Yes, although ipsec wouldn't work in this situation because OP needs to drop
packets with an invalid size.
----- Original Message -----
From: "Dominik Friedrichs" <[email protected]>
To: "Half-Life dedicated Win32 server mailing list"
<[email protected]>
Sent: Saturday, August 31, 2013 9:52 AM
Subject: Re: [hlds] Steam Server Ports
Lets not forget the IPSec policies that can be used to drop packets
depending on IP/port/protocol. Its capabilities are very limited (no rules
for packet size, data content or fancy stuff like that) but at least you
can automate it using Netsh (as I did) to be able to blacklist certain
source IPs once they trigger some kind of detection.
On 2013/08/31 14:56, Mart-Jan Reeuwijk wrote:
lol, you cannot "configure" Windows networking to drop/select packets to
a already open port. All windows has is the Windows firewall, which is
crap at best, after all it had to be NSA approved...
And I agree, so far haven't found a firewall on windows platform that
did what I wanted it to do.
_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives,
please visit:
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds
_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please
visit:
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds