?
Solved

Firewall Settings - Please take a look at or rules and offer advice.

Posted on 2007-04-09
3
Medium Priority
?
191 Views
Last Modified: 2013-11-16
I'm helping a business setup their firewall rules and want feedback on what a typical set of outbound TCP ports to open.

I hoping that people could also take a look at this screen shot of our config and provide feedback. I will be turning off WAN Management once I have it all set. The ports 135, 1225, and 443 are for our Hosted Exchange Solution. Do I need #3 for file sharing? Not sure if I need #9 DNS.

How do I upload the screenshot?
0
Comment
Question by:Ryman1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 57

Accepted Solution

by:
Pete Long earned 750 total points
ID: 18880778
>>How do I upload the screenshot?

You cant! -  click my username > get my email addy > email it to me > And Ill post it online for the other experts to see :)
0
 

Author Comment

by:Ryman1
ID: 18883153
Okay, just emailed it to you.
0
 
LVL 57

Expert Comment

by:Pete Long
ID: 18883278
Ah thanks for the prod :)

http://217.22.146.106/temp/firewall.jpg


There you go
0

Featured Post

VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
I found an issue or “bug” in the SonicOS platform (the firmware controlling SonicWALL security appliances) that has to do with renaming Default Service Objects, which then causes a portion of the system to become uncontrollable and unstable. BACK…
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question