Solved

Firewall Help - List of Ports I should close.

Posted on 2004-10-12
4
145 Views
Last Modified: 2013-11-16
Can anyone tell me if a list of firewall ports that you should always close ?  My ports are currently marked as stelth which I assume is not the same thing.
0
Comment
Question by:Northumberland
  • 2
4 Comments
 
LVL 71

Accepted Solution

by:
Chris Dent earned 500 total points
ID: 12285410

Stealth is better than Closed - it won't even admit the port exists that way.

Still, it is better to Stealth or Close everything inbound unless you specifically need it open.
0
 
LVL 1

Expert Comment

by:WanMan
ID: 12285674
What Chris said.

I would set the firewall to stop ALL ports by default and then only open up the ports you need.

Under normal circumstances, unless you are hosting services inside your firewall then you don't need to allow ANY traffic inbound, except in response to a request from inside.
0
 
LVL 11

Expert Comment

by:PennGwyn
ID: 12288093
Both correct.  Trying to "block all bad ports" is an unrewarding lifetime career.  The only sane approach is to block everything by default, and then open the things you actually need.

0
 
LVL 1

Expert Comment

by:WanMan
ID: 12296727
" Trying to "block all bad ports" is an unrewarding lifetime career. "  What a good way of putting it! May I quote you (anonymously)?
0

Featured Post

Simple, centralized multimedia control

Watch and learn to see how ATEN provided an easy and effective way for three jointly-owned pubs to control the 60 televisions located across their three venues utilizing the ATEN Control System, Modular Matrix Switch and HDBaseT extenders.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Connecting Servers to L2 OR L3 Switch 6 68
cannot view videos at msnbc 12 65
WDS can't PXE boot 3 26
Datacenter Upgrade - Design Question 5 12
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

713 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question