Microsoft Internet Security and Acceleration Server 2004 SDK |
The RetroactiveAllowBind method allows a Firewall client to receive a secondary inbound connection on a socket that was previously bound by the Firewall client, but was not necessarily approved by the Microsoft Firewall service.
HRESULT RetroactiveAllowBind( INT Protocol, LPSOCKADDR Address, DWORD AddressLength, REFGUID ProtocolGuid, DWORD dwFlags, IFWXIpFilter* pIpFilter );
Value | Meaning |
---|---|
FWX_PROTOCOL_TCP | The bind uses the TCP protocol. |
FWX_PROTOCOL_UDP | The bind uses the UDP protocol. |
Value | Meaning |
---|---|
FWX_FLAG_BIDIRECTIONAL | Permission is also granted to send packets back to destinations that recently sent packets to the socket. This flag is only valid for UDP. |
FWX_INCREASE_RECEIVE_BUFFER | The receive buffer will be increased to 64 kilobytes. This flag should be set to prevent packet loss if high-bandwidth packet bursts occur in a secondary UDP connection. |
Usually a filter will know that a bind call made by a Firewall client is valid only after the bind call succeeds and the Firewall client sends the address to its peer. For this reason, the Firewall service will not fail a bind call even when the service does not allow the client inbound access. Instead, the Firewall service marks the connection, and discards datagrams sent or connection attempts to that address, unless the bind becomes valid later.
Server: Requires Windows Server 2003 or Windows
2000.
Version: Requires Internet Security and Acceleration
Server 2004.
Header: Declared in Wspfwext.idl.