JSI Tip 8399. How can I report Windows Firewall settings?

Jerold Schulman

August 19, 2004

5 Min Read
ITPro Today logo in a gray background | ITPro Today


In Windows XP SP2, the netsh command has been enhanced to help troubleshoot Windows Firewall.

When I type 'netsh firewall show config', I receive:

Domain profile configuration (current):-------------------------------------------------------------------Operational mode                  = EnableException mode                    = EnableMulticast/broadcast response mode = EnableNotification mode                 = EnableService configuration for Domain profile:Mode     Customized  Name-------------------------------------------------------------------Enable   No          File and Printer SharingEnable   No          UPnP FrameworkAllowed programs configuration for Domain profile:Mode     Name / Program-------------------------------------------------------------------Enable   Remote Assistance / C:WINDOWSsystem32sessmgr.exeEnable   Windows Messenger / C:Program FilesMessengermsmsgs.exeEnable   Microsoft FrontPage / C:Program FilesMicrosoft OfficeOffice10FRONTPG.EXEEnable   pcAnywhere Main Program / C:Program FilesSymantecpcAnywherewinaw32.exeEnable   Internet Explorer / C:Program FilesInternet Exploreriexplore.exeEnable   mnmsrvc.exe / C:WINDOWSSYSTEM32mnmsrvc.exePort configuration for Domain profile:Port   Protocol  Mode     Name-------------------------------------------------------------------2000   TCP       Enable   Remotely AnyWhere139    TCP       Enable   NetBIOS Session Service445    TCP       Enable   SMB over TCP137    UDP       Enable   NetBIOS Name Service138    UDP       Enable   NetBIOS Datagram Service1900   UDP       Enable   SSDP Component of UPnP Framework2869   TCP       Enable   UPnP Framework over TCPStandard profile configuration:-------------------------------------------------------------------Operational mode                  = EnableException mode                    = EnableMulticast/broadcast response mode = EnableNotification mode                 = EnableService configuration for Standard profile:Mode     Customized  Name-------------------------------------------------------------------Enable   No          File and Printer SharingEnable   No          UPnP FrameworkAllowed programs configuration for Standard profile:Mode     Name / Program-------------------------------------------------------------------Enable   Remote Assistance / C:WINDOWSsystem32sessmgr.exePort configuration for Standard profile:Port   Protocol  Mode     Name-------------------------------------------------------------------139    TCP       Enable   NetBIOS Session Service445    TCP       Enable   SMB over TCP137    UDP       Enable   NetBIOS Name Service138    UDP       Enable   NetBIOS Datagram Service1900   UDP       Enable   SSDP Component of UPnP Framework2869   TCP       Enable   UPnP Framework over TCPLog configuration:-------------------------------------------------------------------File location   = C:WINDOWSpfirewall.logMax file size   = 4096 KBDropped packets = DisableConnections     = EnableJSIINC firewall configuration:-------------------------------------------------------------------Operational mode                  = EnablePort configuration for JSIINC:Port   Protocol  Mode     Name-------------------------------------------------------------------10256  UDP       Enable   msmsgs 10256 UDP12646  TCP       Enable   msmsgs 12646 TCP10498  TCP       Enable   msmsgs 10498 TCP1394 Connection 2 firewall configuration:-------------------------------------------------------------------Operational mode                  = Enable

When I type 'netsh firewall show state verbose=enable', I receive:

