What protocols do I need to allow through my ISA firewall to allow users to install network printers?

Posted on 2006-11-14
Last Modified: 2013-11-16
I am hoping someone can assist me.  I have looked seemingly everywhere for this answer to no avail.  What protocol(s) do I need to allow through my ISA firewall to allow users to install network printers?  I have the following protocols allowed:

 Protocol = Port Range = Protocol Type

FTP = 21  = TCP
HTTP = 80  = TCP
HTTPS = 443  = TCP
IMAP4 = 143  = TCP
IMAPS = 993  = TCP
MMS = 1755  = TCP / UDP
PNM = 7070  = TCP
POP3 = 110  = TCP
RAW = 9100  = TCP
RTSP = 554  = TCP
SMTP = 25  = TCP

Am I missing a protocol that would deny a user to install a network printer(i.e. JetDirect card) through the ISA firewall?  If so, what protocol should be added to allow this?  Thanks.

Question by:dgriffit55
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17940566
none of those apply to network devices such as printers; this would be covered under RPC calls. Can you clarify why you would need ISA involved in this at all, are the users on the Internet or external to you somewhere?
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17940598
Actually, the one exception would be if you are using the HP Jetadmin which can operate over port 9100 (TCP). Is this traffic outbound from the internal network or coming in from the Internet?

Author Comment

ID: 17949212
I have an ISA firewall which seperates my wireless from my LAN.  I do this to keep rogue laptops from just jumping onto my network with proper authentication.  I know it is a protocol issue, because when I test the pass through policy it works just fine.  So, something in my limited access policy is blocking the protocol/port needed.  I am looking for the protocol/port required to allow authenticated wirless users to install HP networked printers to their laptops.  I hope this makes sense, if not please let me know.  Thanks.

What, When and Where - Security Threats from Q1

Join Corey Nachreiner, CTO, and Marc Laliberte, Information Security Threat Analyst, on July 26th as they explore their key findings from the first quarter of 2017.


Author Comment

ID: 17949225
correction:  I do this to keep rogue laptops from jumping onto my network without proper authentication.

Author Comment

ID: 18054809
Nevermind, our ISA guru figured it out.  He had to make publish something to allow the VPN client ablity to install printers.  It never was a blocked port issue.  Thanks for all the help though.

LVL 51

Expert Comment

by:Keith Alabaster
ID: 18055835
hehehe, you didn't mention a VPN :) but well done anyway.


Accepted Solution

Computer101 earned 0 total points
ID: 18256688
PAQed with points refunded (250)

EE Admin

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…
Suggested Courses

626 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question