
From my experience firewall rules have been one of the most time consuming things to setup and having an easy way to import/apply standard rulesets across various customer sites would be really helpful….emphasis on the various customers and different network settings abroad. What I think could be useful is if these "rulesets" became a sort of optional baseline preset that was available as a quick select (kind of like the preset QOS traffic types). I suppose it pretty much combines a firewall and port alias into one merged alias name with all the protocols pre-assigned for the source & destination. The idea is to make some pre-built "rulesets" that effectively harden egress traffic in a quick and easy way. Anyway, to help clarify my original intent behind this request I'll give some examples. See for more information, including how to view or delete existing port reservations.I totally missed my notifications on this topic. you cannot reserve port 60000 for both TCPv4 and TCPv6) Ports may be reserved for either version 4 or 6 of a protocol, but not both (i.e. By default port reservations are persistent across reboots Use the following NETSH command to reserve the ports: netsh int Add excludedportrange tcp|udp active|persistent]įor example, to reserve ports 55368-55372 for UDPv6, use the command: netsh int ipv6 add excludedportrange protocol=udp startport=55368 numberofports=5.If a process is using a port included in the range of ports to be reserved, NETSH will return the following error and the reservation will fail: The process cannot access the file because it is being used by another process. Stop any processes using the ports to be reserved.

This is not required on Server 2012 or later. You can use the netsh command to reserve the ports required by QuickBooks.
