Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Filtered Ports

Posted on 2013-05-23
3
281 Views
Last Modified: 2013-06-06
On a security scan what is a filtered port?  If a port the host is listening on, should the port be closed?
0
Comment
Question by:Jack_son_
  • 2
3 Comments
 
LVL 24

Assisted Solution

by:aadih
aadih earned 500 total points
ID: 39191264
Definitions:

(1) Open Port:  If you send a SYN to an open port, you would expect to receive a
SYN/ACK.

(2) Closed Port: If you send a SYN to a closed port, it will respond back with a RST.

(3) Filtered Port: Presumably, the host is behind some sort of firewall.  Here, the
packet is simply dropped and you receive no response (not even a RST).

For a listening port (a little long) look here:

http://www.howtogeek.com/howto/28609/how-can-i-tell-what-is-listening-on-a-tcpip-port-in-windows/ >
0
 

Author Comment

by:Jack_son_
ID: 39191608
Great, thanks for the information.  Should filtered ports be investigated closer or are the open ports the primary risk?
0
 
LVL 24

Accepted Solution

by:
aadih earned 500 total points
ID: 39191626
Open ports.
0

Featured Post

Portable, direct connect server access

The ATEN CV211 connects a laptop directly to any server allowing you instant access to perform data maintenance and local operations, for quick troubleshooting, updating, service and repair.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Ms azure 2 35
IT usage Policies for a new staff joining the organisation. 4 112
eigrp - not allow a subnet from advertising 1 59
IPv6 and IPv4 Subnetting scheme 4 47
Read about achieving the basic levels of HRIS security in the workplace.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question