DHCP~V{euno (WdkHr,gv Windows -N*g[s "netsh advfirewall dump" }TN0 O(u "netsh advfirewall export" }TN\S_MRwQ gؚ~[hQMnv Windows 2kpXNS_MRV{euX[PQeQ0Rxv NveN06qTSNO(u "netsh advfirewall import" S勇eNv^\vQR}0RvQNV{eu X[P-N YSNS{:g Nv~V{eu[abS_MRV{euX[P0傁n S_MRV{euX[P O(u "netsh advfirewall set store" }TN0 gsQ netsh advfirewall N Ne-Nv}TNv~Oo` S http://go.microsoft.com/fwlink/?linkid=111237 Nv (uNؚ~ [hQ Windows 2kpXv Netsh }TN 0 DHGroup24ComputerNegoEx UserNegoEx, Auth1CriteriaType: %1!s!, Auth1CertNameType: %1!s!, Auth1CertName: %1!s!, Auth1CertEku: %1!s!, Auth1CertHash: %1!s!, Auth1FollowCertRenewal: %1!s!, Auth1ECDSAP256CriteriaType: %1!s!, Auth1ECDSAP256CertNameType: %1!s!, Auth1ECDSAP256CertName: %1!s!, Auth1ECDSAP256CertEku: %1!s!, Auth1ECDSAP256CertHash: %1!s!, Auth1ECDSAP256FollowCertRenewal: %1!s!, Auth1ECDSAP384CriteriaType: %1!s!, Auth1ECDSAP384CertNameType: %1!s!, Auth1ECDSAP384CertName: %1!s!, Auth1ECDSAP384CertEku: %1!s!, Auth1ECDSAP384CertHash: %1!s!, Auth1ECDSAP384FollowCertRenewal: %1!s!, Auth2CriteriaType: %1!s!, Auth2CertNameType: %1!s!, Auth2CertName: %1!s!, Auth2CertEku: %1!s!, Auth2CertHash: %1!s!, Auth2FollowCertRenewal: %1!s!, Auth2ECDSAP256CriteriaType: %1!s!, Auth2ECDSAP256CertNameType: %1!s!, Auth2ECDSAP256CertName: %1!s!, Auth2ECDSAP256CertEku: %1!s!, Auth2ECDSAP256CertHash: %1!s!, Auth2ECDSAP256FollowCertRenewal: %1!s!, Auth2ECDSAP384CriteriaType: %1!s!, Auth2ECDSAP384CertNameType: %1!s!, Auth2ECDSAP384CertName: %1!s!, Auth2ECDSAP384CertEku: %1!s!, Auth2ECDSAP384CertHash: %1!s!, Auth2ECDSAP384FollowCertRenewal: %1!s!, Auth1KerbProxyFQDN: %1!s!, Auth1ProxyServerFQDN: %1!s!, Auth2ProxyServerFQDN: %1!s! {:gcCg SDDL %1!s! (u7bcCg SDDL %1!s!\V{eu͑n:N؞hQeV{eu0  (ul: reset [export <path\filename>] lʑ: - \ؚ~[hQ Windows 2kpXV{eu؏S:N؞V{eu0 _NSN\S_MR;mRV{eu[Q0Rc[eN-N0 - (W~V{eu[a-N }TN\@b gnԏV0R*gMnr`v^N Rd@b gޏc[hQĉRT2kpXĉR0 :yO: YNS_MRV{eu v^\vQ؏S:NhQeV{eu: netsh advfirewall reset export "c:\backuppolicy.wfw"nk*NMneNbhQ@\n0 (WWMneN-Nn^\'`0  (ul: set domainprofile (parameter) (value) Spe: state - Mn2kpXr`0 (ul: state on|off|notconfigured firewallpolicy - Mn؞eQzTQzL:N0 (ul: firewallpolicy (eQzL:N),(QzL:N) eQzL:N: blockinbound - ;bkNeQzĉR N9SMveQzޏc0 blockinboundalways - ;bk@b geQzޏc sSOޏcNĉR9SM0 allowinbound - AQNĉR N9SMveQzޏc0 notconfigured - \e_ޏcve_0 |notconfigured maxfilesize - g'Ye_eN'Y\(N KB )0 e_ޏcve_: netsh advfirewall set domainprofile logging droppedconnections enable (WN(uMneN-Nn^\'`0  (ul: set privateprofile (parameter) (value) Spe: state - Mn2kpXr`0 (ul: state on|off|notconfigured firewallpolicy - Mn؞eQzL:NTQzL:N0 (ul: firewallpolicy (eQzL:N),(QzL:N) eQzL:N: blockinbound - ;bkNeQzĉR N9SMveQzޏc0 blockinboundalways - ;bk@b geQzޏc sSOޏcNĉR9SM0 allowinbound - AQNĉR N9SMveQzޏc0 notconfigured - \e_ޏcve_0 |notconfigured maxfilesize - g'Ye_eN'Y\(KB)0 e_ޏcve_: netsh advfirewall set privateprofile logging droppedconnections enable (W;mRMneN-Nn^\'`0  (ul: set currentprofile (parameter) (value) Spe: state - Mn2kpXr`0 (ul: state on|off|notconfigured firewallpolicy - Mn؞eQzL:NTQzL:N0 (ul: firewallpolicy (eQzL:N),(QzL:N) eQzL:N: blockinbound - ;bkNeQzĉR N9SMveQzޏc0 blockinboundalways - ;bk@b geQzޏc sSOޏcNĉR9SM0 allowinbound - AQNĉR N9SMveQzޏc0 notconfigured - \e_ޏcve_0 |notconfigured maxfilesize - g'Ye_eN'Y\(KB)0 e_ޏcve_: netsh advfirewall set currentprofile logging droppedconnections enable (W@b gMneN-Nn^\'`0  (ul: set allprofiles (parameter) (value) Spe: state - Mn2kpXr`0 (ul: state on|off|notconfigured firewallpolicy - Mn؞eQzL:NTQzL:N0 (ul: firewallpolicy (eQzL:N),(QzL:N) eQzL:N: blockinbound - ;bkNeQzĉR N9SMveQzޏc0 blockinboundalways - ;bk@b geQzޏc sSOޏcNĉR9SM0 allowinbound - AQNĉR N9SMveQzޏc0 notconfigured - \e_ޏcve_0 |notconfigured maxfilesize - g'Ye_eN'Y\(KB)0 e_ޏcve_: netsh advfirewall set allprofiles logging droppedconnections enable nhQ@\^\'`0 (ul: set global statefulftp|statefulpptp enable|disable|notconfigured set global ipsec (parameter) (value) set global mainmode (parameter) (value) | notconfigured IPsec Spe: strongcrlcheck - MnYUO:_6R CRL hg0 0: y(u CRL hg(؞|notconfigured authzusergrp - MncCg^zS!j_ޏcv(u7b0 tunnel mode connections. - (ul: none|<SDDL string>|notconfigured ;N!j_Spe: mmkeylifetime - n;N!j_[uX[e(NR:NUSMO) bO݋ b$N0 - (ul: <num>min,<num>sess minlifetime: <1> R maxlifetime: <2880> R minsessions: <0> *NO݋, maxsessions: <2,147,483,647> *NO݋ mmsecmethods - Mn;N!j_^Rh - (ul: keyexch:enc-integrity,keyexch: enc-integrity[,...]