I would also recommend that once set up and working, you use the
Windows firewall to only allow access to the SMB ports from RISC
OS devices' IP addresses. Don't even allow all of your local
network in case of compromised devices such as security cameras or
guest's equipment.
SMBv1 is linked to ports 137,138,139 and google suggests either tcp
or udp, so to block them all is 6 firewall rules.
Are all 6 needed?
As 139 seems to be the most important, at the moment I've blocked it
for tcp and udp on a range of remote IP addresses
192.168.1.0 to 192,168.1.29
192.168.1.40 to 192.168.1.255
That leaves the 30 to 39 for RISCOS machines.
Thoughts?
| Sysop: | Jacob Catayoc |
|---|---|
| Location: | Pasay City, Metro Manila, Philippines |
| Users: | 5 |
| Nodes: | 4 (0 / 4) |
| Uptime: | 24:09:36 |
| Calls: | 117 |
| Calls today: | 117 |
| Files: | 368 |
| D/L today: |
560 files (257M bytes) |
| Messages: | 70,913 |
| Posted today: | 26 |