?
Solved

3 Com Super Stack Firewall

Posted on 2004-03-23
2
Medium Priority
?
210 Views
Last Modified: 2013-11-16
We have a 3 com super stack firewall at work

I have a basic knowledge of setting up the firewall which has been completed and working well.

What are good default policies that every firewall should have in place for Blocking certain ports, key words, websites and so on
.

Thanks in adavnce

Mark
0
Comment
Question by:ellandrd
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 23

Assisted Solution

by:Tim Holman
Tim Holman earned 600 total points
ID: 10657762
Allow these ports out:

80 (http)
443 (https)
53 (dns)
25 (if you host your own mailserver)
110 (if you use an ISP's POP3 mailserver)

..and NOTHING in, except 25 if you host your own mailserver.

A good start is to allow everything out, but NOTHING in.
0
 
LVL 4

Accepted Solution

by:
hawgpig earned 900 total points
ID: 10657797
The 3 com super stack is like all other firewalls...
I will not allow initial connections from the outside world...
but will allow all from the inside to initiate a connection....
unless you plan on tranlsating a web to the outside world the default config will work fine for what you are trying to do.....
The 3com has the capablilty of doing web filtering by keyword....or web site.....
This is great for home use....but I have found it a serious Pain for business use.....I get a lot of calls from clients that can't get to a particular website because of a single swear word.....
So just a word to the wise.....if you decide to use web filtering on the 3com.....be aware you may end up chasing some ghosts once in a while...
Sounds like you have it under control...
Good Luck
0

Featured Post

Ransomware Attacks Keeping You Up at Night?

Will your organization be ransomware's next victim?  The good news is that these attacks are predicable and therefore preventable. Learn more about how you can  stop a ransomware attacks before encryption takes place with our Ransomware Prevention Kit!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.
Visualize your data even better in Access queries. Given a date and a value, this lesson shows how to compare that value with the previous value, calculate the difference, and display a circle if the value is the same, an up triangle if it increased…
Suggested Courses
Course of the Month15 days, 10 hours left to enroll

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question