What protocols do I need to allow through my ISA firewall to allow users to install network printers?

Posted on 2006-11-14
Last Modified: 2013-11-16
I am hoping someone can assist me.  I have looked seemingly everywhere for this answer to no avail.  What protocol(s) do I need to allow through my ISA firewall to allow users to install network printers?  I have the following protocols allowed:

 Protocol = Port Range = Protocol Type

FTP = 21  = TCP
HTTP = 80  = TCP
HTTPS = 443  = TCP
IMAP4 = 143  = TCP
IMAPS = 993  = TCP
MMS = 1755  = TCP / UDP
PNM = 7070  = TCP
POP3 = 110  = TCP
RAW = 9100  = TCP
RTSP = 554  = TCP
SMTP = 25  = TCP

Am I missing a protocol that would deny a user to install a network printer(i.e. JetDirect card) through the ISA firewall?  If so, what protocol should be added to allow this?  Thanks.

Question by:dgriffit55
  • 3
  • 3
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17940566
none of those apply to network devices such as printers; this would be covered under RPC calls. Can you clarify why you would need ISA involved in this at all, are the users on the Internet or external to you somewhere?
LVL 51

Expert Comment

by:Keith Alabaster
ID: 17940598
Actually, the one exception would be if you are using the HP Jetadmin which can operate over port 9100 (TCP). Is this traffic outbound from the internal network or coming in from the Internet?

Author Comment

ID: 17949212
I have an ISA firewall which seperates my wireless from my LAN.  I do this to keep rogue laptops from just jumping onto my network with proper authentication.  I know it is a protocol issue, because when I test the pass through policy it works just fine.  So, something in my limited access policy is blocking the protocol/port needed.  I am looking for the protocol/port required to allow authenticated wirless users to install HP networked printers to their laptops.  I hope this makes sense, if not please let me know.  Thanks.

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.


Author Comment

ID: 17949225
correction:  I do this to keep rogue laptops from jumping onto my network without proper authentication.

Author Comment

ID: 18054809
Nevermind, our ISA guru figured it out.  He had to make publish something to allow the VPN client ablity to install printers.  It never was a blocked port issue.  Thanks for all the help though.

LVL 51

Expert Comment

by:Keith Alabaster
ID: 18055835
hehehe, you didn't mention a VPN :) but well done anyway.


Accepted Solution

Computer101 earned 0 total points
ID: 18256688
PAQed with points refunded (250)

EE Admin

Featured Post

Live: Real-Time Solutions, Start Here

Receive instant 1:1 support from technology experts, using our real-time conversation and whiteboard interface. Your first 5 minutes are always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Active & Standby with dual ISP scenario 4 103
IP Phones with SonicWall 6 76
Network Activities  please help 16 76
suspending the anti virus 6 122
If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…

816 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now