nuglobe wrote: Say that you are setting up a packet filtering for a custom protocol that uses 2 tcp ports. Would I have to have both inbound and outbound rules? The reason I ask is in the MS press book it shows an example of setting up packet filtering for a web server, and in the example it creates both and inbound tcp 80 rule and an outbound tcp 80 rule. I don't see why this would need to be this way. It seems that you are just trying to limit the access coming from your untrust interface.
rossonieri#1 wrote: nuglobe wrote: Say that you are setting up a packet filtering for a custom protocol that uses 2 tcp ports. Would I have to have both inbound and outbound rules? The reason I ask is in the MS press book it shows an example of setting up packet filtering for a web server, and in the example it creates both and inbound tcp 80 rule and an outbound tcp 80 rule. I don't see why this would need to be this way. It seems that you are just trying to limit the access coming from your untrust interface. hello, in the example perhaps the network running a public web server. -- the inbound is for the internet query the web server -- and the outbound is the internal network client accessing the internet. and -- it has nothing to do with vpn etc -- no offense ic cheers.
nuglobe wrote: Im talking about filtering HTTP traffic through RRAS on the interface "inbound" and "outbound" buttons.