Solved

How to check if port is open but bloked by firewall

Posted on 2012-12-27
5
1,414 Views
Last Modified: 2012-12-27
Hello Experts,

I have Solaris 10 SPARC running on my customer side. I have root account so that I can install any software. Last time I install monit which making port 2812 Listen and I can access locally. On my side I use VPN connection to customer server. When I try to check port 2812 is inaccessible even port in Listening. I realized that port may be blocked by some firewall. My object is to find some port that accessible. The question is how to check which port is allowed by firewall to access?

Thank you.
0
Comment
Question by:trazodone
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 68

Assisted Solution

by:woolmilkporc
woolmilkporc earned 300 total points
ID: 38725051
Try a simple port scanner like this one:

http://www.radmin.com/products/previousversions/portscanner.php
0
 

Author Comment

by:trazodone
ID: 38725215
Hi,

Port scanner will result in open port that already listen. It mean that I cannot config my application to use that port because it has already reserved by other application already, Am I correct? My point it to find port that is open,allowed access by firewall,and not reserves by any application.
0
 
LVL 68

Assisted Solution

by:woolmilkporc
woolmilkporc earned 300 total points
ID: 38725555
Normally, a firewall would block all ports except for those deliberately opened.
So why don't you just ask your or your customer's firewall admin(s) to open port 2812 for you?
0
 
LVL 83

Accepted Solution

by:
Dave Baldwin earned 200 total points
ID: 38725742
The only ports that are "open" are those that have a program listening to them.  If there is no listener, it is by definition, not open.
0
 

Author Closing Comment

by:trazodone
ID: 38726211
Thank you
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question