Applies to: desktop apps only
The RetroactiveAllowBind method allows a Forefront TMG Client or Firewall Client computer to receive a secondary inbound connection on a socket that was previously bound by the Forefront TMG Client or Firewall Client computer, but was not necessarily approved by the Microsoft Firewall service.
HRESULT RetroactiveAllowBind( [in] INT Protocol, [in] LPSOCKADDR Address, [in] DWORD AddressLength, [in] REFGUID ProtocolGuid, [in] DWORD dwFlags, [in] IFWXIpFilter *pIpFilter );
Protocol flags. This parameter can have the following flag values:
Value Meaning FWX_PROTOCOL_TCP
The bind uses the TCP protocol.
The bind uses the UDP protocol.
Pointer to a sockaddr structure that contains the external IP address of the Forefront TMG computer for which this request is made. The address can be INADDR_ANY. The port number must be nonzero.
Length, in bytes, of the structure pointed to by the Address parameter.
GUID that identifies the protocol of which the connection is part.
Connection flags. This parameter can be any combination of the following flag values:
Value Meaning FWX_FLAG_BIDIRECTIONAL
Permission is also granted to send packets back to destinations that recently sent packets to the socket. This flag is only valid for UDP.
The receive buffer will be increased to 64 kilobytes. This flag should be set to prevent packet loss if high-bandwidth packet bursts occur in a secondary UDP connection.
Pointer to an IFWXIpFilter interface. All connections that are created by RetroactiveAllowBind will be restricted by the IFWXIpFilter interface pointed to by this parameter. If you specify NULL for this parameter, the connection will not be restricted by an IFWXIpFilter interface.
This method can return one of these values.
The method succeeded.
The connection exists and was already allowed.
No connection with the specified address was found.
The (bind) connection exists, but is already terminating.
The access rules do not allow the user to use the protocol specified by the ProtocolGuid parameter.
Usually a filter will know that a bind call made by a Forefront TMG Client or Firewall Client computer is valid only after the bind call succeeds and the Forefront TMG Client or Firewall Client computer sends the address to its peer. For this reason, the Firewall service will not fail a bind call even when the service does not allow the client inbound access. Instead, the Firewall service marks the connection, and discards datagrams sent or connection attempts to that address, unless the bind becomes valid later.
Minimum supported client
Minimum supported server
|Windows Server 2008 R2, Windows Server 2008 with SP2 (64-bit only)|
|Forefront Threat Management Gateway (TMG) 2010|
Build date: 7/12/2010