|default - keyexch=dhgroup1|dhgroup2|dhgroup14|dhgroup24| ecdhp256|ecdhp384 - enc=3des|des|aes128|aes192|aes256 - integrity=md5|sha1|sha256|sha384 mmforcedh - MnO(u DH nxO[Nbc[hQv y0 - (ul: yes|no (default=no) lʑ: - MnhQ@\n Sbؚ~ IPsec y0 - N^O(u DES0MD5 T DHGroup10cOُN R[{lS(uNT N|Q[0 - mmsecmethods sQ.W[ default \V{eun:N: dhgroup2-aes128-sha1,dhgroup2-3des-sha1 :yO: y(u CRL hg: netsh advfirewall set global ipsec strongcrlcheck 0 /T(u2kpX[r` FTP v/ec: netsh advfirewall set global statefulftp enable \hQ@\;N!j_^n:N؞|gpo=<domain\GPO name>| gpo=<domain\GPO unique ID> lʑ: - \V{euX[Pn:N~V{eu[a(GPO) ~V{eu[a/fǏ{:g T0 WT GPO Ty0GPO /UNhƋ&{b,g0WV{euX[PƋ+Rv0 - ؞f:yMneNbhQ@\^\'`0 >f:yWMneNv^\'`0 K (ul: show privateprofile [parameter] Spe: state - >f:ywQ gؚ~[hQ'`v Windows 2kpX/f&T]/T(u0 firewallpolicy - >f:y؞veQzTQz2kpXL:N0 settings - >f:y2kpX^\'`0 logging - >f:ye_U_n0 lʑ: - >f:yy gMneNv^\'`0Ygl gc[Spe R>f:y@b g^\'`0 :yO: >f:yy gMneNv2kpXr`: netsh advfirewall show privateprofile state >f:yN(uMneNv^\'`0 K (ul: show privateprofile [parameter] Spe: state - >f:ywQ gؚ~[hQ'`v Windows 2kpX/f&T]/T(u0 firewallpolicy - >f:y؞veQzTQz2kpXL:N0 settings - >f:y2kpX^\'`0 logging - >f:ye_U_n0 lʑ: - >f:yy gMneNv^\'`0Ygl gc[Spe R>f:y@b g^\'`0 :yO: >f:yy gMneNv2kpXr`: netsh advfirewall show privateprofile state >f:y;mRMneNv^\'`0 K (ul: show currentprofile [parameter] Spe: state - >f:ywQ gؚ~[hQ'`v Windows 2kpX/f&T]/T(u0 firewallpolicy - >f:y؞veQzTQz2kpXL:N0 settings - >f:y2kpX^\'`0 logging - >f:ye_U_n0 lʑ: - >f:y;mRMneNv^\'`0Ygl gc[Spe R>f:y@b g^\'`0 :yO: >f:y;mRMneNv2kpXr`: netsh advfirewall show currentprofile state >f:y@b gMneNv^\'`0 5 (ul: show allprofiles [parameter] Spe: state - >f:ywQ gؚ~[hQ'`v Windows 2kpX/f&T]/T(u0 firewallpolicy - >f:y؞veQzTQz2kpXL:N0 settings - >f:y2kpX^\'`0 logging - >f:ye_U_n0 lʑ: - >f:y@b gMneNv^\'`0Ygl gc[Spe R>f:y@b g^\'`0 :yO: >f:y@b gMneNv2kpXr`: netsh advfirewall show allprofiles state>f:yhQ@\^\'`0  (ul: show global [property] Spe: ipsec - >f:y IPSec yr[n0 statefulftp - >f:y r` ftp /ec0 statefulpptp - >f:y r` pptp /ec0 dkf:y;N!j_n0 categories - >f:y2kpX{|+R0 lʑ: - >f:yhQ@\^\'`n0Ygl gc[Spe R>f:y@b g^\'`0 :yO: >f:y IPsec n: netsh advfirewall show global ipsec >f:y;N!j_n: netsh advfirewall show global mainmode>f:yS_MRNN_O݋vV{euX[P0 S (ul: show store lʑ: - dk}TN>f:yS_MRV{euX[P0 :yO: netsh advfirewall show store\V{eueN[eQS_MRV{euX[P0 k (ul: import <path\filename> lʑ: - Nc[eN[eQV{eu0 :yO: netsh advfirewall import "c:\newpolicy.pol" \S_MRV{eu[Q0ReN0 v (ul: export <path\filename> lʑ: - \S_MRV{eu[Q0Rc[eN0 :yO: netsh advfirewall export "c:\advfirewallpolicy.pol" mReޏc[hQĉR0 :Ns gĉRv^\'`ne [type=dynamic|static] [profile=public|private|domain|any[,...] (default=any)] [endpoint1=any|localsubnet|dns|dhcp|wins|defaultgateway| <IPv4 address>|<IPv6 address>|<subnet>|<range>|<list>] [endpoint2=any|localsubnet|dns|dhcp|wins|defaultgateway| <IPv4 address>|<IPv6 address>|<subnet>|<range>|<list>] [port1=0-65535|<port range>[,...]|any (default=any)] [port2=0-65535|<port range>[,...]|any (default=any)] [protocol=0-255|tcp|udp|icmpv4|icmpv6|any] lʑ: - Rd c TyƋ+RvĉR _NS cMneN0 ~~p0zS0OST{|WƋ+R0 - Yg~b0RY*N9SMy R Rd@b g9SMĉR0 :yO: N@b gMneN-N Rd Ty:N "rule1" vĉR: netsh advfirewall consec delete rule name="rule1" N@b gMneN-N Rd@b gR`ĉR: netsh advfirewall consec delete rule name=all type=dynamic >f:yc[vޏc[hQĉR0 S (ul: show rule name=<string> [profile=public|private|domain|any[,...]] [type=dynamic|static (default=static)] [verbose] lʑ: - >f:y c TyƋ+Rv@b gĉR[O _NS cMneNT{|WƋ+R0 :yO: >f:y@b gĉR: netsh advfirewall consec show rule name=all >f:y@b gR`ĉR: netsh advfirewall consec show rule name=all type=dynamicmReeQzbQz2kpXĉR0 (ul: add rule name=<string> dir=in|out action=allow|block|bypass [program=<program path>] [service=<service short name>|any] [description=<string>] [enable=yes|no (default=yes)] [profile=public|private|domain|any[,...]] [localip=any|<IPv4 address>|<IPv6 address>|<subnet>|<range>|<list>] [remoteip=any|localsubnet|dns|dhcp|wins|defaultgateway| <IPv4 address>|<IPv6 address>|<subnet>|<range>|<list>] [localport=0-65535|<port range>[,...]