New Research: Supply Chain Attack on Axios Pulls Malicious Dependency from npm.Details →
Socket
Book a DemoSign in
Socket

netsh-rule

Package Overview
Dependencies
Maintainers
1
Versions
6
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

netsh-rule

Utility to generate a batch file to manage inbound and outbound Windows firewall connections for a single exe file or all exe files in folder

latest
Source
npmnpm
Version
1.0.5
Version published
Weekly downloads
0
-100%
Maintainers
1
Weekly downloads
 
Created
Source

Overview

netsh-rule will generate a file that allows to apply firewall rule to the specified application or all executables in the specified folder.

Install

npm -g i netsh-rule

or

yarn global add netsh-rule

Usage

netsh-rule <filename | folder> [options]

optiondescription
nameThe rule name (name will be generated if missing name)
programAbsolute path to <filename | folder>
enableEnable rule: yes | no (default: yes)
dirThe rule is inbound or outbound: in | out | both (default: both i.e. in and out)
actionThe action for rule: allow | block (default: block)
profileApply rule for: public | private | domain (default: public, private, domain)
formatOutput format can be batch file, powershell, or javascript: bat | ps1 | js (default: bat)

<netsh advfirewall firewall add rule> quick reference

Usage:

netsh advfirewall firewall add rule

  • name = <string>
  • dir = in | out
  • action = allow | block | bypass
  • [ program = <program path> ]
  • [ service = <service short name> | any ]
  • [ description = <string> ]
  • [ enable = yes | no (default = yes) ]
  • [ profile = public | private | domain | any[ ,... ] ]
  • [ localip = any | <IPv4 address> | <IPv6 address> | <subnet> | <range> | <list> ]
  • [ remoteip = any | localsubnet | dns | dhcp | wins | defaultgateway | <IPv4 address> | <IPv6 address> | <subnet> | <range> | <list> ]
  • [ localport = 0-65535 | <port range>[ ,... ] | RPC | RPC-EPMap | IPHTTPS | any (default = any) ]
  • [ remoteport = 0-65535 | <port range>[ ,... ] | any (default = any) ]
  • [ protocol = 0-255 | icmpv4 | icmpv6 | icmpv4:type,code | icmpv6:type,code | tcp | udp | any (default = any) ]
  • [ interfacetype = wireless | lan | ras | any ]
  • [ rmtcomputergrp = <SDDL string> ]
  • [ rmtusrgrp = <SDDL string> ]
  • [ edge = yes | deferapp | deferuser | no (default = no) ]
  • [ security = authenticate | authenc | authdynenc | authnoencap | notrequired (default = notrequired) ]

Remarks:

  • Add a new inbound or outbound rule to the firewall policy.
  • Rule name should be unique and cannot be "all".
  • If a remote computer or user group is specified, security must be authenticate, authenc, authdynenc, or authnoencap.
  • Setting security to authdynenc allows systems to dynamically negotiate the use of encryption for traffic that matches a given Windows Firewall rule. Encryption is negotiated based on existing connection security rule properties. This option enables the ability of a machine to accept the first TCP or UDP packet of an inbound IPsec connection as long as it is secured, but not encrypted, using IPsec. Once the first packet is processed, the server will re-negotiate the connection and upgrade it so that all subsequent communications are fully encrypted.
  • If action=bypass, the remote computer group must be specified when dir=in.
  • If service=any, the rule applies only to services.
  • ICMP type or code can be "any".
  • Edge can only be specified for inbound rules.
  • AuthEnc and authnoencap cannot be used together.
  • Authdynenc is valid only when dir=in.
  • When authnoencap is set, the security=authenticate option becomes an optional parameter.

Examples:

  • Add an inbound rule with no encapsulation security for messenger.exe:

    netsh advfirewall firewall add rule name="allow messenger" dir=in program="c:\programfiles\messenger\msmsgs.exe" security=authnoencap action=allow

  • Add an outbound rule for port 80:

    netsh advfirewall firewall add rule name="allow80" protocol=TCP dir=out localport=80 action=block

  • Add an inbound rule requiring security and encryption for TCP port 80 traffic:

    netsh advfirewall firewall add rule name="Require Encryption for Inbound TCP/80" protocol=TCP dir=in localport=80 security=authdynenc action=allow

  • Add an inbound rule for messenger.exe and require security

    netsh advfirewall firewall add rule name="allow messenger" dir=in program="c:\program files\messenger\msmsgs.exe" security=authenticate action=allow

  • Add an authenticated firewall bypass rule for group acmedomain\scanners identified by a SDDL string:

    netsh advfirewall firewall add rule name="allow scanners" dir=in rmtcomputergrp=<SDDL string> action=bypass security=authenticate

  • Add an outbound allow rule for local ports 5000-5010 for udp-

  • Add rule name="Allow port range" dir=out protocol=udp localport=5000-5010 action=allow

Keywords

generate

FAQs

Package last updated on 20 Jul 2020

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts