<br>
<b>Warning</b>:  Undefined array key "HTTP_REFERER" in <b>/home/webhostingchenna/domains/webhostingchennai.co.in/public_html/blog/wp-content/plugins/wp-linkbuilder/plugin/plugin_class.inc.php</b> on line <b>637</b><br>
{"id":1679,"date":"2021-10-25T16:52:49","date_gmt":"2021-10-25T11:22:49","guid":{"rendered":"https:\/\/www.webhostingchennai.co.in\/blog\/?p=1679"},"modified":"2021-10-25T16:52:49","modified_gmt":"2021-10-25T11:22:49","slug":"10-simple-steps-to-blocking-ip","status":"publish","type":"post","link":"https:\/\/www.webhostingchennai.co.in\/blog\/10-simple-steps-to-blocking-ip\/","title":{"rendered":"10 Simple Steps to Blocking IP Addresses Using Windows Firewall"},"content":{"rendered":"<h4 data-aura-rendered-by="">10 Simple Steps to Blocking IP Addresses Using Windows Firewall<\/h4>\n<p data-aura-rendered-by="">Windows server has a firewall which also help us to prevent malicious attacks. This firewall looks at anything attempting to access your server and compares it to a set of rules. If it breaks the rules, your firewall doesn&#8217;t let the traffic through.<\/p>\n</p><p data-aura-rendered-by="">This firewall can also block certain IP addresses from connecting to your server. On a Windows server, we do this by logging into your server via RDP and creating a new <a href="">firewall<\/a> rule listing the IP addresses you want to block.<\/p>\n<p>If you are using Windows and have not installed a &#8220;complete&#8221; security suite for the operating system, you are likely using Windows Firewall to protect the operating system.<\/p>\n</p><p>While there are standalone firewall applications as well, or hardware firewalls, it is likely that most users make use of the built-in firewall of the operating system.<\/p>\n</p><p>Configuration of the firewall is not as straightforward as it can be, considering that you first need to find out how to open it, and then work your way through the menus that it makes available.<\/p>\n</p><p data-aura-rendered-by=""><strong>STEP 1 :<\/strong> Login to your server&#8217;s RDP.<\/p>\n<p data-aura-rendered-by=""><strong>STEP 2 :\u00a0<\/strong>Click Start &gt;&gt; Windows Administrative Tools &gt;&gt; Windows Firewall with Advanced Security.<\/p>\n<p data-aura-rendered-by=""><img data-recalc-dims=""><\/p>\n</p><p data-aura-rendered-by=""><strong>STEP 3 :<\/strong> Click <strong>Inbound Rules<\/strong><\/p>\n<p data-aura-rendered-by=""><img data-recalc-dims=""><\/p>\n</p><p data-aura-rendered-by=""><strong>STEP 4 :<\/strong> <span class="">Click on <strong>New Rule<\/strong>. This opens the New Inbound Rule Wizard, which will guide you through adding your new firewall rule.<\/span><\/p>\n<p data-aura-rendered-by=""><img data-recalc-dims=""><\/p>\n</p><p data-aura-rendered-by=""><strong>STEP 5 :<\/strong> <span class="">To begin creating an IP block rule, select the radio button next to <strong>Custom<\/strong>. Then press <strong>Next<\/strong>.<\/span><\/p>\n<p data-aura-rendered-by=""><img data-recalc-dims=""><\/p>\n</p><p data-aura-rendered-by=""><strong>STEP 6 :<\/strong> <span class="">Now, make sure the radio button for <strong>All programs<\/strong>\u00a0is selected and click <strong>Next<\/strong>.<\/span><\/p>\n<p data-aura-rendered-by=""><img data-recalc-dims=""><\/p>\n</p><p data-aura-rendered-by=""><strong>STEP 7 :<\/strong> <span class="">The next screen asks you which ports and protocols your rule will apply to. Generally, with an IP block, you will leave this screen as it is, with the <strong>Protocol type<\/strong> set to <strong>Any<\/strong>. Click <strong>Next<\/strong>.<\/span><\/p>\n<p data-aura-rendered-by=""><img data-recalc-dims=""><\/p>\n</p><p data-aura-rendered-by=""><strong>STEP 8 :<\/strong> <span class="">Now you can block the IP addresses. Look for the section with the header <strong>Which remote IP addresses does this rule apply to?<\/strong> Select the radio button next to <strong>These IP addresses<\/strong>.<\/span><\/p>\n<p data-aura-rendered-by=""><img data-recalc-dims=""><\/p>\n</p><p data-aura-rendered-by=""><strong>STEP 9 :<\/strong> <span class="">Click <strong>Add<\/strong>. Type in the IP address you want to block and click <strong>OK<\/strong>. Repeat this for any IP addresses you want to block. You can also block IP address ranges. Once you&#8217;ve added all the IPs you want to block, click <strong>Next<\/strong>.<\/span><\/p>\n<p data-aura-rendered-by=""><img data-recalc-dims=""><\/p>\n</p><p data-aura-rendered-by=""><strong>STEP 10 :<\/strong> <span class="">Select the radio button next to <strong>Block the connection<\/strong> and click <strong>Next<\/strong>.<\/span><\/p>\n<p data-aura-rendered-by=""><img data-recalc-dims=""><\/p>\n</p><p data-aura-rendered-by=""><span class="">For most IP blocks, you&#8217;ll want to make sure all three boxes are checked: <strong>Domain<\/strong>, <strong>Private<\/strong>, and <strong>Public<\/strong>.<\/span><\/p>\n<p data-aura-rendered-by=""><img data-recalc-dims=""><\/p>\n</p><p data-aura-rendered-by=""><span class=""><strong>STEP 11 :<\/strong> Name your rule. You can keep adding IP addresses to this rule, so make sure you name it something memorable! Then click <strong>Finish<\/strong>.