|RPC|RPC-EPMap|IPHTTPS|any (default=any)] [remoteport=0-65535|<port range>[,...]|any (default=any)] [protocol=0-255|icmpv4|icmpv6|icmpv4:type,code|icmpv6:type,code| tcp|udp|any (default=any)] [interfacetype=wireless|lan|ras|any] [rmtcomputergrp=<SDDL string>] [rmtusrgrp=<SDDL string>] [edge=yes|deferapp|deferuser|no (default=no)] [security=authenticate|authenc|authdynenc|authnoencap|notrequired (default=notrequired)] Yl: - \eveQzbQzĉRmR0R2kpXV{eu0 - ĉR Ty^/f/UNv N N:N "all"0 - Yg]c[܏ z{:gb(u7b~ R security _{:N authenticate0authenc0authdynenc b authnoencap0 - :N authdynenc n[hQ'`SAQ|~R`OSFU:N9SM ~[ Windows 2kpXĉRvOO(uR[0 9hncs gޏc[hQĉR^\'`OSFUR[0 bdk yT SeQz IPSec ޏc]n[hQOb FO*gO(u IPSec ۏLR[ {:g1\Yc6eeQzޏcv,{N*N TCP b UDP S0 NeYtN,{N*NpencS gRhV\͑eOSFUޏcv^[vQۏLGS~ NO@b gT~O[hQR[0 - Yg action=bypass R dir=in e_{c[܏ z{:g~0 - Yg service=any RĉRN^(u0R gR0 - ICMP {|WbNxSN:N "any"0 - Edge S:NeQzĉRc[0 - AuthEnc T authnoencap N TeO(u0 - Authdynenc NS_ dir=in e gHe0 - n authnoencap T security=authenticate y1\SbS Spe0 :yO: :N NwQ g\ňv messenger.exe mReQzĉR: netsh advfirewall firewall add rule name="allow messenger" dir=in program="c:\programfiles\messenger\msmsgs.exe" security=authnoencap action=allow :NzS 80 mRQzĉR: netsh advfirewall firewall add rule name="allow80" protocol=TCP dir=out localport=80 action=block :N TCP zS 80 OmR[hQTR[veQzĉR: netsh advfirewall firewall add rule name="Require Encryption for Inbound TCP/80" protocol=TCP dir=in localport=80 security=authdynenc action=allow :N messenger.exe mR[hQveQzĉR: netsh advfirewall firewall add rule name="allow messenger" dir=in program="c:\program files\messenger\msmsgs.exe" security=authenticate action=allow :N SDDL W[&{2NhƋv~ acmedomain\scanners mR ~ǏNv2kpXǏĉR: netsh advfirewall firewall add rule name="allow scanners" dir=in rmtcomputergrp=<SDDL string> action=bypass security=authenticate :N udp- v,g0WzS 5000-5010 mRQzAQĉR Add rule name="Allow port range" dir=out protocol=udp localport=5000-5010 action=allow:Ns gĉRv^\'`ne | name=<string> [dir=in|out] [profile=public|private|domain|any[,...]] [program=<program path>] [service=service short name|any] [localip=any|<IPv4 address>|<IPv6 address>|<subnet>|<range>|<list>] [remoteip=any|localsubnet|dns|dhcp|wins|defaultgateway| <IPv4 address>|<IPv6 address>|<subnet>|<range>|<list>] [localport=0-65535|<port range>[,...]|RPC|RPC-EPMap|IPHTTPS|any] [remoteport=0-65535|<port range>[,...]|any] [protocol=0-255|icmpv4|icmpv6|icmpv4:type,code|icmpv6:type,code| tcp|udp|any] new [name=<string>] [dir=in|out] [program=<program path> [service=<service short name>|any] [action=allow|block|bypass] [description=<string>] [enable=yes|no] [profile=public|private|domain|any[,...]] [localip=any|<IPv4 address>|<IPv6 address>|<subnet>|<range>|<list>] [remoteip=any|localsubnet|dns|dhcp|wins|defaultgateway| <IPv4 address>|<IPv6 address>|<subnet>|<range>|<list>] [localport=0-65535|RPC|RPC-EPMap|any[,...]] [remoteport=0-65535|any[,...]] [protocol=0-255|icmpv4|icmpv6|icmpv4:type,code|icmpv6:type,code| tcp|udp|any] [interfacetype=wireless|lan|ras|any] [rmtcomputergrp=<SDDL string>] [rmtusrgrp=<SDDL string>] [edge=yes|deferapp|deferuser|no (default=no)] [security=authenticate|authenc|authdynenc|notrequired] Yl: - :N]Ƌ+RvĉRnevSpe [dir=in|out] [profile=public|private|domain|any[,...]] [program=<program path>] [service=<service short name>|any] [localip=any|<IPv4 address>|<IPv6 address>|<subnet>|<range>|<list>] [remoteip=any|localsubnet|dns|dhcp|wins|defaultgateway| <IPv4 address>|<IPv6 address>|<subnet>|<range>|<list>] [localport=0-65535|<port range>[,...]