Overview
In some customer environments, we’ve observed that network ports or connections may be inadvertently blocked, which can interfere with the normal operation of various services, including ours. To ensure that your system communicates effectively with external services and that troubleshooting is smooth, we’ve put together this detailed guide.
This Knowledge Base article will walk you through the process of configuring the Windows Firewall to:
- Allow inbound traffic on port 443 (HTTPS): Ensuring secure communication between your system and external servers.
- Permit ping requests: This will help with diagnosing network-related issues by allowing simple network tests.
- Enable access to saner.secpod.com: Ensuring that all necessary services can communicate with our servers for optimal functionality.
Solution
Steps for Configuring a Firewall Rule for Port 443
Step 1: Open Windows Defender Firewall with Advanced Security
Click on the Start menu, type "Windows Defender Firewall" into the search bar, and select Windows Defender Firewall with Advanced Security.
Step2: Navigate to Inbound Rules:
On the left-hand pane of the window, you'll see a list of options. Click on Inbound Rules to view and manage the rules for incoming traffic.
Step3: Create a New Rule:
In the right pane, click on New Rule. This will open the New Inbound Rule Wizard, which will guide you step by step through the process of creating your new firewall rule.
Step4: Choose Rule Type:
When the wizard appears, select Port as the rule type, then click Next to proceed.
Step 5: Specify Protocol and Port:
Choose TCP as the protocol, which is used for secure communication, and then enter 443 as the local port. Port 443 is used for HTTPS traffic, so this will allow secure connections to pass through the firewall.
Step 6: Allow the Connection:
Now, you’ll see an option to Allow the connection. This ensures that the firewall will not block the incoming traffic. Select this option and click Next.
Step 7: Choose When to Apply the Rule:
The wizard will ask when you want the rule to apply. You’ll typically want to choose Domain, Private, and Public to make sure the rule works for all types of network environments. Once selected, click Next.
Step 8: Name the Rule and Finish:
Finally, give your rule a descriptive name, like "Allow Port 443 (HTTPS)" so it’s easy to identify later. You can also add a brief description if desired. Once you’re finished, click Finish to create the rule.
Steps to Allow Ping/ ICMP Echo Request in Windows Firewall
Step 9: To create the inbound rule repeat the steps from 1 to 3.
Step 10: Configuring Rule Properties:
a.In the "New Inbound Rule Wizard" window, select "Custom" and then click "Next".
b. On the next page, make sure "All programs" is selected and then click "Next."
c. Now choose "ICMPv4" from the "Protocol type" dropdown and then click the "Customize" button.
d. In the "Customize ICMP Settings" window, select the "Specific ICMP types" option. In the list of ICMP types, enable "Echo Request" and then click "OK."
e. Back in the "New Inbound Rule Wizard" window, you're ready to click "Next."
f. On the next page, it's easiest to just make sure that the "Any IP address" options are selected for both local and remote IP addresses. If you want, you can configure specific IP addresses to which your PC will respond to a ping request. Other ping requests are ignored.
g. On the next page, make sure that the "Allow the connection" option is enabled and then click "Next".
h. Finally, you need to give your new rule a name, and optionally a description. However, we do recommend that you at least get the text "ICMPv4".
Conclusion
By following the outlined steps, you have successfully configured the Windows Firewall to allow inbound traffic on port 443 (HTTPS) and enabled ICMPv4 Echo Requests (ping). These configurations ensure secure communication and facilitate network diagnostics.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article