Solved

Norton Personal Firewall and the outbound ports for a Citrix connection

Posted on 2004-03-23
9
370 Views
Last Modified: 2013-11-16
I have limited time to learn a program for my office so I have installed the trial program on my home computer.  However, every time I try to access the program i get the message : ICA file not found. This is Citrix and Terminal services (I hope I said that correctly). My firewall is Norton Personal Firewall and I was told to open ports UDP 1604 and TCP 1494 but when I tried, it seems I failed.

Also, even when Norton firewall is disabled I get the same message.

Can anyone walk me through the opening of these ports?  Thank you for your time.
0
Comment
Question by:Modell
9 Comments
 
LVL 23

Expert Comment

by:Tim Holman
ID: 10668932
List of Ports Used by Terminal Server.  You're missing TCP:3389 ?

Clients                   Static ports
--------                    ------------

RDP Client (Microsoft)      TCP:3389 (Pre Beta2:1503)
ActiveX Client (TSAC)       TCP:80, 3389
ICA Client (Citrix)         TCP:1494
                        
NOTE: Terminal Server uses port 3389.
0
 

Author Comment

by:Modell
ID: 10673977
umm, Tim?  I don't have a clue what you are talking about.  I need someone to help walk me through opening ports in Norton Personal Firewall without expecting me to fully understand what I'm doing.  Thanks anyway.
0
 
LVL 23

Accepted Solution

by:
Tim Holman earned 250 total points
ID: 10695390
Those are the ports you need to open on the firewall for Citrix to work fully.  However, I looked up the 'ICA file not found' message on the Citrix support site, and it is fixable... take a look here, apologies for bombarding you in geek language... ;)

http://support.citrix.com/kb/entry.jspa?categoryID=135&entryID=1825
0
 

Author Comment

by:Modell
ID: 10696748
ummmmmm, Tim, I found that web page some time ago; its instrucitons assume you have the ports open. My request is for someone to help me, step by step, open the ports using Norton Personal Firewall.  According to the host, I only need the two ports listed, udp 1604 and tcp 1494 open. But they won't help me do it ... 'third party programs etc.'. Thanks again
0
6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

 
LVL 23

Expert Comment

by:Tim Holman
ID: 10796547
Sorry for the delay in response, but do you still need help with this ?
0
 

Author Comment

by:Modell
ID: 10797004
The needed help has changed a little.  With dogged determination I have managed to open the two ports required by Citrix.  But I am very uneasy about it because I don't know how to tell Norton that there is only one company/person/computer permitted to use those ports.  Is this something you can help me with? Thanks.
0
 

Assisted Solution

by:slowmoe
slowmoe earned 250 total points
ID: 10798738
It's a thre step process if you don't know the computer you want to give access to:

1) Modify the rule you created to open the two ports by going to the "Tracking" tab and ticking the box labeled "Create an event log".

2) Check the "Event log" to see the "Remote computer" that tried using these two ports.

3) Modify the same rule again by going to the "Computers" tab and adding the "Remote computer" you found in step two to the "Only the computers and sites listed below" list.
0
 
LVL 19

Expert Comment

by:nodisco
ID: 15658501
No comment has been added to this question in more than 21 days, so it is now classified as abandoned..
I will leave the following recommendation for this question in the Cleanup topic area:
Split - tim_holman and slowmoe

Any objections should be posted here in the next 4 days. After that time, the question will be closed.

nodisco
EE Cleanup Volunteer
0

Featured Post

Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

Join & Write a Comment

Suggested Solutions

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now