|RPC|RPC-EPMap|any] [remoteport=0-65535|<port range>[,...]|any] [protocol=0-255|icmpv4|icmpv6|icmpv4:type,code|icmpv6:type,code| tcp|udp|any] lʑ: - Rd c TyƋ+RvĉR _NS c~~p0zS0 OST{|WƋ+RĉR - Yg~b0RY*N9SMy R Rd@b g9SMĉR0 - Ygc[ name=all RNc[v {|WTMneN-N Rd@b gĉR0 :yO: Rd,g0WzS 80 v@b geQR: netsh advfirewall firewall delete rule name=all protocol=tcp localport=80 Rd T:N "allow80" vĉR: netsh advfirewall firewall delete rule name="allow80" >f:yc[v2kpXĉR0  (ul: show rule name=<string> [profile=public|private|domain|any[,...]] [type=static|dynamic] [verbose] Yl: - >f:y@b g c Tyc[v9SMĉR _NS cMneNT{|Wc[ĉR0Ygc[ verbose R>f:y@b g 9SMĉR0 :yO: >f:y@b gR`eQzĉR: netsh advfirewall firewall show rule name=all dir=in type=dynamic >f:y T:N "allow browser" v@b geQzĉRv @b gn: netsh advfirewall firewall show rule name="allow browser" verbosePA Rd@b g9SMv[hQsQT0 H (ul: delete mmsa|qmsa [(source destination)|all] lʑ: - }TNO Rd(source destination)[c[v9SMv[hQsQT0 - Source T destination /fUSrv single IPv4 b IPv6 0W@W0 :yO: Rd@b g_!j_[hQsQT: netsh advfirewall monitor delete qmsa all Rd(W$N*Nc[0W@Wv@b g;N!j_[hQsQT: netsh advfirewall monitor delete mmsa 192.168.03 192.168.0.6>f:yЏLe2kpXV{eun0 (WlQ(uMneN-Nn^\'`0  (ul: set publicprofile (Spe) (e_ޏcve_0 |notconfigured maxfilesize - g'Ye_eN'Y\(KB)0 (ul: 1 - 32767|notconfigured lʑ: - MnlQ(uMneNn0 - "notconfigured" e_ޏcve_: netsh advfirewall set publicprofile logging droppedconnections enable >f:ylQ(uMneNv^\'`0 J (ul: show publicprofile [parameter] Spe: state - >f:ywQ gؚ~[hQ'`v Windows 2kpX/f&T]/T(u0 firewallpolicy - >f:y؞veQzTQz2kpXL:N0 settings - >f:y2kpXn0 logging - >f:ye_U_n0 lʑ: - >f:ylQ(uMneNv^\'`0Ygl gc[Spe R>f:yd g^\'`0 :yO: >f:ylQ(uMneN2kpXr`: netsh advfirewall show publicprofile state (ul: add rule name=<string> endpoint1=any|localsubnet|dns|dhcp|wins|defaultgateway| <IPv4 address>|<IPv6 address>|<subnet>|<range>|<list> endpoint2=any|localsubnet|dns|dhcp|wins|defaultgateway| <IPv4 address>|<IPv6 address>|<subnet>|<range>|<list> action=requireinrequestout|requestinrequestout| requireinrequireout|requireinclearout|noauthentication [description=<string>] [mode=transport|tunnel (default=transport)] [enable=yes|no (default=yes)] [profile=public|private|domain|any[,...] (default=any)] [type=dynamic|static (default=static)] [localtunnelendpoint=any|<IPv4 address>|<IPv6 address>] [remotetunnelendpoint=any|<IPv4 address>|<IPv6 address>] [port1=0-65535|<port range>[,...]|any (default=any)] [port2=0-65535|<port range>[,...]|any (default=any)] [protocol=0-255|tcp|udp|icmpv4|icmpv6|any (default=any)] [interfacetype=wiresless|lan|ras|any (default=any)] [auth1=computerkerb|computercert|computercertecdsap256| computercertecdsap384|computerpsk|computerntlm|anonymous[,...]] [auth1psk=<string>] [auth1kerbproxyfqdn=<fully-qualified dns name>] [auth1ca="<CA Name> [certmapping:yes|no] [excludecaname:yes|no] [catype:root|intermediate (default=root)] [certhash:<Hex hash string, with no spaces or leading 0x>] [followrenewal:yes|no (default=no)] [certeku:<EKU, EKU, ...>] [certname:<CertName>] [certnametype:<SubjectAltDNS| SubjectAltEmail|SubjectCN|SubjectOU|SubjectO|SubjectDC>] [certcriteriatype:<Selection|Validation|Both (default=both)>] |..."] [auth1healthcert=yes|no (default=no)] [auth1ecdsap256ca="<CA Name> [certmapping:yes|no] [excludecaname:yes|no] [catype:root|intermediate (default=root)] [certhash:<Hex hash string, with no spaces or leading 0x>] [followrenewal:yes|no (default=no)] [certeku:<EKU, EKU, ...>] [certname:<CertName>] [certnametype:<SubjectAltDNS| SubjectAltEmail|SubjectCN|SubjectOU|SubjectO|SubjectDC>] [certcriteriatype:<Selection|Validation|Both (default=both)>] | ..."] [auth1ecdsap256healthcert=yes|no (default=no)] [auth1ecdsap384ca="<CA Name> [certmapping:yes|no] [excludecaname:yes|no] [catype:root|intermediate (default=root)] [certhash:<Hex hash string, with no spaces or leading 0x>] [followrenewal:yes|no (default=no)] [certeku:<EKU, EKU, ...