Solved

Necessary Firewall Rules / Ports Required

Posted on 2014-10-06
2
275 Views
Last Modified: 2014-10-07
In our networking environment, we need to allow a few tailor make applications as well as several others Applications Utilities such as backup, database, security/anti-virus software etc.  All those applications located in different Zones in our networking environment separated by Firewalls.

We need to do a Security Auditing exercise very soon and can only open the  necessary ports that those application required. As some application requires many ports to be opened in order to be operational and some don't even have full documentation what TCP/UDP ports required.

My questions is what is the most efficient way to find out what is the required/necessary ports required to be opened on the firewall that separate each zones. I know I could use NETSTAT for each applications but is that a more efficient or systematic way to achieve this task.

Thank you so much for your kind advice in advance.

Patrick
0
Comment
Question by:patricktam
  • 2
2 Comments
 
LVL 54

Accepted Solution

by:
McKnife earned 500 total points
ID: 40365037
You can consult the firewall log file after setting it to log dropped packages.
C:\windows\system32\logfiles\firewall

Next, get an idea of what firewall exceptions look like by using the exception wizard.
0
 
LVL 54

Expert Comment

by:McKnife
ID: 40366141
If you need more info, give feedback. A "good" rating means the answer was not satisfactory.
0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question