Solved

Basic Firewall Security Recommendations

Posted on 2011-03-03
2
342 Views
Last Modified: 2012-05-11
I need to tighten up my networks firewall policies.  I was hoping someone could post the recommended ports that need opened for a secure SMB.

I have only 4 ports I can think of that I would absolutely need to have open.  The internet (HTTP and HTTPS) and Exchange 2010 (Incoming and Outgoing SMTP SSL)

I'm sure there are allot more ports I'd like to use, such as Remote Desktop, VPN, POP3, Windows Update and ActiveSync.

Does anyone have a preconfigured list of ports to open for the average small business?
0
Comment
Question by:ND02G
2 Comments
 
LVL 38

Assisted Solution

by:Aaron Tomosky
Aaron Tomosky earned 100 total points
ID: 35033706
Start with everything locked. Open only what you need when you need it.
0
 
LVL 42

Accepted Solution

by:
kevinhsieh earned 400 total points
ID: 35034272
You will need to be able to make DNS queries to the Internet. (UDP and TCP 53 outbound). NTP to get time (UDP/53 outbound). Windows Update is http/https outbound. ActiveSync for mobile devices is 443 inbound, and you probably also want 443 inbound for OWA. ICMP echo outbound is nice, as is ICMP echo-reply inbound so you can ping.

You may or may not need to be able to FTP outbound.
0

Featured Post

Does Powershell have you tied up in knots?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Marketers need statistics and metrics like everybody else needs oxygen. In this article we explain how to enable marketing campaign statistics for Microsoft Exchange mail.
A procedure for exporting installed hotfix details of remote computers using powershell
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question