Solved

What protocols do I need to allow through my ISA firewall to allow users to install network printers?

Posted on 2006-11-14
8
391 Views
Last Modified: 2013-11-16
Hi,
I am hoping someone can assist me.  I have looked seemingly everywhere for this answer to no avail.  What protocol(s) do I need to allow through my ISA firewall to allow users to install network printers?  I have the following protocols allowed:

 Protocol = Port Range = Protocol Type

FTP = 21  = TCP
HTTP = 80  = TCP
HTTPS = 443  = TCP
IMAP4 = 143  = TCP
IMAPS = 993  = TCP
MMS = 1755  = TCP / UDP
PNM = 7070  = TCP
POP3 = 110  = TCP
RAW = 9100  = TCP
RTSP = 554  = TCP
SMTP = 25  = TCP

Am I missing a protocol that would deny a user to install a network printer(i.e. JetDirect card) through the ISA firewall?  If so, what protocol should be added to allow this?  Thanks.

Bob
0
Comment
Question by:dgriffit55
  • 3
  • 3
8 Comments
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17940566
none of those apply to network devices such as printers; this would be covered under RPC calls. Can you clarify why you would need ISA involved in this at all, are the users on the Internet or external to you somewhere?
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17940598
Actually, the one exception would be if you are using the HP Jetadmin which can operate over port 9100 (TCP). Is this traffic outbound from the internal network or coming in from the Internet?
0
 

Author Comment

by:dgriffit55
ID: 17949212
I have an ISA firewall which seperates my wireless from my LAN.  I do this to keep rogue laptops from just jumping onto my network with proper authentication.  I know it is a protocol issue, because when I test the pass through policy it works just fine.  So, something in my limited access policy is blocking the protocol/port needed.  I am looking for the protocol/port required to allow authenticated wirless users to install HP networked printers to their laptops.  I hope this makes sense, if not please let me know.  Thanks.

Bob
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 

Author Comment

by:dgriffit55
ID: 17949225
correction:  I do this to keep rogue laptops from jumping onto my network without proper authentication.
0
 

Author Comment

by:dgriffit55
ID: 18054809
Nevermind, our ISA guru figured it out.  He had to make publish something to allow the VPN client ablity to install printers.  It never was a blocked port issue.  Thanks for all the help though.

Bob
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 18055835
hehehe, you didn't mention a VPN :) but well done anyway.

Regards
keith
0
 
LVL 1

Accepted Solution

by:
Computer101 earned 0 total points
ID: 18256688
PAQed with points refunded (250)

Computer101
EE Admin
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Create Sample Internet Traffic 1 78
centos kvm host, routing sip/udp to vm - iptables 15 67
Firewall Settings Alert Possible TCP Flood on IF X2 5 444
Firewall blocking images 4 36
Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
Windows 10 is mostly good. However the one thing that annoys me is how many clicks you have to do to dial a VPN connection. You have to go to settings from the start menu, (2 clicks), Network and Internet (1 click), Click VPN (another click) then fi…
Many functions in Excel can make decisions. The most simple of these is the IF function: it returns a value depending on whether a condition you describe is true or false. Once you get the hang of using the IF function, you will find it easier to us…

912 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now