>] [certname:<CertName>] [certnametype:<SubjectAltDNS| SubjectAltEmail|SubjectCN|SubjectOU|SubjectO|SubjectDC>] [certcriteriatype:<Selection|Validation|Both (default=both)>] | ..."] [auth1ecdsap384healthcert=yes|no (default=no)] [auth2=computercert|computercertecdsap256|computercertecdsap384| userkerb|usercert|usercertecdsap256|usercertecdsap384|userntlm| anonymous[,...]] [auth2kerbproxyfqdn=<fully-qualified dns name>] [auth2ca="<CA Name> [certmapping:yes|no] [catype:root|intermediate (default=root)] [certhash:<Hex hash string, with no spaces or leading 0x>] [followrenewal:yes|no (default=no)] [certeku:<EKU, EKU, ...>] [certname:<CertName>] [certnametype:<SubjectAltDNS| SubjectAltEmail|SubjectCN|SubjectOU|SubjectO|SubjectDC>] [certcriteriatype:<Selection|Validation|Both (default=both)>] | ..."]' Yl: - ĉR Ty^/UNN N:N "all"0 - S_ mode=tunnel e _{c[S~~p d\O:N noauthentication edY0 S_eQyr[ IP 0W@We ُN0W@W_{/fv Tv IP Hr,g0 dkY S_MnR`Se: SN\S~~pn:N any0 N:N [7bzV{euc[,g0WS~~p(sS any)0 N:NQsQV{euc[܏ zS~~p(sS any)0 dkY d\O_{:N requireinrequireout0requireinclearout b noauthentication0 - S_ mode=Transport e requireinclearout eHe0 - _{\c[N*NN0 - Auth1 T auth2 SN/f(uSRv yRh0 - NSN:N auth1 Tec[ Computerpsk T computerntlm el0 - NSN\ Computercert N auth2 v(u7bQncNwc[0 - N(W Windows Vista SP1 SfؚHr,g N /ec Certsigning y ecdsap256 T ecdsap3840 - Qmsecmethods SN/f1u "," Rv^Rh0 - [N qmsecmethods integrity=md5|sha1|sha256|aesgmac128|aesgmac192| aesgmac256|aesgcm128|aesgcm192|aesgcm256 T encryption=3des|des|aes128|aes192|aes256|aesgcm128|aesgcm192|aesgcm256 - Ygc[ aesgcm1280aesgcm192 b aesgcm256 R[_{ (uN ESP [te'`TR[0 - N(W Windows Vista SP1 SfؚHr,g N/ec Aesgmac1280aesgmac1920 aesgmac2560aesgcm1280aesgcm1920aesgcm2560sha2560 - Qmpfs=mainmode O(u PFS v;N!j_[Nbcn0 - N^O(u DES0MD5 T DHGroup10cOُNR[{lN(uNT N|Q[0 - certmapping T excludecaname v؞ | name=<string> [type=dynamic|static] [profile=public|private|domain|any[,...] (default=any)] [endpoint1=any|localsubnet|dns|dhcp|wins|defaultgateway| <IPv4 address>|<IPv6 address>|<subnet>|<range>|<list>] [endpoint2=any|localsubnet|dns|dhcp|wins|defaultgateway| <IPv4 address>|<IPv6 address>|<subnet>|<range>|<list>] [port1=0-65535|<port range>[,...]|any] [port2=0-65535|<port range>[,...]|any] [protocol=0-255|tcp|udp|icmpv4|icmpv6|any] new [name=<string>] [profile=public|private|domain|any[,...]] [description=<string>] [mode=transport|tunnel] [endpoint1=any|localsubnet|dns|dhcp|wins|defaultgateway| <IPv4 address>|<IPv6 address>|<subnet>|<range>|<list>] [endpoint2=any|localsubnet|dns|dhcp|wins|defaultgateway| <IPv4 address>|<IPv6 address>|<subnet>|<range>|<list>] [action=requireinrequestout|requestinrequestout| requireinrequireout|requireinclearout|noauthentication] [enable=yes|no] [type=dynamic|static] [localtunnelendpoint=any|<IPv4 address>|<IPv6 address>] [remotetunnelendpoint=any|<IPv4 address>|<IPv6 address>] [port1=0-65535|<port range>[,...]|any] [port2=0-65535|<port range>[,...]|any] [protocol=0-255|tcp|udp|icmpv4|icmpv6|any] [interfacetype=wiresless|lan|ras|any] [auth1=computerkerb|computercert|computercertecdsap256| computercertecdsap384|computerpsk|computerntlm|anonymous[,...]] [auth1psk=<string>] [auth1kerbproxyfqdn=<fully-qualified dns name>] [auth1ca="<CA Name> [certmapping:yes|no] [excludecaname:yes|no] [catype:root|intermediate (default=root)] [certhash:<Hex hash string, with no spaces or leading 0x>] [followrenewal:yes|no (default=no)] [certeku:<EKU, EKU, ...>] [certname:<CertName>] [certnametype:<SubjectAltDNS| SubjectAltEmail|SubjectCN|SubjectOU|SubjectO|SubjectDC>] [certcriteriatype:<Selection|Validation|Both (default=both)>] | ..."] [auth1healthcert=yes|no] [auth1ecdsap256ca="<CA Name> [certmapping:yes|no] [excludecaname:yes|no] [catype:root|intermediate (default=root)] [certhash:<Hex hash string, with no spaces or leading 0x>] [followrenewal:yes|no (default=no)] [certeku:<EKU, EKU, ...