Firewall status:-------------------------------------------------------------------Profile                           = DomainOperational mode                  = EnableException mode                    = EnableMulticast/broadcast response mode = EnableNotification mode                 = EnableGroup policy version              = Windows FirewallRemote admin mode                 = Enable        Scope: *Local exceptions allowed by group policy:-------------------------------------------------------------------Open ports       = EnableAllowed programs = EnableLog settings:-------------------------------------------------------------------File location   = C:WINDOWSpfirewall.logMax file size   = 4096 KBDropped packets = DisableConnections     = EnableService settings:Mode     Customized  Name-------------------------------------------------------------------Enable   No          File and Printer Sharing        Scope: *Enable   No          UPnP Framework        Scope: LocalSubNetDisable  No          Remote Desktop        Scope: *Program exceptions:Mode     Local policy  Name / Program-------------------------------------------------------------------Enable   Yes           Internet Explorer / C:Program FilesInternet Exploreriexplore.exe        Scope: *Enable   Yes           Windows Messenger / C:Program FilesMessengermsmsgs.exe        Scope: *Enable   Yes           Microsoft FrontPage / C:Program FilesMicrosoft OfficeOffice10FRONTPG.EXE        Scope: *Enable   Yes           pcAnywhere Main Program / C:Program FilesSymantecpcAnywherewinaw32.exe        Scope: *Enable   Yes           mnmsrvc.exe / C:WINDOWSSYSTEM32mnmsrvc.exe        Scope: *Enable   Yes           Remote Assistance / C:WINDOWSsystem32sessmgr.exe        Scope: *Port exceptions:Port   Protocol  Local policy  Mode     Name / Service type-------------------------------------------------------------------137    UDP       Yes           Enable   NetBIOS Name Service / File and Printer Sharing        Scope: *138    UDP       Yes           Enable   NetBIOS Datagram Service / File and Printer Sharing        Scope: *139    TCP       Yes           Enable   NetBIOS Session Service / File and Printer Sharing        Scope: *445    TCP       Yes           Enable   SMB over TCP / File and Printer Sharing        Scope: *1900   UDP       Yes           Enable   SSDP Component of UPnP Framework / UPnP Framework        Scope: LocalSubNet2000   TCP       Yes           Enable   Remotely AnyWhere / None        Scope: *2869   TCP       Yes           Enable   UPnP Framework over TCP / UPnP Framework        Scope: LocalSubNet3389   TCP       Yes           Disable  Remote Desktop / Remote Desktop        Scope: *Ports on which programs want to receive incoming connections:Port   Protocol  Version  PID       Type  Wildcarded  Forced  Name / Program-------------------------------------------------------------------500    UDP       IPv4     880       App   No          No      (null) / C:WINDOWSSYSTEM32lsass.exe        Scope: *4500   UDP       IPv4     880       App   No          No      (null) / C:WINDOWSSYSTEM32lsass.exe        Scope: *123    UDP       IPv4     1212      App   No          No      (null) / C:WINDOWSSYSTEM32svchost.exe        Scope: *1045   TCP       IPv4     1760      App   No          No      (null) / C:WINDOWSSYSTEM32INETSRVinetinfo.exe        Scope: *58084  UDP       IPv4     1712      App   No          No      (null) / C:Program FilesTapeWaretwwinsdr.exe        Scope: *34125  UDP       IPv4     1392      App   No          No      (null) / C:Program FilesRemotelyAnywhereRemotelyAnywhere.exe        Scope: *80     TCP       IPv4     1760      App   No          No      (null) / C:WINDOWSSYSTEM32INETSRVinetinfo.exe        Scope: *1025   UDP       IPv4     1332      App   Yes         No      (null) / C:WINDOWSSYSTEM32svchost.exe        Scope: *1044   UDP       IPv4     1392      App   Yes         No      (null) / C:Program FilesRemotelyAnywhereRemotelyAnywhere.exe        Scope: *3456   UDP       IPv4     1760      App   No          No      (null) / C:WINDOWSSYSTEM32INETSRVinetinfo.exe        Scope: *2000   TCP       IPv4     1392      App   No          No      (null) / C:Program FilesRemotelyAnywhereRemotelyAnywhere.exe        Scope: *22     TCP       IPv4     1392      App   No          No      (null) / C:Program FilesRemotelyAnywhereRemotelyAnywhere.exe        Scope: *443    TCP       IPv4     1760      App   No          No      (null) / C:WINDOWSSYSTEM32INETSRVinetinfo.exe        Scope: *25     TCP       IPv4     1760      App   No          No      (null) / C:WINDOWSSYSTEM32INETSRVinetinfo.exe        Scope: *135    TCP       IPv4     1760      App   No          No      (null) / C:WINDOWSSYSTEM32INETSRVinetinfo.exe        Scope: *1026   UDP       IPv4     1332      App   Yes         No      (null) / C:WINDOWSSYSTEM32svchost.exe        Scope: *42510  TCP       IPv4     1780      App   No          No      (null) / C:Program FilesCAeTrust AntivirusInoRpc.exe        Scope: *3513   TCP       IPv4     2176      App   No          No      (null) / C:Program FilesDellPSMarcpd.exe        Scope: *42508  UDP       IPv4     1780      App   No          No      (null) / C:Program FilesCAeTrust AntivirusInoRpc.exe        Scope: *5060   TCP       IPv4     3840      App   No          No      Internet Explorer / C:Program FilesInternet Exploreriexplore.exe        Scope: *1716   UDP       IPv4     3840      App   Yes         No      Internet Explorer / C:Program FilesInternet Exploreriexplore.exe        Scope: *1717   UDP       IPv4     3840      App   Yes         No      Internet Explorer / C:Program FilesInternet Exploreriexplore.exe        Scope: *Ports currently open on all network interfaces:Port   Protocol  Version  Program-------------------------------------------------------------------135    TCP       IPv4     C:WINDOWSSYSTEM32INETSRVinetinfo.exe        Scope: *137    UDP       IPv4     (null)        Scope: *139    TCP       IPv4     (null)        Scope: *138    UDP       IPv4     (null)        Scope: *445    TCP       IPv4     (null)        Scope: *1716   UDP       IPv4     C:Program FilesInternet Exploreriexplore.exe        Scope: *1717   UDP       IPv4     C:Program FilesInternet Exploreriexplore.exe        Scope: *2869   TCP       IPv4     (null)        Scope: LocalSubNet1900   UDP       IPv4     (null)        Scope: LocalSubNet5060   TCP       IPv4     C:Program FilesInternet Exploreriexplore.exe        Scope: *2000   TCP       IPv4     C:Program FilesRemotelyAnywhereRemotelyAnywhere.exe        Scope: *Additional ports open on JSIINC:Port   Protocol  Version-------------------------------------------------------------------10256  UDP       Any10498  TCP       Any12646  TCP       AnyICMP settings for all network interfaces:Mode     Type  Description-------------------------------------------------------------------Disable  2     Allow outbound packet too bigDisable  3     Allow outbound destination unreachableDisable  4     Allow outbound source quenchDisable  5     Allow redirectEnable   8     Allow inbound echo requestDisable  9     Allow inbound router requestDisable  11    Allow outbound time exceededDisable  12    Allow outbound parameter problemDisable  13    Allow inbound timestamp requestDisable  17    Allow inbound mask requestAdditional ICMP settings on JSIINC:Mode     Type  Description-------------------------------------------------------------------Disable  2     Allow outbound packet too bigDisable  3     Allow outbound destination unreachableDisable  4     Allow outbound source quenchDisable  5     Allow redirectDisable  8     Allow inbound echo requestDisable  9     Allow inbound router requestDisable  11    Allow outbound time exceededDisable  12    Allow outbound parameter problemDisable  13    Allow inbound timestamp requestDisable  17    Allow inbound mask requestJSIINC firewall settings:-------------------------------------------------------------------Operational mode = EnableVersion          = IPv4GUID             = {D0543B7A-9408-44D7-AE00-01200D50952C}

Other variants the 'netsh firewall show' command are:

netsh firewall show allowedprogram

Displays the allowed programs.

netsh firewall show config

Displays the local configuration information.

netsh firewall show currentprofile

Displays the current profile.

netsh firewall show icmpsetting

Displays the ICMP settings.

netsh firewall show logging

Displays the logging settings.

netsh firewall show multicastbroadcastresponse            

Displays multicast/broadcast response settings.

netsh firewall show notifications

Displays the current settings for notifications.

netsh firewall show opmode

Displays the operational mode.

netsh firewall show portopening

Displays the excepted ports.

netsh firewall show service

Displays the services.

netsh firewall show state

Displays the current state information.



Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like