Solved

Letting Windows Firewall accept incoming connections

Posted on 2006-07-18
7
303 Views
Last Modified: 2013-12-04
When I run Super FTP Search (dowloaded from tucows, http://tucows.menanet.net/files3/fssetuptc.exe) my Windows Fireall does block it as it says it is trying to open an incoming connection from the internet. Why should it try to do it? Is it safe to list this software in the exception list of Windows Firewall?
0
Comment
Question by:s_federici
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 6

Expert Comment

by:glennbrown2
ID: 17128915
Open Control Panel, Windows Firewall, click on the "Exceptions" tab, "add program" and browse to your FTP program .exe file.  you could also "add port" if you need.  Port 21 is for ftp
0
 

Author Comment

by:s_federici
ID: 17128918
Or this is a stupid question and every FTP software does need an incoming connection to download info/file from the FTP site? What I fear would be having an open door on my PC.
0
 

Author Comment

by:s_federici
ID: 17128924
Yes, I know how to block/unblock it. But should I do it? Would that be safe for my PC?
0
Back Up Your Microsoft Windows Server®

Back up all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

 
LVL 88

Expert Comment

by:rindi
ID: 17129183
whenever you open up ports you are giving outsiders a chance of connecting to your PC and do bad things. For that reason a Firewall normally will have all ports blocked. When you do open such a port, you should make sure that you setup the rest of your system secure enough so that it will be difficult for outsiders to compromise your PC by making sure that you use strong passwords, use encryption where possible and also make sure that you have installed the latest updates and patches which close known security holes. If you keep to such rules you'll stay as secure as possible. When you install a software like FTP you normally know what you need it for and also secure it, so then you can also open that port. If you don't know what that software is for, then keep the port closed.
0
 
LVL 32

Expert Comment

by:r-k
ID: 17131415
I am not familiar with Super FTP Search, but it must be doing more than just act as an FTP client. That doesn't necessarily mean it is bad, but you should dig more into it and see why it needs ports opened. Perhaps email the company that sells it.
0
 
LVL 12

Accepted Solution

by:
Phil_Agcaoili earned 500 total points
ID: 17132039
I think you should allow it.

It sounds like by default, the Super FTP Search FTP application use active FTP and your firewall is seeing the FTP server requesting the data download port on your system and is blocking it.

In order to resolve the issue of the server initiating the connection to the client a different method for FTP connections was developed. This was known as passive mode, or PASV, after the command used by the client to tell the server it is in passive mode.

Here's more info about passive versus active FTP to make you feel more comfortable: http://slacksite.com/other/ftp.html
0
 

Author Comment

by:s_federici
ID: 17136315
Yes, exactly. You are perfectly right. Thanks
0

Featured Post

Guide to Performance: Optimization & Monitoring

Nowadays, monitoring is a mixture of tools, systems, and codes—making it a very complex process. And with this complexity, comes variables for failure. Get DZone’s new Guide to Performance to learn how to proactively find these variables and solve them before a disruption occurs.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question