Solved

configuring firewall settings

Posted on 2004-04-22
7
723 Views
Last Modified: 2007-12-19
HI,

I am trying to install a program which needs me to do the following :


Authorise Apache.exe to listen to port 80.
Authorise Mysqld.exe to listen to port 3306
Authorise EasyPHP.exe to access to port 80 (Apache) from address 127.0.0.1
Authorise EasyPHP.exe to access to port 3306 (MySql) from address 127.0.0.1
Authorise Apache.exe to access to port 3306 (MySql) from address 127.0.0.1
Authorise Mysqladmin.exe to access to port 3306 (MySql) from address 127.0.0.1


I am runnning a windows xp professional pc .

can anyone let me know how to go about configuring these firewall settings.

Thanks,
lerouge
0
Comment
Question by:satishmadhu
7 Comments
 
LVL 4

Assisted Solution

by:llcooljayce
llcooljayce earned 100 total points
ID: 10895437
1.  Right Click on My Network Places.  
2.  Choose Properties.
3.  Right Click on your LAN connection
4.  Choose Properties.
5.  Click on Advanced Tab
6.  Assuming your checkbox is checked to enable the firewall, Click on the Settings button
7.  Click on Add
8.  Name the service (HTTP and MySQL)
9.  Put in the IP of 192.168.0.1
10.  Put in 80 for External Port number and leave the radio button on TCP
11.  Click OK.

Repeat steps 7 - 11 for the MySQL access but change the port to 3306

That should work.  Cheers.

Jayce
0
 

Author Comment

by:satishmadhu
ID: 10895724
Hi,
Did that but how to do the rest of the things given below:

Authorise EasyPHP.exe to access to port 80 (Apache) from address 127.0.0.1
Authorise EasyPHP.exe to access to port 3306 (MySql) from address 127.0.0.1
Authorise Apache.exe to access to port 3306 (MySql) from address 127.0.0.1
Authorise Mysqladmin.exe to access to port 3306 (MySql) from address 127.0.0.1

lerouge
0
 
LVL 7

Expert Comment

by:sftweng
ID: 10895753
127.0.0.1 is "localhost" and is not protected by the firewall.
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 

Author Comment

by:satishmadhu
ID: 10895796
Hi,
Does that mean I cannot give acess to easyphp.exe to port 80 from address 127.0.0.1

lerouge
0
 

Author Comment

by:satishmadhu
ID: 10895798
hi
what does giving access to a port mean in the statement

Authorise EasyPHP.exe to access to port 80 (Apache) from address 127.0.0.1

lerouge
0
 
LVL 7

Accepted Solution

by:
sftweng earned 150 total points
ID: 10896047
satismadhu, any program running on your "localhost" has access to any port unless (I've never seen it) the firewall specifically blocks the port for that address - 127.0.0.1 is a local loopback, which does not go through any hardware communications devices.

What might be meant, however, is that 127.0.0.1 or "localhost" might be entered into the ICF (Internet Connection Firewall) IP address or host name of the server providing the service, in the settings for the firewall for any given port, but that would be a "to" address, not a "from" address.

Those seem like strange instructions to me. What is the program - is it an "off the shelf" product? Do the instructions come from an installation manual? Who makes the software?
0
 
LVL 4

Expert Comment

by:scorpiia
ID: 10896065
If you are using Windows XP built-in firewall. the localhost address 127.0.0.1 doesn't need to be configurated. But if you are using some other firewall applications such as Zonealarm, you need to figure it too.

:)
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

We have adopted the strategy to use Computers in Student Labs as the bulletin boards. The same target can be achieved by using a Login Notice feature in Group policy but it’s not as attractive as graphical wallpapers with message which grabs the att…
Step by step guide to Clean and Sort your windows registry! Introduction: Always remember: A Clean registry = Better performance = Save your invaluable time In this article we're going to clear our registry manually! Yes, manually! The e…
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now