11. In the IP Protocol Type , scroll down to TCP and click Next .
12. In IP Protocol Port , type 80 (for HTTP ) in the To This Post box and click Next .
13. In the IP Filter List window, note how an IP Filter has been added . Now if you want, you can add HTTPS (Any IP to Any IP, Protocol TCP, Destination Port 443) in the same manner as above.
14. Now that you have set up both filters, click OK .
15. Go back to Manage IP Filter Lists and Filter actions , re-evaluate the filters (you can add or remove filters later). Now we are going to add a new filter to define the internal network traffic (INTRANET). Next, click Add .
16. Set the appropriate name for the new filter - for example - Intranet , then proceed to configure the filter by clicking Add .
17. In the IP Traffic Source window, leave the My IP Address option checked and click Next .
18. In IP Traffic Destination , click the drop-down list and select the destination type. For example, if you only want to allow web traffic from a web server on the local network (such as SERVER200 ), then select A Specific DNS Name .
Then, in Host Name , type SERVER200 and click Next .
If you want to allow web traffic from a local network subnet, such as 192.168.0.0/24 , select A Specific IP Subnet , and type in the Network ID and Subnet Mask for the required subnet. Click Next .
19. Go back to the IP Filter list, add any other filters you want, and finally click OK .
20. Go back to Manage IP Filter Lists and Filter actions , evaluate your filters and if all is ok, click the Manage Filter Actions tab. Now we need to add a filter action to block certain traffic, so click Add .
21. In the Welcome screen, click Next .
22. In Filter Action Name type Block and click Next .
23. In Filter Action General Options , click Block and then click Next .
24. Go back to Manage IP Filter Lists and Filter actions , evaluate your filters, if all is ok, click the Close button. You can add Filters and Actions Filter anytime if you want.
The next step is to configure IPSec Policy and assign it.
See page 3
Configure IPSec Policy
1. In the MMC interface, right-click IP Security Policies on the Local Computer and select Create IP Security Policy
2. In the Welcome screen, click Next.
3. In the IP Security Policy Name , enter a descriptive name, such as " Block HTTP, HTTPS, allow Intranet ". Click Next .
4. In the Request for Secure Communication window, uncheck the Active the Default Response Rule check box. Click Next.
5. In the Completing IP Security Policy Wizard window, click Finish
6. Now we need to add IP Filters and other Filter Actions to the new IPSec Policy . In the new IPSec Policy window, click Add to add IP Filters and Filter Actions
7. In the welcome window, click Next.
8. In Tunnel Endpoint , make sure that the default settings are selected and click Next.
9. In the Network Type window, select All Network Connections and click Next.
10. In the IP Filter List window, select one of the pre-configured IP Filter, for example "HTTP, HTTPS" (configured in step 6 above the article). If for some reason, you did not properly configure the IP Filter beforehand, you can click Add and add it at this time. When done, click Next .
11. In the Filter Action window, select one of the previously configured Filter Actions, for example "Block" (configured in step 20 above). Next, if you haven't configured the right Filter Action before, you can click Add and add it now. When done, click Next
12. Back in the new IPSec Policy window, make sure that the new IP Filter is selected. Click Add to add additional IP Filters and Filter Actions just like you did above. In this example, we will add the "Intranet" IP Filter .
Follow steps 7 to 11.
13. Add "Intranet" IP Filter .
14. Configure it to use the Permit Filter Action .
15. Notice how the two IP Filters are added .
Note that you cannot change their order like in dedicated firewalls. However, this configuration works quite well.
The next stage is to assign the IPSec Policy.
Assign IPSec Policy
In the MMC interface, right-click on new IPSec Policy and select Assign.
When done, you can test the configuration by trying to surf to a blocked Windows and a website is not blocked.
Lock multiple computers
Locking multiple computers can be done in two ways:
Export and Import IPSec Policy
Configure IPSec Policy through GPO
Both of these methods are used to prevent some computers from using ICMP (for other IPSec Policies).