Solved

create Firebox port scan exception for Spiceworks server

Posted on 2012-03-28
6
1,040 Views
Last Modified: 2012-04-23
my firebox blocked my spiceworks server's IP because it did a port scan. How can I make an exception, or policy so the firebox won't block the SW host?
0
Comment
Question by:SonicVoom
  • 3
  • 3
6 Comments
 
LVL 22

Expert Comment

by:chakko
Comment Utility
I think you need to go into the firebox config and disable the blocking.  It should be in the unhandled port section I believe. There should be a checkbox for the automatically block the unhandled port access.  That's what I remember, I don't have access to see the actual setting location.  You can re-enable the feature/setting later.
0
 
LVL 22

Expert Comment

by:chakko
Comment Utility
0
 
LVL 2

Author Comment

by:SonicVoom
Comment Utility
I'm familiar with that setting, but I'd like to limit that exception to this one, trusted host. I'll keep looking through policy settings...
0
Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

 
LVL 22

Accepted Solution

by:
chakko earned 500 total points
Comment Utility
is spiceworks doing a port scan (lots and lots of ports) or is this the normal inventory type of scan?  I think you should be able to make a rule from IP to IP and ANY port (or the ports required by spiceworks) and that would prevent the unhandled packets feature from blocking.
0
 
LVL 2

Assisted Solution

by:SonicVoom
SonicVoom earned 0 total points
Comment Utility
I whitelisted the IP address.
0
 
LVL 2

Author Closing Comment

by:SonicVoom
Comment Utility
I did something a little bit different than what you suggested, but that was the same track.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Meet the world's only “Transparent Cloud™” from Superb Internet Corporation. Now, you can experience firsthand a cloud platform that consistently outperforms Amazon Web Services (AWS), IBM’s Softlayer, and Microsoft’s Azure when it comes to CPU and …
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now