How To open a port in Windows Server Firewall

Posted on 295 views

Introduction

How can I configure Windows Firewall?, Open a Port on Windows firewall?. Firewall systems in networks and servers help prevent unauthorized access to given computer resources. The firewall systems checks for the incoming or even the outgoing traffic and then makes decisions about them based on the rules configured.

In our previous guide, we saw how to cause MS SQL server to listen on a specific port. In case the port is not explicitly allowed in the Windows Firewall, then the port won’t still be reached. In this guide, we shall go over the steps on how to expose the port by allowing it from the Firewall.

“Don’t grieve. Anything you lose comes round in another form.”
― Rumi

Step 1: Open Windows Firewall

Hit the Windows key and search for “firewall with Advanced Security“. Choose the first option that comes as shown below. Once the firewall window opens, proceed to the second step.

windows_firewall_search-583x420

Step 2: Configure Inbound rule.

Click on the “Inbound Rule” button on the top left section and choose “New Rule” on the top right section of the window. See below for a better visual view. A “New Inbound Rule Wizard” window will open. Proceed to the next step.

windows-firewall-inbound-1024x238

Step 3: On the Wizard

On the new window, follow the steps shown in the screenshots below

Choose port and hit next.

windows-firewall-new-rule-531x420

Choose TCP, input the port to be allowed and hit next.

windows-firewall-portinput-527x420

Allow the connection and hit next

windows-firewall-allowconection-538x420

Depending on what you desire, you can either choose “Domain, Private or Public“. Hit Next after that.

windows-firewall-publicorprivate-542x420

Place a name for the rule, a description if you like and hit Finish

windows-firewall-name-530x420

The port is now open. You can telnet to confirm if it is listening.

coffee

Gravatar Image
A systems engineer with excellent skills in systems administration, cloud computing, systems deployment, virtualization, containers, and a certified ethical hacker.