>] [certname:<CertName>] [certnametype:<SubjectAltDNS| SubjectAltEmail|SubjectCN|SubjectOU|SubjectO|SubjectDC>] [certcriteriatype:<Selection|Validation|Both (default=both)>] | ..."] [auth1ecdsap256healthcert=yes|no (default=no)] [auth1ecdsap384ca="<CA Name> [certmapping:yes|no] [excludecaname:yes|no] [catype:root|intermediate (default=root)] [certhash:<Hex hash string, with no spaces or leading 0x>] [followrenewal:yes|no (default=no)] [certeku:<EKU, EKU, ...>] [certname:<CertName>] [certnametype:<SubjectAltDNS| SubjectAltEmail|SubjectCN|SubjectOU|SubjectO|SubjectDC>] [certcriteriatype:<Selection|Validation|Both (default=both)>] | ..."]J Yl: - :N]hƋvĉRnevSpef:y;N!j_ SA / (ul: show mmsa [(source destination)|all] Yl: - }TN>f:y[hQsQTb (source destination)[[{ v[hQsQT0 - nTvh/fN*N IPv4 b IPv6 0W@W0 :yO: >f:y@b g;N!j_ SA: netsh advfirewall monitor show mmsa >f:y$N*N0W@WKNv;N!j_ SA: netsh advfirewall monitor show mmsa 192.168.0.3 192.168.0.4PA >f:y_!j_ SA0 0 (ul: show qmsa [(source destination)|all] Yl: - }TN>f:y[hQsQTb (source destination)[[{ v[hQsQT0 - nTvh/fN*N IPv4 b IPv6 0W@W0 :yO: >f:y@b g_!j_ SA: netsh advfirewall monitor show qmsa >f:y$N*N0W@WKNv_!j_ SA: netsh advfirewall monitor show qmsa 192.168.0.3 192.168.0.4 mRev;N!j_ĉR0 :Ns gĉRv^\'`ne|all [profile=any|current|public|private|domain[,...]] [type=dynamic|static (default=static)] Yl: - RdNc[v Ty9SMv s g;N!j_n0SN bc[MneN0 YgwQ gc[ Tyvn NX[(W R}TN1Y%0 - Ygc[ name=all RNc[{|WTMneN-N Rd@b gĉR0 Yg*gc[MneN R[@b gMneN^(u Rd0 :yO: Rd Ty:N test v;N!j_ĉR: Netsh advfirewall mainmode delete rule name="test" >f:yc[v;N!j_ĉR0 k (ul: show rule name=<string>|all [profile=all|current|public|private|domain[,...]] [type=dynamic|static (default=static)] [verbose] Yl: - >f:yNc[ Ty9SMvs g;N!j_n0 >f:y1u Tyc[v@b g9SMvĉR SN bc[ MneN0 Yg Ty-Nc[N all R\>f:yc[MneN v@b g;N!j_n0 :yO: >f:y T:N test v;N!j_ĉR: Netsh advfirewall mainmode show rule name="test" >f:yS_MR2kpXr`Oo`0  (ul: show firewall [rule name=<string> [dir=in|out] [profile=public|private|domain|active|any[,...]] ] [verbose] Yl: - >f:y@b gS(uvQ~MneNv Windows 2kpX^\'`0 - profile= SpeO{tXTY\Q[{ 0R|~ Nv yr[MneN0 - Verbose SpemR[>f:y~[hQTؚ~ ĉR n Ty Oo`v/ec0 :yO: >f:yS_MR2kpXr`: netsh advfirewall monitor show firewall >f:ylQ(uMneNvS_MRQz2kpXĉR: netsh advfirewall monitor show firewall rule name=all dir=out profile=public>f:yS_MR consec r`Oo`0  (ul: show consec [rule name=<string> [profile=public|private|domain|active|any[,...]] ] [verbose] Yl: - >f:y@b gS(uQ~MneNvޏc[hQMn - [profile=] }TNO{tXTY\Q[{ 0R |~ Nvyr[MneNbNԏV;mRb ^;mRMneNv~g - [rule] }TNAQ{tXT\ĉRQVP6RNgNĉR TyTr`NP6RQvV - Verbose }TNmR[>f:y~[hQT ؚ~ĉR n Ty Oo` :yO: >f:yS_MRޏc[hQr`: netsh advfirewall monitor show consec >f:ylQ(uMneNvS_MRޏc[hQOo`: netsh advfirewall monitor show consec rule name=all profile=public >f:yS_MR;mRvMneN0 (ul: show currentprofile Yl: - }TN>f:yNS_MR;mRvMneNsQTvQ~ޏc0 :yO: >f:yNS_MR;mRvMneNsQTv@b gQ~: netsh advfirewall monitor show currentprofile >f:yS_MR;N!j_r`Oo`0  (ul: >f:y;N!j_ [rule name=<string> [profile=public|private|domain|active|any[,...]] ] [verbose] Yl: - >f:y@b gS(uQ~MneNv;N!j_[hQMn - [profile=] }TNO{tXTY\Q[{ 0R|~ Nvyr[MneN bNԏV;mRb^;mRMneNv~g - [rule] }TNAQ{tXT\ĉRQVP6RNgNĉR TyTr` NP6RQvV - Verbose }TNmR[>f:y~[hQTؚ~ĉR n Ty Oo`v/ec :yO: >f:ylQ(uMneNvS_MR;N!j_Oo`: netsh advfirewall monitor show mainmode rule name=all profile=public  [auth2ecdsap256ca="<CA Name> [certmapping:yes|no] [catype:root|intermediate (default=root)] [certhash:<Hex hash string, with no spaces or leading 0x>] [followrenewal:yes|no (default=no)] [certeku:<EKU, EKU, ...>] [certname:<CertName>] [certnametype:<SubjectAltDNS| SubjectAltEmail|SubjectCN|SubjectOU|SubjectO|SubjectDC>] [certcriteriatype:<Selection|Validation|Both (default=both)>] | ..."] [auth2ecdsap384ca="<CA Name> [certmapping:yes|no] [catype:root|intermediate (default=root)] [certhash:<Hex hash string, with no spaces or leading 0x>] [followrenewal:yes|no (default=no)] [certeku:<EKU, EKU, ...