Skip to main content

How to Block an IP Address using IPSec


How to Block an IP Address using IPSec0

How to Block an IP Address using IPSec

This article will walk you through how to block an individual IP address from accessing your server, using an IPSec Security Policy.
For various reasons, you may find yourself wanting to block a specific IP address from accessing your server.
Simply following these instructions showing how to create an IPSec Security Policy specifying to block access to a specific IP address.

Click on the Start Menu and Click on Run.


Type "secpol.msc" and Click OK.


When the Local Security Settings console opens, Click on "IP Security Policies on Local Computer".


Right Click in the Right Window Pane and Click "Create IP Security Policy".


Click Next when the Wizard opens.


Here you can name your new IPSec Security Policy. In this example, we named it "Blocked IPs". When you are ready, Click Next.


Click Next


Click Next


Click Yes


Click Finish


Uncheck the "Use Add Wizard" checkbox, then Click "Add...".


Click the "Add..." button.


Uncheck the "Use Add Wizard" checkbox, then Click "Add...".


Click the dropdown menu for "Source address" and choose "A specific IP Address".


Here is where you enter what IP address you want to Block. In this example, we are going to block "129.12.74.220".

Click the dropdown menu for "Destination address" and choose "My IP Address", then Click OK.


Click OK


Select the newly created Filter, and click on the "Filter Action" tab.


Select the "SI - Deny" Rule and Click Apply.


Click OK, then Apply and OK again to get back to the main console window.

Right Click on the newly created IPSec Security Policy, and select "Assign".


If successfull, it should state that the policy is assigned. Your server is now blocking all requests to that specific IP address.

Comments

Anonymous said…
buy tramadol online buy tramadol online no rx - tramadol for dogs forum

Popular posts from this blog

Proxy list

* http://www.proxy4free.com * http://www.publicproxyservers.com * http://www.anonymitychecker.com * http://www.proxz.com * http://www.digitalcybersoft.com/ProxyList/ * http://www.checker.freeproxy.ru * http://tools.rosinstrument.com/proxy/ * http://www.samair.ru/proxy/ * http://www.multiproxy.org/anon_proxy.htm * http://www.atomintersoft.com/product...xy/proxy-list/ [/b]

Useful & Valuable Sites

For Urgent Blood Requirements call +91888704898 Learn online Udemy Coursera Khan Openculture W3Schools Buy online Flipkart Amazon Myntra shopclues freekaamaal Online App Ajio Craftvilla Mirraw Limeroad Voonik Travel Booking Railway Paytm Redbus goibibo Trivago Sales OLX Justdail Quikr carwale 2ndhandbazar Jobs Search Bank Jobs BJS Glassdoor LinkedIn Freelancer S/W Downloads Filehippo Softpedia Download.com SourceForge BrotherSoft Flight Booking Qatar Singapore Makeytrip goindgo Emirates Status Enquiry Passport Panind Aadhar voter PF Yoga Acupoints Acupuncture Prachina Yoga Ayurveda Learn Cloud AWS Azure IBM VMware Redhat Search Engines Google yahoo amazon dogpile aol
Top 10 Most Common Cyber Attacks Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks A denial-of-service attack overwhelms a system’s resources so that it cannot respond to service requests. A DDoS attack is also an attack on system’s resources, but it is launched from a large number of other host machines that are infected by malicious software controlled by the attacker. Unlike attacks that are designed to enable the attacker to gain or increase access, denial-of-service doesn’t provide direct benefits for attackers. For some of them, it’s enough to have the satisfaction of service denial. However, if the attacked resource belongs to a business competitor, then the benefit to the attacker may be real enough. Another purpose of a DoS attack can be to take a system offline so that a different kind of attack can be launched. One common example is session hijacking, which I’ll describe later. There are different types of DoS and DDoS attacks; the most common are ...