The Security Policy Management snap-in of Security Center provides a wizard-based interface, accessible by right-clicking the TCP/IP Filtering node that can assist you in building a rules file.
When creating a rules file, pay close attention to the restrictions you specify. Rules must be considered within the context of all rules that precede them in the order of evaluation.
The wizard-based interface enables the security administrator to
-
Build a new rules file.
-
Add rules to an existing rules file.
-
Delete rules from an existing rules file.
-
Modify rules in an existing rules file.
-
View a single rule or the entire set of rules.
-
Verify the syntax of an existing rules file.
-
Test a rules file before implementing it on the system.
The Security Policy Management snap-in helps ensure that the rules syntax is correct. However, you should test all rules files using the TCP/IP Rules File Test wizard to guarantee that the rules evaluate correctly.

