Connection Security Rule Properties Page: Protocols and Ports Tab
Updated: January 20, 2009
Applies To: Windows 7, Windows Server 2008 R2
Use this tab of the Connection Security Rule Properties dialog box to specify which protocols and ports in a network packet match this connection security rule. Only network traffic that matches the criteria on both this tab and the endpoints on the Computers tab match the rule and are subject to its authentication requirements.
To get to this tab
In the Windows Firewall with Advanced Security MMC snap-in, click Connection Security Rules.
Right-click the rule that you want to modify, and then click Properties.
Click the Protocols and Ports tab.
Protocol type
Select the protocol whose network traffic will be protected by this connection security rule. If the protocol you want is not in the list, select Custom, and type the protocol number in Protocol number.
If you choose TCP or UDP in the list, then you can specify the TCP or UDP port numbers in Endpoint 1 port and Endpoint 2 port.
Protocol number
When you select a protocol type, the corresponding protocol identification number is automatically displayed in Protocol number and is read-only. If you select Custom for Protocol type, then type the protocol identification number in Protocol number.
Endpoint 1 port
This option is available only if the protocol is set to TCP or UDP. Use this option to specify the port number used by the computer that is part of Endpoint 1. If you select All ports, then all network traffic for the protocol you selected matches this connection security rule. If you select Specific Ports, then you can type the port numbers in the box under the list. Separate port numbers with commas.
Note
If this rule has Do not authenticate on the Authentication tab, then you can type port numbers in a range by separating the low and high values with a hyphen, as shown:
80, 445, 5000-5010
Endpoint 2 port
This option is available only if the protocol is set to TCP or UDP. Use this option to specify the port number used by the computer that is part of Endpoint 2. If you select All ports, then all network traffic for the protocol you selected matches this connection security rule. If you select Specific Ports, then you can type the port numbers in the box under the list. Separate port numbers with commas.
Note
If this rule has Do not authenticate on the Authentication tab, then you can type port numbers in a range by separating the low and high values with a hyphen, as shown:
80, 445, 5000-5010