<br>\n<\/span><\/p>\n<p data-aura-rendered-by=""><img data-recalc-dims=""><\/p>\n</p><p data-aura-rendered-by=""><span class="">Now we have successfully added a rule in Windows Firewall to block any IPs you don&#8217;t want accessing your server! If you ever need to add more IPs to this rule, double click on the rule to open the rule properties and click <strong>Scope<\/strong>. Then add new IP addresses just like you added them before.<\/span><\/p>\n<p><strong>Edit or Remove the rule<\/strong><\/p>\n<p>You can edit or remove the rule at any time. To edit it, double-click on it in the firewall controls and use the tabs to make modifications to the rule set.<\/p>\n</p><p>To delete it, simply select it and hit the delete key on your keyboard afterwards. All you need to do then is confirm the prompt and the rule gets removed from the system again.<\/p>\n</p><p>Kindly post your valuable comments to improve us, to know about Basics of Linux cat command : <a href="">Click Here<\/a><\/p>\n<p data-aura-rendered-by="">\n","protected":false},"excerpt":{"rendered":"</p><p>&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":1698,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[10],"tags":[262,260,261],"class_list":["post-1679","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-windows","tag-blocking-ip-address-in-windows-firewall","tag-blocking-ips-in-windows","tag-ip-blocking-in-windows-firewall"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2021\/10\/windows-firewall.jpg?fit=640%2C260&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9NOHH-r5","jetpack-related-posts":[{"id":2070,"url":"https:\/\/www.webhostingchennai.co.in\/blog\/protect-cpanel-server-from-ddos-attacks\/","url_meta":{"origin":1679,"position":0},"title":"How Firewalls Protect Your cPanel Server from DDoS Attacks","author":"Cavin","date":"October 24, 2024","format":false,"excerpt":"DDoS Attack - Distributed Denial of Service (DDoS) attacks are one of the most common and disruptive forms of cyberattacks that can target any server connected to the internet. They involve overwhelming a server with an enormous amount of traffic, effectively making it unavailable to legitimate users. In a cPanel\u2026","rel":"","context":"In &quot;VPS&quot;","block_context":{"text":"VPS","link":"https:\/\/www.webhostingchennai.co.in\/blog\/category\/vps\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2024\/10\/firewalls-protect-your-cpanel-server-hero.jpg?fit=991%2C515&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2024\/10\/firewalls-protect-your-cpanel-server-hero.jpg?fit=991%2C515&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2024\/10\/firewalls-protect-your-cpanel-server-hero.jpg?fit=991%2C515&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2024\/10\/firewalls-protect-your-cpanel-server-hero.jpg?fit=991%2C515&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":2073,"url":"https:\/\/www.webhostingchennai.co.in\/blog\/managing-ip-whitelisting-and-blacklisting-in-cpanel\/","url_meta":{"origin":1679,"position":1},"title":"Best Practices for Managing IP Whitelisting and Blacklisting in cPanel","author":"Cavin","date":"October 25, 2024","format":false,"excerpt":"Managing IP - In today\u2019s digital landscape, where servers face constant threats from malicious actors, managing IP whitelisting and blacklisting has become a vital part of server security. cPanel, a popular control panel for web hosting, provides powerful tools for server administrators to control which IP addresses can access their\u2026","rel":"","context":"In &quot;VPS&quot;","block_context":{"text":"VPS","link":"https:\/\/www.webhostingchennai.co.in\/blog\/category\/vps\/"},"img":{"alt_text":"Managing IP","src":"https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2024\/10\/DS.jpg?fit=907%2C465&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2024\/10\/DS.jpg?fit=907%2C465&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2024\/10\/DS.jpg?fit=907%2C465&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2024\/10\/DS.jpg?fit=907%2C465&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":2017,"url":"https:\/\/www.webhostingchennai.co.in\/blog\/how-to-change-rdp-port\/","url_meta":{"origin":1679,"position":2},"title":"How to Change RDP Port Number for a Windows Server?","author":"Cavin","date":"September 8, 2024","format":false,"excerpt":"Change RDP Port \u2013 The Remote Desktop Protocol (RDP) enables remote access to Windows computers and servers. By default, RDP uses a listening port on port 3389, a well-known port that can be a target for malicious attacks. Changing the RDP default port can enhance your system\u2019s security by making\u2026","rel":"","context":"In &quot;VPS&quot;","block_context":{"text":"VPS","link":"https:\/\/www.webhostingchennai.co.in\/blog\/category\/vps\/"},"img":{"alt_text":"Change RDP