Lets not forget the IPSec policies that can be used to drop packets
depending on IP/port/protocol. Its capabilities are very limited (no
rules for packet size, data content or fancy stuff like that) but at
least you can automate it using Netsh (as I did) to be able to blacklist
certain source IPs once they trigger some kind of detection.
On 2013/08/31 14:56, Mart-Jan Reeuwijk wrote:
lol, you cannot "configure" Windows networking to drop/select packets to
a already open port. All windows has is the Windows firewall, which is
crap at best, after all it had to be NSA approved...
And I agree, so far haven't found a firewall on windows platform that
did what I wanted it to do.
_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please
visit:
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds