From: Andy Medina on
That explains it. As Lem pointed out, you are looking in the wrong place.
That is why I asked the questions in the order they were in. Maybe I should
have said the menu item along the *menu bar* in the first place. :D

"RB" <NoMail(a)NoSpam> wrote in message
news:un3Lds5vKHA.4908(a)TK2MSFTNGP06.phx.gbl...
>
> "Andy Medina"
>> Which of the following is true?
>> a) there is no "Advance" menu item in the Network Connections window.
>> b) there is no "Advanced Settings" item under the Advance menu item.
>> c) there is no "Adapter and Bindings" tab in the Advance Settings
>> window.
>> d) there is a "Adapter and Bindings" tab but nothing is listed.
>> Is there a "Provider Order" tab in the Advance Settings window?
> I don't know if I am allowed to post jpg attachments which I could do if I
> knew
> it was acceptable to do so. But there could be quite a few of them to
> expound
> everything. But as brief as possible this is the explained scenario:
> ControlPanel->NetworkConnections then right click on desired
> connection and choose properties, brings up a screen showing
> two tabs General and Advanced. I will tell you about the
> General tab first since I believe it expands to the area of
> question, (I will skip this particular Advanced tab till later)
> If you look at the General tab window you see in the first list
> box window my Network Adapter listing with a Configure button
> beside it. If you click the Configure button it basically covers
> driver installation or uninstalling etc.
> So back out of Configure back to the same said General Tab then
> if you look down the second list box window it has all of your
> protocols and file & print sharing services that are installed.
> If you highlite the tcp/ip protocol and click properties then you
> see a window with a General tab and a Alternate Config tab,
> Down at the bottom (of the General tab window) there is an
> Advanced button, if you click that you see an area that I believe
> is pertinant to this discussion. It has 4 tabs, IP Settings,
> DNS, WINS, and Options. If you click the WINS tab you see a window
> with a top list box where you can add WINS addresses, Below that
> you can check ENABLE LMHOSTs options. And below that is 3 options,
> 1. Default use Netbios from DHCP server
> 2. Enable Netbios over tcp/ip
> 3. Disable Netbios over tcp/ip
> There are no bindings window to be found in "ANY" of the expanded
> windows stemming from the original NetworkConnections properties
> General tab.
> So then if you look at the original NetworkConnections properties
> Advanced tab (skipped over above) then you see a windows firewall
> window with one Settings button. So clicking on the Settings button
> you see the windows Firewall window with a General tab, an Exceptions
> tab and an Advanced tab. Expanding out "all" of these none of them
> bring up "any" bindings window.

From: RB on
> However, you are looking in the wrong place.
Oh why the heck did they stick it up there for, that seems odd to me
given all of those menus are usually explorer generic.
Anyhow thank you !
I am not so much still sold on trying to use Netbeui (which appears to be an earlier
version of Netbios) but I still have been unable to get key information to help me
in my decision. Two things specifically,
1. The poster Jack (MS, MVP-Networking) wrote
{ If you are worried that is a good idea.
Adding NetBEUI as Sharing Protocol in WinXP:
http://www.ezlan.net/netbeui.html
}
I replied to him but he never answered. Did I misunderstand him or is he saying
he things netbuei is a good thing still ?

2. Ok say I keep netbios and I disable the ports you guys told me about .
I am concerned that if I disable them it will intefere with apps that might be
using these ports. I did a search for a way to find out who is using what and
I got the following results from netsat. I cut out all but the 3 ports spoke of.
So what is going to happen with these apps if I block these ports ?
----------------------------------------------------
netstats -a /b -n
returned this
Active Connections
Proto Local Address Foreign Address State PID
TCP 0.0.0.0:135 0.0.0.0:0 LISTENING 1368
c:\windows\system32\WS2_32.dll
C:\WINDOWS\system32\RPCRT4.dll
c:\windows\system32\rpcss.dll
C:\WINDOWS\system32\svchost.exe
C:\WINDOWS\system32\ADVAPI32.dll
[svchost.exe]

TCP 0.0.0.0:445 0.0.0.0:0 LISTENING 4
[System]

TCP [::]:135 [::]:0 LISTENING 1368
-- unknown component(s) --
toside.sys
-- unknown component(s) --
[svchost.exe]


UDP 0.0.0.0:445 *:* 4
[System]

UDP 192.168.1.2:138 *:* 4
[System]
============ALSO===
Another question when I look in the ADVANCED->bindings that you just showed
me how to view, I don't see any Netbios listed when I do have it Enabled in my TCP
properties ? What is up with that ?
And what is up with the MS TCP/IP ver 6 ? I have that in addition to the Internet TCP/IP ?


From: David H. Lipman on
From: "RB" <NoMail(a)NoSpam>

>> However, you are looking in the wrong place.
| Oh why the heck did they stick it up there for, that seems odd to me
| given all of those menus are usually explorer generic.
| Anyhow thank you !
| I am not so much still sold on trying to use Netbeui (which appears to be an earlier
| version of Netbios) but I still have been unable to get key information to help me
| in my decision. Two things specifically,
| 1. The poster Jack (MS, MVP-Networking) wrote
| { If you are worried that is a good idea.
| Adding NetBEUI as Sharing Protocol in WinXP:
| http://www.ezlan.net/netbeui.html
| }
| I replied to him but he never answered. Did I misunderstand him or is he saying
| he things netbuei is a good thing still ?

| 2. Ok say I keep netbios and I disable the ports you guys told me about .
| I am concerned that if I disable them it will intefere with apps that might be
| using these ports. I did a search for a way to find out who is using what and
| I got the following results from netsat. I cut out all but the 3 ports spoke of.
| So what is going to happen with these apps if I block these ports ?
| ----------------------------------------------------
| netstats -a /b -n
| returned this
| Active Connections
| Proto Local Address Foreign Address State PID
| TCP 0.0.0.0:135 0.0.0.0:0 LISTENING 1368
| c:\windows\system32\WS2_32.dll
| C:\WINDOWS\system32\RPCRT4.dll
| c:\windows\system32\rpcss.dll
| C:\WINDOWS\system32\svchost.exe
| C:\WINDOWS\system32\ADVAPI32.dll
| [svchost.exe]

| TCP 0.0.0.0:445 0.0.0.0:0 LISTENING 4
| [System]

| TCP [::]:135 [::]:0 LISTENING 1368
| -- unknown component(s) --
| toside.sys
| -- unknown component(s) --
| [svchost.exe]


| UDP 0.0.0.0:445 *:* 4
| [System]

| UDP 192.168.1.2:138 *:* 4
| [System]
| ============ALSO===
| Another question when I look in the ADVANCED->bindings that you just showed
| me how to view, I don't see any Netbios listed when I do have it Enabled in my TCP
| properties ? What is up with that ?
| And what is up with the MS TCP/IP ver 6 ? I have that in addition to the Internet
| TCP/IP ?


The fist 1024 TCP and UDP ports are the oldest and most standardized protocols. TCP/UDP
ports 135 ~ 139 and 445 are completely safe to blockon any FireWall Appliance and NAT
Routers. Blocking them will only enhance your security. Having them blocked will not
block some unknow application or content.

The LAN side of the NAT Router you have is your enclave. You can safely have all network
protocols at their default and move the security from each PC to that of the perimeter.
Blocking TCP/UDP ports 135 ~ 139 and 445 on the LAN/WAN barrier means you SOHO LAN is
safer on the Internet and all nodes on the LAN side can communicate fully without protocol
settng hinderence.

There are two levels of concern on your LAN side
wired
wireless

Unless somone has physical access to your CAT-5 Ethernet LAN, no one is going to be
tapping your LAN through the Ethernet topolgy.

Wireless is different. You have to take further steps. Like I mentioned,
* Use a strong PreShared authentication key
* WPA2
* USE AES encryption
* Choice to use MAC Authentication (You tell the Router what MAC addresses can use
WireLess and then thy are the only MAC addreses that can use WiFi on your SOHO LAN)

Then the Wireles has been secured as best you could.

Once you have done that, there is NO NEED to fuss with "NetBIOS over IP" for any nodes on
the LAN side.

To further enhance your security I suggested,
* Disable all remote management protocols to the Router
* Disable WAN ICMP and UDP traceroute capabilities.

BTW: Some advocate blocking TCP port 4567
http://en.wikipedia.org/wiki/TR-069

I block it on my FiOS Router.


--
Dave
http://www.claymania.com/removal-trojan-adware.html
Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp


From: RB on

>"David H. Lipman" wrote in message
> TCP/UDP ports 135 ~ 139 and 445 are completely safe to blockon any FireWall Appliance
>and NAT Routers. Blocking them will only enhance your security. Having them blocked will not
> block some unknow application or content.

Ok this is good information. Thank you.

> * USE AES encryption

My router offers AES, but when I look at my laptop's broadcom wireless I don't see AES as an
offering, but only shows WPA TKIP ? Is this capability dependent on both the router and the
wireless node drivers ?

> * Choice to use MAC Authentication (You tell the Router what MAC addresses can use
> WireLess and then thy are the only MAC addreses that can use WiFi on your SOHO LAN)

Well I thought about this but then I read it is easy for hackers to clone a MAC so is it really that
effective ?

> Once you have done that, there is NO NEED to fuss with "NetBIOS over IP" for any nodes on
> the LAN side.

Whoa wait a minute you are loosing me here. I still need to see my nodes within my workgroup
how will I be able to do this without Netbios ?


From: David H. Lipman on
From: "RB" <NoMail(a)NoSpam>


>>"David H. Lipman" wrote in message
>> TCP/UDP ports 135 ~ 139 and 445 are completely safe to blockon any FireWall Appliance
>>and NAT Routers. Blocking them will only enhance your security. Having them blocked
>>will not
>> block some unknow application or content.

| Ok this is good information. Thank you.

>> * USE AES encryption

| My router offers AES, but when I look at my laptop's broadcom wireless I don't see AES
| as an
| offering, but only shows WPA TKIP ? Is this capability dependent on both the router
| and the
| wireless node drivers ?


The notebook will sync wirth the WireLess Router's encryption.



>> * Choice to use MAC Authentication (You tell the Router what MAC addresses can use
>>
| WireLess and then thy are the only MAC addreses that can use WiFi on your SOHO LAN)

|
| Well I thought about this but then I read it is easy for hackers to clone a MAC so is
|
| it really that effective ?

It can be done but NOT easily.

>> Once you have done that, there is NO NEED to fuss with "NetBIOS over IP" for any nodes
>> on the LAN side.

| Whoa wait a minute you are loosing
| me here. I still need to see my nodes within my
| workgroup
| how will I be able to do
| this without Netbios ?


Leave NetBIOS alone !
You want to play with unbinding NetBIOS from IP. I've been trying to tell you why you
don't need to !




--
Dave
http://www.claymania.com/removal-trojan-adware.html
Multi-AV - http://www.pctipp.ch/downloads/dl/35905.asp


First  |  Prev  |  Next  |  Last
Pages: 1 2 3 4 5 6 7 8
Prev: WAN connection
Next: Wireless problems, again...