Port","src":"https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2024\/09\/rdy.jpg?fit=1042%2C511&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2024\/09\/rdy.jpg?fit=1042%2C511&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2024\/09\/rdy.jpg?fit=1042%2C511&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2024\/09\/rdy.jpg?fit=1042%2C511&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":1004,"url":"https:\/\/www.webhostingchennai.co.in\/blog\/firewall-setup-on-dedicated-linux-server\/","url_meta":{"origin":1679,"position":3},"title":"Basic Firewall Setup on Dedicated Linux Server","author":"Cavin","date":"August 3, 2018","format":false,"excerpt":"Basic Firewall Setup on Dedicated Linux Server A firewall will stop any unusual activities on one network from being passed on to another network. In most systems the Linux kernel is compiled with IP forwarding set to yes. This means is that if the computer has more than one network\u2026","rel":"","context":"In &quot;LINUX&quot;","block_context":{"text":"LINUX","link":"https:\/\/www.webhostingchennai.co.in\/blog\/category\/linux\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2018\/08\/firewall-setup.jpg?fit=630%2C316&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2018\/08\/firewall-setup.jpg?fit=630%2C316&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2018\/08\/firewall-setup.jpg?fit=630%2C316&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":866,"url":"https:\/\/www.webhostingchennai.co.in\/blog\/simple-steps-to-change-rdp-port\/","url_meta":{"origin":1679,"position":4},"title":"Simple steps to change RDP port on a Windows Server","author":"Cavin","date":"June 15, 2018","format":false,"excerpt":"Simple steps to change RDP port on a Windows Server Windows servers are remotely accessible with Remote Desktop via the TCP 3389 port (default port). In some situations, when a more secure environment is needed, changing the remote access port can be useful. This article explains how to change the\u2026","rel":"","context":"In &quot;WINDOWS&quot;","block_context":{"text":"WINDOWS","link":"https:\/\/www.webhostingchennai.co.in\/blog\/category\/windows\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2018\/06\/RDP.jpg?fit=678%2C340&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2018\/06\/RDP.jpg?fit=678%2C340&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2018\/06\/RDP.jpg?fit=678%2C340&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":688,"url":"https:\/\/www.webhostingchennai.co.in\/blog\/installing-vnc-server-on-centos\/","url_meta":{"origin":1679,"position":5},"title":"How to install VNC server on Centos 7.3","author":"Cavin","date":"January 29, 2018","format":false,"excerpt":"Installing VNC server on Centos 7.3 VNC is used to connect and control desktop environment of the server from remote clients. VNC viewer is used on remote computer to connect the server . In this article, we are going to see how to install vnc server on centos 7.3. We\u2026","rel":"","context":"In &quot;VPS&quot;","block_context":{"text":"VPS","link":"https:\/\/www.webhostingchennai.co.in\/blog\/category\/vps\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2018\/01\/VNC.jpg?fit=640%2C260&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2018\/01\/VNC.jpg?fit=640%2C260&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.webhostingchennai.co.in\/blog\/wp-content\/uploads\/2018\/01\/VNC.jpg?fit=640%2C260&ssl=1&resize=525%2C300 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.webhostingchennai.co.in\/blog\/wp-json\/wp\/v2\/posts\/1679","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.webhostingchennai.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.webhostingchennai.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.webhostingchennai.co.in\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.webhostingchennai.co.in\/blog\/wp-json\/wp\/v2\/comments?post=1679"}],"version-history":[{"count":2,"href":"https:\/\/www.webhostingchennai.co.in\/blog\/wp-json\/wp\/v2\/posts\/1679\/revisions"}],"predecessor-version":[{"id":1692,"href":"https:\/\/www.webhostingchennai.co.in\/blog\/wp-json\/wp\/v2\/posts\/1679\/revisions\/1692"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.webhostingchennai.co.in\/blog\/wp-json\/wp\/v2\/media\/1698"}],"wp:attachment":[{"href":"https:\/\/www.webhostingchennai.co.in\/blog\/wp-json\/wp\/v2\/media?parent=1679"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.webhostingchennai.co.in\/blog\/wp-json\/wp\/v2\/categories?post=1679"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.webhostingchennai.co.in\/blog\/wp-json\/wp\/v2\/tags?post=1679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}</p></a></p></strong></p></strong></span></p></strong></strong></span></p></strong></strong></strong></span></p></strong></strong></span></strong></p></strong></strong></strong></span></strong></p></strong></strong></span></strong></p></strong></strong></strong></span></strong></p></strong></strong></span></strong></p></strong></strong></span></strong></p></strong></span></strong></p></strong></strong></p></strong></p></strong></p></a></p></h4>