Solved

strange port communication

Posted on 2013-01-04
4
315 Views
Last Modified: 2013-01-22
Hi,
I have two computer communicating (one inside the network, the other on the outside the network).

The are both using strange port numbers that are not commonly used.  (Port 52497 for the external IP address and 9678 internally)

My question is
1. Shouldn't the firewall  be configured to prevent outgoing ports except for typical ports (80, 443, etc?)
2. Should the firewall be configured to only allow in commonly used ports (port 80, 443)?

Thanks.
0
Comment
Question by:NYGiantsFan
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 4

Assisted Solution

by:brokenbyte
brokenbyte earned 125 total points
ID: 38744815
1. Most firewalls allow outgoing traffic through most ports, especially when the traffic is initiated internally as a request, which might then be sent out on a different port, depending on the service.

The default action for a firewall is to block all unsolicited traffic coming in to your network.

2. Even if you configure a firewall to allow say, port 80, 443, 3389, to come in as an example, the originating port could be a random port (such as 52497 in your case.) The important port is the *destination*. And that is the port that is the focus when setting up your firewall rules.
0
 
LVL 13

Assisted Solution

by:Ugo Mena
Ugo Mena earned 250 total points
ID: 38744852
Port 9678 is registered to EMC2 (Legato) Networker or Sun Solcitice Backup (Official) processes. Do you know if any of these backup services are supposed to be running to/from your network?

Depending on the type of firewall in your environment, most of the outgoing ports are going to be open to allow internal clients to connect to various external resources. Unless you are hosting a site/application/etc from your local network, almost all of the incoming ports to your network should be closed by the firewall to prevent incoming connections.

To get a better indication of who you are connecting to, you should check for the external IP address and then check it against whois
0
 
LVL 13

Accepted Solution

by:
Ugo Mena earned 250 total points
ID: 38744866
Could also be someone streaming Quicktime content.
0
 
LVL 57

Assisted Solution

by:giltjr
giltjr earned 125 total points
ID: 38745003
Some protocols also negotiate to use different ports.  Example: FTP.  

FTP has two connections, a command/control connection and a data connection.  

There are two types of data connections: active and passive.  If doing active FTP, the server initiates a outbound connection to the client from port 20 to a random high port.  When doing active the client tells the server what port it is listening on buy the FTP PORT/EPRT commands over the command/control connections.

 If doing passive the client initiates a connection to the server from a random high port to a random high port.   In this situation the server tells the client what port it will be listening on using the PASV/EPSV commands.

Most firewalls "listen" in on the command/control connection (typically port 21) for the PORT/EPRT/PASV/EPSV commands and dynamically create a rule to allow the data connection.   Once the transfer is done, based on the data connection being reset, the firewall dynamically removes this rule.

I believe there are other protocols/products that do this also.
0

Featured Post

Building an interactive eFuture classroom

Watch and learn how ATEN provided a total control system solution including seamless switching matrix switch, HDBaseT extenders, PDU, lighting control to build an interactive eFuture classroom.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
new to networking configuration 6 77
Sonicwall TZ 205- Dropping Incoming E-mail as IP Spoof 13 243
SSH over http/https 8 168
What to look for in Fraud Protection Solutions  PoC 1 96
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

759 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question