Solved

Necessary Firewall Rules / Ports Required

Posted on 2014-10-06
2
268 Views
Last Modified: 2014-10-07
In our networking environment, we need to allow a few tailor make applications as well as several others Applications Utilities such as backup, database, security/anti-virus software etc.  All those applications located in different Zones in our networking environment separated by Firewalls.

We need to do a Security Auditing exercise very soon and can only open the  necessary ports that those application required. As some application requires many ports to be opened in order to be operational and some don't even have full documentation what TCP/UDP ports required.

My questions is what is the most efficient way to find out what is the required/necessary ports required to be opened on the firewall that separate each zones. I know I could use NETSTAT for each applications but is that a more efficient or systematic way to achieve this task.

Thank you so much for your kind advice in advance.

Patrick
0
Comment
Question by:patricktam
  • 2
2 Comments
 
LVL 53

Accepted Solution

by:
McKnife earned 500 total points
ID: 40365037
You can consult the firewall log file after setting it to log dropped packages.
C:\windows\system32\logfiles\firewall

Next, get an idea of what firewall exceptions look like by using the exception wizard.
0
 
LVL 53

Expert Comment

by:McKnife
ID: 40366141
If you need more info, give feedback. A "good" rating means the answer was not satisfactory.
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Port forwarding 14 116
Sonicwall Possible port scan dropped 5 42
Stand Alone IT Service Provison 2 46
IP Address -- lookup location ? 4 67
Imagine you have a shopping list of items you need to get at the grocery store. You have two options: A. Take one trip to the grocery store and get everything you need for the week, or B. Take multiple trips, buying an item at a time, to achieve t…
In every aspect, security is essential for your business, and for that matter you need to always keep an eye on it. The same can be said about your computer network system too. Your computer network is prone to various malware and security threats t…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

24 Experts available now in Live!

Get 1:1 Help Now