>] [certname:<CertName>] [certnametype:<SubjectAltDNS| SubjectAltEmail|SubjectCN|SubjectOU|SubjectO|SubjectDC>] [certcriteriatype:<Selection|Validation|Both (default=both)>] | ..."] [qmpfs=dhgroup1|dhgroup2|dhgroup14|dhgroup24|ecdhp256|ecdhp384| mainmode|none (default=none)] [qmsecmethods=authnoencap:<integrity>+[valuemin]+[valuekb]| ah:<integrity>+esp:<integrity>-<encryption>+[valuemin]+[valuekb] |default] [exemptipsecprotectedconnections=yes|no (default=no)] [applyauthz=yes|no (default=no)] - Certcriteriatype c[S_ b,g0WfN0[I{fNb$NgbL e/f&T[fNǑSd\O0 - (W computercert N f\Q SNǏ(u "|" W[&{Rk*N agveg_(uY*NfN0 [auth1ecdsap384healthcert=yes|no (default=no)] [auth2=computercert|computercertecdsap256|computercertecdsap384| userkerb|usercert|usercertecdsap256|usercertecdsap384|userntlm| anonymous[,...]] [auth2kerbproxyfqdn=<fully-qualified dns name>] [auth2ca="<CA Name> [certmapping:yes|no] [catype:root|intermediate (default=root)] [certhash:<Hex hash string, with no spaces or leading 0x>] [followrenewal:yes|no (default=no)] [certeku:<EKU, EKU, ...>] [certname:<CertName>] [certnametype:<SubjectAltDNS| SubjectAltEmail|SubjectCN|SubjectOU|SubjectO|SubjectDC>] [certcriteriatype:<Selection|Validation|Both (default=both)>] | ..."] [auth2ecdsap256ca="<CA Name> [certmapping:yes|no] [catype:root|intermediate (default=root)] [certhash:<Hex hash string, with no spaces or leading 0x>] [followrenewal:yes|no (default=no)] [certeku:<EKU, EKU, ...>] [certname:<CertName>] [certnametype:<SubjectAltDNS| SubjectAltEmail|SubjectCN|SubjectOU|SubjectO|SubjectDC>] [certcriteriatype:<Selection|Validation|Both (default=both)>] | ..."] [auth2ecdsap384ca="<CA Name> [certmapping:yes|no] [catype:root|intermediate (default=root)] [certhash:<Hex hash string, with no spaces or leading 0x>] [followrenewal:yes|no (default=no)] [certeku:<EKU, EKU, ...>] [certname:<CertName>] [certnametype:<SubjectAltDNS| SubjectAltEmail|SubjectCN|SubjectOU|SubjectO|SubjectDC>] [certcriteriatype:<Selection|Validation|Both (default=both)>] | ..."] [qmpfs=dhgroup1|dhgroup2|dhgroup14|dhgroup24|ecdhp256|ecdhp384| mainmode|none] [qmsecmethods=authnoencap:<integrity>+[valuemin]+[valuekb]| ah:<integrity>+esp:<integrity>-<encryption>+[valuemin]+[valuekb] |default] [exemptipsecprotectedconnections=yes|no (default=no)] [applyauthz=yes|no (default=no)]D - Certcriteriatype c[S_ b,g0WfN0[I{fNb$NgbL e/f&T[fNǑSd\O0 Yl: - T2kpXV{eu-NmRev;N!j_ĉR0 - ĉR Ty^/UNN N:N "all"0 - el:N auth1 Tec[ Computerpsk T computerntlm el0 - N^O(u DES0MD5 T DHGroup10 cOُNR[{lS/f:NNTT|Q[0 - g\;N!j_ keylifetime :N mmkeylifetime=1min0 g'Y;N!j_ mmkeylifetime= 2880min0 O݋vg\peϑ = 0 *NO݋0 g'Ypeϑ = 2,147,483,647 *NO݋0 - mmsecmethods sQ.W[؞ mmsecmethods=dhgroup1|dhgroup2|dhgroup14|dhgroup24|ecdhp256| ecdhp384:3des|des|aes128|aes192|aes256-md5|sha1|sha256 |sha384[,...]|default [mmforcedh=yes|no (default=no)] [mmkeylifetime=<num>min,<num>sess] [description=<string>] [enable=yes|no (default=yes)] [profile=any|current|public|private|domain[,...]] [endpoint1=any|<IPv4 address>|<IPv6 address>|<subnet> |<range>|<list>] [endpoint2=any|localsubnet|dns|dhcp|wins|defaultgateway| <IPv4 address>|<IPv6 address>|<subnet>|<range>|<list>] [auth1=computerkerb|computercert|computercertecdsap256| computercertecdsap384|computerpsk|computerntlm|anonymous[,...]] [auth1psk=<string>] [auth1kerbproxyfqdn=<fully-qualified dns name>] [auth1ca="<CA Name> [certmapping:yes|no] [excludecaname:yes|no] [catype:root|intermediate (default=root)] [certhash:<Hex hash string, with no spaces or leading 0x>] [followrenewal:yes|no (default=no)] [certeku:<EKU, EKU, ...>] [certname:<CertName>] [certnametype:<SubjectAltDNS| SubjectAltEmail|SubjectCN|SubjectOU|SubjectO|SubjectDC>] [certcriteriatype:<Selection|Validation|Both (default=both)>] | ..."] [auth1healthcert=yes|no (default=no)] [auth1ecdsap256ca="<CA Name> [certmapping:yes|no] [excludecaname:yes|no] [catype:root|intermediate (default=root)] [certhash:<Hex hash string, with no spaces or leading 0x>] [followrenewal:yes|no (default=no)] [certeku:<EKU, EKU, ...