Solved

strange port communication

Posted on 2013-01-04
4
306 Views
Last Modified: 2013-01-22
Hi,
I have two computer communicating (one inside the network, the other on the outside the network).

The are both using strange port numbers that are not commonly used.  (Port 52497 for the external IP address and 9678 internally)

My question is
1. Shouldn't the firewall  be configured to prevent outgoing ports except for typical ports (80, 443, etc?)
2. Should the firewall be configured to only allow in commonly used ports (port 80, 443)?

Thanks.
0
Comment
Question by:NYGiantsFan
  • 2
4 Comments
 
LVL 4

Assisted Solution

by:brokenbyte
brokenbyte earned 125 total points
ID: 38744815
1. Most firewalls allow outgoing traffic through most ports, especially when the traffic is initiated internally as a request, which might then be sent out on a different port, depending on the service.

The default action for a firewall is to block all unsolicited traffic coming in to your network.

2. Even if you configure a firewall to allow say, port 80, 443, 3389, to come in as an example, the originating port could be a random port (such as 52497 in your case.) The important port is the *destination*. And that is the port that is the focus when setting up your firewall rules.
0
 
LVL 13

Assisted Solution

by:Ugo Mena
Ugo Mena earned 250 total points
ID: 38744852
Port 9678 is registered to EMC2 (Legato) Networker or Sun Solcitice Backup (Official) processes. Do you know if any of these backup services are supposed to be running to/from your network?

Depending on the type of firewall in your environment, most of the outgoing ports are going to be open to allow internal clients to connect to various external resources. Unless you are hosting a site/application/etc from your local network, almost all of the incoming ports to your network should be closed by the firewall to prevent incoming connections.

To get a better indication of who you are connecting to, you should check for the external IP address and then check it against whois
0
 
LVL 13

Accepted Solution

by:
Ugo Mena earned 250 total points
ID: 38744866
Could also be someone streaming Quicktime content.
0
 
LVL 57

Assisted Solution

by:giltjr
giltjr earned 125 total points
ID: 38745003
Some protocols also negotiate to use different ports.  Example: FTP.  

FTP has two connections, a command/control connection and a data connection.  

There are two types of data connections: active and passive.  If doing active FTP, the server initiates a outbound connection to the client from port 20 to a random high port.  When doing active the client tells the server what port it is listening on buy the FTP PORT/EPRT commands over the command/control connections.

 If doing passive the client initiates a connection to the server from a random high port to a random high port.   In this situation the server tells the client what port it will be listening on using the PASV/EPSV commands.

Most firewalls "listen" in on the command/control connection (typically port 21) for the PORT/EPRT/PASV/EPSV commands and dynamically create a rule to allow the data connection.   Once the transfer is done, based on the data connection being reset, the firewall dynamically removes this rule.

I believe there are other protocols/products that do this also.
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
I designed this idea while studying technology in the classroom.  This is a semester long project.  Students are asked to take photographs on a specific topic which they find meaningful, it can be a place or situation such as travel or homelessness.…
This is a video describing the growing solar energy use in Utah. This is a topic that greatly interests me and so I decided to produce a video about it.

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now