Solved

NetBIOS traffic (internal) Firewall rules

Posted on 2006-07-20
7
404 Views
Last Modified: 2013-11-16
I've looked up the NetBIOS ports and what is used.  I've read through the RFC's, but I haven't been able to determine directionality.  Here is the general idea for what I am looking for.  If someone can provide all minimal firewall rules necessary for NetBIOS traffic to function, it would be greatly appreciated.  I am looking for traffic between workstation and server.

Thanks

Awakenings

0
Comment
Question by:awakenings
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 2
7 Comments
 
LVL 32

Accepted Solution

by:
rsivanandan earned 350 total points
ID: 17146123
Most Part;

Port 135, 137-139 and 445 (Both UDP and TCP)

Allow them and should be okay.

Cheers,
Rajesh
0
 

Author Comment

by:awakenings
ID: 17146244
Rajesh,

     But do I need them bidirectionally?  Can I minumize them for only outbound from workstation to server?  The ports are listed in ARIN and I can see the information you just provided.  I am looking for the minimum requirement between workstation and server.  What I am looking for is this;

Workstation tcp 135 outbound serever
Workstation udp 135 bidirectional server
Workstation tcp 137 outbound server.
etc.


    If you can provide this, it would be greatly appreciated.


Awakenings
0
 
LVL 32

Assisted Solution

by:rsivanandan
rsivanandan earned 350 total points
ID: 17146399
Except for 135 (Wins I believe), all should be enabled towards the server.

Cheers,
Rajesh
0
Revamp Your Training Process

Drastically shorten your training time with WalkMe's advanced online training solution that Guides your trainees to action.

 
LVL 7

Assisted Solution

by:nttranbao
nttranbao earned 150 total points
ID: 17146648
Reference about the NETBIOS port security

http://www.nacs.uci.edu/security/netbios.html#what
0
 
LVL 32

Expert Comment

by:rsivanandan
ID: 17223459
thnx for the points, I hope you got the situation under control ?

Cheers,
Rajesh
0
 

Author Comment

by:awakenings
ID: 17223707
Rajesh,

    Yes.  It took alot of research and analysis of existing rules to determine how things are supposed to be set up.

Awakenings
0
 
LVL 32

Expert Comment

by:rsivanandan
ID: 17223776
Ok. cool. One time job, pays off for future too :-)

Cheers,
Rajesh
0

Featured Post

MIM Survival Guide for Service Desk Managers

Major incidents can send mastered service desk processes into disorder. Systems and tools produce the data needed to resolve these incidents, but your challenge is getting that information to the right people fast. Check out the Survival Guide and begin bringing order to chaos.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Comware OS Simulator and GNS3 5 171
Cisco router external connection issues. 6 34
Networking Monitoring Tools 10 72
How to change subnet mask for Fortigate WAN interface 2 40
Let’s list some of the technologies that enable smooth teleworking. 
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question