Solved

Necessary Firewall Rules / Ports Required

Posted on 2014-10-06
2
278 Views
Last Modified: 2014-10-07
In our networking environment, we need to allow a few tailor make applications as well as several others Applications Utilities such as backup, database, security/anti-virus software etc.  All those applications located in different Zones in our networking environment separated by Firewalls.

We need to do a Security Auditing exercise very soon and can only open the  necessary ports that those application required. As some application requires many ports to be opened in order to be operational and some don't even have full documentation what TCP/UDP ports required.

My questions is what is the most efficient way to find out what is the required/necessary ports required to be opened on the firewall that separate each zones. I know I could use NETSTAT for each applications but is that a more efficient or systematic way to achieve this task.

Thank you so much for your kind advice in advance.

Patrick
0
Comment
Question by:patricktam
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 54

Accepted Solution

by:
McKnife earned 500 total points
ID: 40365037
You can consult the firewall log file after setting it to log dropped packages.
C:\windows\system32\logfiles\firewall

Next, get an idea of what firewall exceptions look like by using the exception wizard.
0
 
LVL 54

Expert Comment

by:McKnife
ID: 40366141
If you need more info, give feedback. A "good" rating means the answer was not satisfactory.
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There are some basic methods for preventing attacks on, hacking of and unauthorized access to a network -- maybe not completely, but up to a certain level. Start with a well-reputed firewall and unified threat management (UTM) system -- a gateway…
This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question