Solved

How to check if port is open but bloked by firewall

Posted on 2012-12-27
5
1,338 Views
Last Modified: 2012-12-27
Hello Experts,

I have Solaris 10 SPARC running on my customer side. I have root account so that I can install any software. Last time I install monit which making port 2812 Listen and I can access locally. On my side I use VPN connection to customer server. When I try to check port 2812 is inaccessible even port in Listening. I realized that port may be blocked by some firewall. My object is to find some port that accessible. The question is how to check which port is allowed by firewall to access?

Thank you.
0
Comment
Question by:trazodone
  • 2
  • 2
5 Comments
 
LVL 68

Assisted Solution

by:woolmilkporc
woolmilkporc earned 300 total points
ID: 38725051
Try a simple port scanner like this one:

http://www.radmin.com/products/previousversions/portscanner.php
0
 

Author Comment

by:trazodone
ID: 38725215
Hi,

Port scanner will result in open port that already listen. It mean that I cannot config my application to use that port because it has already reserved by other application already, Am I correct? My point it to find port that is open,allowed access by firewall,and not reserves by any application.
0
 
LVL 68

Assisted Solution

by:woolmilkporc
woolmilkporc earned 300 total points
ID: 38725555
Normally, a firewall would block all ports except for those deliberately opened.
So why don't you just ask your or your customer's firewall admin(s) to open port 2812 for you?
0
 
LVL 83

Accepted Solution

by:
Dave Baldwin earned 200 total points
ID: 38725742
The only ports that are "open" are those that have a program listening to them.  If there is no listener, it is by definition, not open.
0
 

Author Closing Comment

by:trazodone
ID: 38726211
Thank you
0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
DDOS information about ip's, gateways and how it works 2 139
Restrict RDP Remote Access through SonicWall 3 111
Intrusion detection 20 74
Firewall report connections 8 69
Why Shell Scripting? Shell scripting is a powerful method of accessing UNIX systems and it is very flexible. Shell scripts are required when we want to execute a sequence of commands in Unix flavored operating systems. “Shell” is the command line i…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

816 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now