Solved

How to check if port is open but bloked by firewall

Posted on 2012-12-27
5
1,321 Views
Last Modified: 2012-12-27
Hello Experts,

I have Solaris 10 SPARC running on my customer side. I have root account so that I can install any software. Last time I install monit which making port 2812 Listen and I can access locally. On my side I use VPN connection to customer server. When I try to check port 2812 is inaccessible even port in Listening. I realized that port may be blocked by some firewall. My object is to find some port that accessible. The question is how to check which port is allowed by firewall to access?

Thank you.
0
Comment
Question by:trazodone
  • 2
  • 2
5 Comments
 
LVL 68

Assisted Solution

by:woolmilkporc
woolmilkporc earned 300 total points
ID: 38725051
Try a simple port scanner like this one:

http://www.radmin.com/products/previousversions/portscanner.php
0
 

Author Comment

by:trazodone
ID: 38725215
Hi,

Port scanner will result in open port that already listen. It mean that I cannot config my application to use that port because it has already reserved by other application already, Am I correct? My point it to find port that is open,allowed access by firewall,and not reserves by any application.
0
 
LVL 68

Assisted Solution

by:woolmilkporc
woolmilkporc earned 300 total points
ID: 38725555
Normally, a firewall would block all ports except for those deliberately opened.
So why don't you just ask your or your customer's firewall admin(s) to open port 2812 for you?
0
 
LVL 82

Accepted Solution

by:
Dave Baldwin earned 200 total points
ID: 38725742
The only ports that are "open" are those that have a program listening to them.  If there is no listener, it is by definition, not open.
0
 

Author Closing Comment

by:trazodone
ID: 38726211
Thank you
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Join & Write a Comment

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now