Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

What protocols do I need to allow through my ISA firewall to allow users to install network printers?

Posted on 2006-11-14
8
Medium Priority
?
446 Views
Last Modified: 2013-11-16
Hi,
I am hoping someone can assist me.  I have looked seemingly everywhere for this answer to no avail.  What protocol(s) do I need to allow through my ISA firewall to allow users to install network printers?  I have the following protocols allowed:

 Protocol = Port Range = Protocol Type

FTP = 21  = TCP
HTTP = 80  = TCP
HTTPS = 443  = TCP
IMAP4 = 143  = TCP
IMAPS = 993  = TCP
MMS = 1755  = TCP / UDP
PNM = 7070  = TCP
POP3 = 110  = TCP
RAW = 9100  = TCP
RTSP = 554  = TCP
SMTP = 25  = TCP

Am I missing a protocol that would deny a user to install a network printer(i.e. JetDirect card) through the ISA firewall?  If so, what protocol should be added to allow this?  Thanks.

Bob
0
Comment
Question by:dgriffit55
  • 3
  • 3
7 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17940566
none of those apply to network devices such as printers; this would be covered under RPC calls. Can you clarify why you would need ISA involved in this at all, are the users on the Internet or external to you somewhere?
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17940598
Actually, the one exception would be if you are using the HP Jetadmin which can operate over port 9100 (TCP). Is this traffic outbound from the internal network or coming in from the Internet?
0
 

Author Comment

by:dgriffit55
ID: 17949212
I have an ISA firewall which seperates my wireless from my LAN.  I do this to keep rogue laptops from just jumping onto my network with proper authentication.  I know it is a protocol issue, because when I test the pass through policy it works just fine.  So, something in my limited access policy is blocking the protocol/port needed.  I am looking for the protocol/port required to allow authenticated wirless users to install HP networked printers to their laptops.  I hope this makes sense, if not please let me know.  Thanks.

Bob
0
When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

 

Author Comment

by:dgriffit55
ID: 17949225
correction:  I do this to keep rogue laptops from jumping onto my network without proper authentication.
0
 

Author Comment

by:dgriffit55
ID: 18054809
Nevermind, our ISA guru figured it out.  He had to make publish something to allow the VPN client ablity to install printers.  It never was a blocked port issue.  Thanks for all the help though.

Bob
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 18055835
hehehe, you didn't mention a VPN :) but well done anyway.

Regards
keith
0
 
LVL 1

Accepted Solution

by:
Computer101 earned 0 total points
ID: 18256688
PAQed with points refunded (250)

Computer101
EE Admin
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
Want to learn how to record your desktop screen without having to use an outside camera. Click on this video and learn how to use the cool google extension called "Screencastify"! Step 1: Open a new google tab Step 2: Go to the left hand upper corn…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

877 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question