Monthly Archives: April 2011

How to deploy internet monitoring and filtering in RRAS windows gateway?

Routing and Remote Access is a network service in Microsoft Windows Server 2008, Windows Server 2003, and Windows 2000 Server that can provides Network address translator (NAT) for connecting a private network to the Internet. An example network topology is as below:


Since all internet traffic goes through the RRAS server, it’s very simple for you to monitor and filter internet activities: “just install WFilter in this server.”


The RRAS server has two adapters: the internal NIC and external NIC, you shall be able to see two adapters in the “monitoring adapter settings” of “System Settings”->”Monitoring Settings”.


We recommend you to choose the internal NIC as the monitoring and blocking adapter, because you will be able to monitor, block and report on individual network computers.


However, if you choose the external NIC as the monitoring and blocking adapter, WFilter will treat the whole network as one computer, because the RRAS server will translate all subnet ip addresses to its public ip address.


We have noticed that some users prefer to monitor on the internal NIC to save license number, because you only need ONE 1-user license to monitor the public ip address. However, we recommend you not to do it, because this is not WFilter designed to work, and there might have an over-blocking issue for some p2p protocols.


 


More information, please check “WFilter Enterprise”.


Other related links:


How to block UDP ports in RRAS windows server 2003?
How to block internet downloading?
How to monitor internet usage on company network?
Internet monitoring software for business
How to filter web surfing?
How to block websites and restrict internet access?
How to block HTTPS websites on my network?

How to block UDP ports in RRAS windows server 2003?

As a pass-by filtering product, WFilter only can block TCP traffic. For complete blocking of p2p traffic, you’re required to block UDP ports 1024-65534 in your router or firewall. For more information about pass-by filtering, please check: difference between Pass-by filtering and Pass-through filtering.


Since some networks use a windows server with “Routing and Remote Access Service”(RRAS) as the gateway, you also can configure the “IP Filter” in RRAS to block UDP ports. In this tutorial, we will guide you to block all UDP ports except DNS(53) in windows server 2003.


1. Open “Routing and Remote Access” in “Control Panel”->”Administrative Tools”.



2. Choose the external adapter, Click “General”->”properties”.



3. Click “Inbound Filters”.




4. Add DNS port UDP 53 into the allow list


Click “New”->”Add IP Filter”, choose “Protocol” as “UDP”, “Sourceport” as “53″, “Destination port” as “0″(means all).



5. Add all TCP into the allow list


Click “New”->”Add IP Filter”, choose “Protocol” as “TCP”, “Sourceport” as “0″, “Destination port” as “0″.



6. Block others


Check “Drop all packets except those that meet the criteria below” to block other traffic.


By now, UDP ports are all blocked except UDP 53(DNS). And WFilter is now full functional to block p2p/IM/iptv traffic.


More information, please check “WFilter Enterprise”.


Other related links:


How to block internet downloading?
How to monitor internet usage on company network?
Internet monitoring software for business
How to filter web surfing?
How to block websites and restrict internet access?
How to block HTTPS websites on my network?