-
If port 445 is closed, Windows sharing will not be able to be used normally, so we will replace Windows sharing with cloud box permission sharing.
Compared with Windows sharing, CloudBox private cloud disk sharing is more secure. Based on the private cloud deployment, CloudBox encrypts and stores files in a centralized manner, and does not use high-risk ports such as 445, so that the Linux system avoids most virus attacks. In addition, the scientific organizational structure and rich permission settings make CloudBox more advantageous than Windows sharing.
-
Method steps.
1. Select "Run" in the "Start" menu, enter "and press Enter" to open the local Group Policyr. Computer Configuration--- Windows Settings--- Security Settings--- IP Security Policy, in Local Computer
2. Take closing port 135 as an example (the operation is the same for other ports):
Right-click in the margin on the right side of the local group policyr, select Create IP Security Policy, pop up the IP Security Policy Wizard dialog box, and click Next. In the dialog box that appears, write "Close Port" (optional) in the name (optional), and click Next; The "Activate Default Response Rule" option in the dialog box is unchecked, and then click Next; Select Properties and click OK.
3. In the "Close Port Properties" dialog box that appears, select the "Rules" tab, remove the check mark in front of "Use Add Wizard", and click the "Add" button.
4. In the pop-up "New Rule Properties" dialog box, select the "IP Filter List" tab, and click "Add" in the lower left corner
5. The Add dialog box appears, fill in the name of "Seal Port" (you can fill in at will), remove the tick in front of "Use Add Wizard", and click "Add" on the right.
6. In the "IP Filter Properties" dialog box that appears, select the "Address" tab, select "Any" for "Source Address", and select "My IP Address" for "Destination Address"; Select the Agreement tab, and the settings are as shown in **. Once you've set it up, click "OK".
7. Return to the "IP Filter List" and click "OK". Return to the New Rule Properties dialog box.
8. Select the "Block Port" you just added in the IP filter list, then select the "Filter Operation" tab, remove the check mark in front of "Use Add Wizard", and click the "Add" button.
9. In the Filter Action Properties, select the Security Method tab and select the Block option; In the General tab, give the action a name, and click OK.
10. Select the new "New 1", click Close, return to the "Close Port Properties" dialog box, confirm that the Block Port rule in the "IP Security Rules" is selected, and click OK.
11. In Group Policyr, you can see the newly created "Close Port" rule, select it and right-click, select the "Assign" option, and make the rule start to apply!
Cybersecurity experts recommend that users disconnect the network and turn on the phone, that is, unplug the network cable before turning it on, so as to basically avoid being infected by ransomware. After booting up, you should find a way to apply security patches or install defense tools launched by various network security companies to connect to the Internet. It is recommended to back up the important files and data in the computer to the mobile hard disk and USB flash drive as soon as possible, and save the disk offline after the backup, and at the same time be vigilant against unknown links, files and emails. >>>More
Cause analysis: one. Loosening caused by deformation of the contact spring blade inside the network cable socket. >>>More
If the fiber modem port is not enough, you can install a router, and generally there are 6-8 router ports, which can meet the use of basic ports. >>>More
It's okay, normal packet reception.
Simple,,They should have installed network management software,To limit your traffic,And then your 360 was partially intercepted so prompted,Can't go online,Because they completely cut off the bandwidth,The solution is that your next ARP firewall can be effectively defended,The main thing I don't know what software they use,If it's a P2P terminator,,You can go down to the next anti-P2P terminator to counter-kill。 These are all my experiences, I have actually encountered, and I hope they will be helpful to you.