>] [certname:<CertName>] [certnametype:<SubjectAltDNS| SubjectAltEmail|SubjectCN|SubjectOU|SubjectO|SubjectDC>] [certcriteriatype:<Selection|Validation|Both (default=both)>] | ..."] [auth1ecdsap256healthcert=yes|no (default=no)] [auth1ecdsap384ca="<CA Name> [certmapping:yes|no] [excludecaname:yes|no] [catype:root|intermediate (default=root)] [certhash:<Hex hash string, with no spaces or leading 0x>] [followrenewal:yes|no (default=no)] [certeku:<EKU, EKU, ...>] [certname:<CertName>] [certnametype:<SubjectAltDNS| SubjectAltEmail|SubjectCN|SubjectOU|SubjectO|SubjectDC>] [certcriteriatype:<Selection|Validation|Both (default=both)>] | ..."] [auth1ecdsap384healthcert=yes|no (default=no)] [type=dynamic|static (default=static)] (ul: set rule name=<String> [profile=public|private|domain|any[,...]] [type=dynamic|static (default=static)] new [name=<string>] [mmsecmethods= dhgroup1|dhgroup2|dhgroup14|dhgroup24|ecdhp256| ecdhp384:3des|des|aes128|aes192|aes256-md5|sha1|sha256| sha384[,...]|default] [mmforcedh=yes|no (default=no)] [mmkeylifetime=<num>min,<num>sess] [description=<string>] [enable=yes|no] [profile=public|private|domain|any[,...]] [endpoint1=any|localsubnet|dns|dhcp|wins|defaultgateway <IPv4 address>|<IPv6 address>|<subnet>|<range>|<list>] [endpoint2=any|localsubnet|dns|dhcp|wins|defaultgateway| <IPv4 address>|<IPv6 address>|<subnet>|<range>|<list>] [auth1=computerkerb|computercert|computercertecdsap256| computercertecdsap384|computerpsk|computerntlm|anonymous[,...]] [auth1psk=<string>] [auth1kerbproxyfqdn=<fully-qualified dns name>] [auth1ca="<CA Name> [certmapping:yes|no] [excludecaname:yes|no] [catype:root|intermediate (default=root)] [certhash:<Hex hash string, with no spaces or leading 0x>] [followrenewal:yes|no (default=no)] [certeku:<EKU, EKU, ...>] [certname:<CertName>] [certnametype:<SubjectAltDNS| SubjectAltEmail|SubjectCN|SubjectOU|SubjectO|SubjectDC>] [certcriteriatype:<Selection|Validation|Both (default=both)>] | ..."] [auth1healthcert=yes|no (default=no)] [auth1ecdsap256ca="<CA Name> [certmapping:yes|no] [excludecaname:yes|no] [catype:root|intermediate (default=root)] [certhash:<Hex hash string, with no spaces or leading 0x>] [followrenewal:yes|no (default=no)] [certeku:<EKU, EKU, ...>] [certname:<CertName>] [certnametype:<SubjectAltDNS| SubjectAltEmail|SubjectCN|SubjectOU|SubjectO|SubjectDC>] [certcriteriatype:<Selection|Validation|Both (default=both)>] | ..."] [auth1ecdsap256healthcert=yes|no (default=no)] [auth1ecdsap384ca="<CA Name> [certmapping:yes|no] [excludecaname:yes|no] [catype:root|intermediate (default=root)] [certhash:<Hex hash string, with no spaces or leading 0x>] [followrenewal:yes|no (default=no)] [certeku:<EKU, EKU, ...>] [certname:<CertName>] [certnametype:<SubjectAltDNS| SubjectAltEmail|SubjectCN|SubjectOU|SubjectO|SubjectDC>] [certcriteriatype:<Selection|Validation|Both (default=both)>] | ..."] [auth1ecdsap384healthcert=yes|no (default=no)] [profile= any|current|domain|private|public[,...]]PA/ c[܏ z{:ge X[P N/f~V{eu[a0\X[Pn:N ,g0W b\{:gn:N,g0W{:g0 ! Su NSb` Yv Windows 2kpX(0x%1!x!)0  \Ջh"} Windows 2kpXneSu0 . \ՋT| Windows 2kpX gReSu0nxO gRck(WЏL 6qT͑Ջ`OvBl0  W[&{2N "all" N(u\OĉRv Ty0 ( Su NSb` Yv netsh advfirewall (0x%1!x!)0  l gNc[hQv9SMvĉR0 ~b N0Rc[vR[Ɩ0 k "CurrentProfile" el(uNMn~V{eu[a(GPO)X[P0O(u "DomainProfile"0"PrivateProfile"0"PublicProfile" b "AllProfiles"0  NS_Mn~V{eu[a(GPO)X[PeSNf9e勾n0  NS_Mn,g0WX[PeSNf9e勾n0  NS_OS/f TCP b UDP eSNc[zS0  Mn~V{eu[a(GPO)X[Pe elO(uR`ĉR{|W0  c[ auth1 ye auth1 Spe0  c[ auth2 ye auth2 Spe0  ~b N0Rc[vNƖ0  c[v auth1 Ɩ:\_vSpe0  c[v auth2 Ɩ:\_vSpe0 4 el[QV{eu ԏV 0x%1!x!0nxOcOveN Tcknxv^NeNSN0\*g͑n2kpXV{eu0  Mn~V{eu[a(GPO)X[Pe elO(uvƉhV N Ne0 / c[v~~pl gv Tv IP Hr,g0c[$N*N IPv4 ~~pb$N*N IPv6 ~~p0  l gNc[hQv9SMv SA0 & el[QV{eu( 0x%1!x!)0nxO勇eN Tcknxv^NeNSN0 = el[eQV{eu( 0x%1!x!)0nxO勇eN Tcknxv^NeNSN Te/f gHev Windows 2kpXV{eueN0 D \Ջޏc0R܏ z{:geSu0nxO܏ z{:g Nv Windows 2kpX gRck(WЏL v^]Mn:NAQ܏ z{t 6qT͑Ջ`OvBl0 : \ՋMnc[v~V{eu[a(GPO)X[PeSu0nxO GPO /f gHevv^N/fSNv 6qT͑Ջ`OvBl0  gbLeSuN(0x%1!x!)0  cOvYSpeeHe0g w.^RScknxl0  c[v IP 0W@Wb0W@WsQ.W[eHe0 c[vzS