Usage: add rule name=dir=in|out action=allow|block|bypass [program= ] [service= |any] [description= ] [enable=yes|no (default=yes)] [profile=public|private|domain|any[,...]] [localip=any| | | | | ] [remoteip=any|localsubnet|dns|dhcp|wins|defaultgateway|
| | | | ] [localport=0-65535|
[,...]|RPC|RPC-EPMap|IPHTTPS|any (default=any)] [remoteport=0-65535| [,...]|any (default=any)] [protocol=0-255|icmpv4|icmpv6|icmpv4:type,code|icmpv6:type,code| tcp|udp|any (default=any)] [interfacetype=wireless|lan|ras|any] [rmtcomputergrp= ] [rmtusrgrp= ] [edge=yes|deferapp|deferuser|no (default=no)] [security=authenticate|authenc|authdynenc|authnoencap|notrequired (default=notrequired)] Remarks: - Add a new inbound or outbound rule to the firewall policy. - Rule name should be unique and cannot be "all". - If a remote computer or user group is specified, security must be authenticate, authenc, authdynenc, or authnoencap. - Setting security to authdynenc allows systems to dynamically negotiate the use of encryption for traffic that matches a given Windows Firewall rule. Encryption is negotiated based on existing connection security rule properties. This option enables the ability of a machine to accept the first TCP or UDP packet of an inbound IPsec connection as long as it is secured, but not encrypted, using IPsec. Once the first packet is processed, the server will re-negotiate the connection and upgrade it so that all subsequent communications are fully encrypted. - If action=bypass, the remote computer group must be specified when dir=in. - If service=any, the rule applies only to services. - ICMP type or code can be "any". - Edge can only be specified for inbound rules. - AuthEnc and authnoencap cannot be used together. - Authdynenc is valid only when dir=in. - When authnoencap is set, the security=authenticate option becomes an optional parameter. Examples: Add an inbound rule with no encapsulation security for browser.exe: netsh advfirewall firewall add rule name="allow browser" dir=in program="c:\programfiles\browser\browser.exe" security=authnoencap action=allow Add an outbound rule for port 80: netsh advfirewall firewall add rule name="allow80" protocol=TCP dir=out localport=80 action=block Add an inbound rule requiring security and encryption for TCP port 80 traffic: netsh advfirewall firewall add rule name="Require Encryption for Inbound TCP/80" protocol=TCP dir=in localport=80 security=authdynenc action=allow Add an inbound rule for browser.exe and require security netsh advfirewall firewall add rule name="allow browser" dir=in program="c:\program files\browser\browser.exe" security=authenticate action=allow Add an authenticated firewall bypass rule for group acmedomain\scanners identified by a SDDL string: netsh advfirewall firewall add rule name="allow scanners" dir=in rmtcomputergrp= action=bypass security=authenticate Add an outbound allow rule for local ports 5000-5010 for udp- Add rule name="Allow port range" dir=out protocol=udp localport=5000-5010 action=allow
Usage: %1!s! wsh=]disabled|enabled|default forcews=]disabled|enabled|default Parameters: Tag Value wsh - One of the following ...
Usage: %s -? -q -u -g -p -n[:WIN32|WIN64 myfile.sdb | {guid} | "name" -? - print this help text. -p - Allow SDBs containing ...
Usage: %ws modifiers switch accountname Where "accountname" can be the name or domain ame of the target computer or user ...
Usage: ADD PLEX LUN= NOERR ADD TPGROUP TPORTAL= NOERR Adds an existing LUN as a plex to the currently selected LUN or adds ...
Usage: add rule name= dir=in|out action=allow|block|bypass program= service= |any description= enable=yes|no (default=yes) ...
Usage: add rule name= endpoint1=any|localsubnet|dns|dhcp|wins|defaultgateway| | | | | endpoint2=any|localsubnet|dns|dhcp|wins|defaultgateway| ...
Usage: add rule name= mmsecmethods=dhgroup1|dhgroup2|dhgroup14|dhgroup24|ecdhp256| ecdhp384:3des|des|aes128|aes192|aes256-md5|sha1|sha256 ...
Usage: all format = (list | table) wide = (yes | no) Displays all policies, filter lists, and filter actions. Parameters: ...
Usage: all resolvedns = (yes | no) Displays details of all policies, filters, SAs, and statistics from SPD. Parameters: Tag ...