Solved

Necessary Firewall Rules / Ports Required

Posted on 2014-10-06
2
279 Views
Last Modified: 2014-10-07
In our networking environment, we need to allow a few tailor make applications as well as several others Applications Utilities such as backup, database, security/anti-virus software etc.  All those applications located in different Zones in our networking environment separated by Firewalls.

We need to do a Security Auditing exercise very soon and can only open the  necessary ports that those application required. As some application requires many ports to be opened in order to be operational and some don't even have full documentation what TCP/UDP ports required.

My questions is what is the most efficient way to find out what is the required/necessary ports required to be opened on the firewall that separate each zones. I know I could use NETSTAT for each applications but is that a more efficient or systematic way to achieve this task.

Thank you so much for your kind advice in advance.

Patrick
0
Comment
Question by:patricktam
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 54

Accepted Solution

by:
McKnife earned 500 total points
ID: 40365037
You can consult the firewall log file after setting it to log dropped packages.
C:\windows\system32\logfiles\firewall

Next, get an idea of what firewall exceptions look like by using the exception wizard.
0
 
LVL 54

Expert Comment

by:McKnife
ID: 40366141
If you need more info, give feedback. A "good" rating means the answer was not satisfactory.
0

Featured Post

Guide to Performance: Optimization & Monitoring

Nowadays, monitoring is a mixture of tools, systems, and codes—making it a very complex process. And with this complexity, comes variables for failure. Get DZone’s new Guide to Performance to learn how to proactively find these variables and solve them before a disruption occurs.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question