Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Filtered Ports

Posted on 2013-05-23
3
Medium Priority
?
298 Views
Last Modified: 2013-06-06
On a security scan what is a filtered port?  If a port the host is listening on, should the port be closed?
0
Comment
Question by:Jack_son_
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 24

Assisted Solution

by:aadih
aadih earned 2000 total points
ID: 39191264
Definitions:

(1) Open Port:  If you send a SYN to an open port, you would expect to receive a
SYN/ACK.

(2) Closed Port: If you send a SYN to a closed port, it will respond back with a RST.

(3) Filtered Port: Presumably, the host is behind some sort of firewall.  Here, the
packet is simply dropped and you receive no response (not even a RST).

For a listening port (a little long) look here:

http://www.howtogeek.com/howto/28609/how-can-i-tell-what-is-listening-on-a-tcpip-port-in-windows/ >
0
 

Author Comment

by:Jack_son_
ID: 39191608
Great, thanks for the information.  Should filtered ports be investigated closer or are the open ports the primary risk?
0
 
LVL 24

Accepted Solution

by:
aadih earned 2000 total points
ID: 39191626
Open ports.
0

Featured Post

Learn Veeam advantages over legacy backup

Every day, more and more legacy backup customers switch to Veeam. Technologies designed for the client-server era cannot restore any IT service running in the hybrid cloud within seconds. Learn top Veeam advantages over legacy backup and get Veeam for the price of your renewal

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this blog we highlight approaches to managed security as a service.  We also look into ConnectWise’s value in aiding MSPs’ security management and indicate why critical alerting is a necessary integration.
What monsters are hiding in your child's room? In this article I will share with you a tech horror story that could happen to anyone, along with some tips on how you can prevent it from happening to you.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Suggested Courses

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question