Solved

Necessary Firewall Rules / Ports Required

Posted on 2014-10-06
2
273 Views
Last Modified: 2014-10-07
In our networking environment, we need to allow a few tailor make applications as well as several others Applications Utilities such as backup, database, security/anti-virus software etc.  All those applications located in different Zones in our networking environment separated by Firewalls.

We need to do a Security Auditing exercise very soon and can only open the  necessary ports that those application required. As some application requires many ports to be opened in order to be operational and some don't even have full documentation what TCP/UDP ports required.

My questions is what is the most efficient way to find out what is the required/necessary ports required to be opened on the firewall that separate each zones. I know I could use NETSTAT for each applications but is that a more efficient or systematic way to achieve this task.

Thank you so much for your kind advice in advance.

Patrick
0
Comment
Question by:patricktam
  • 2
2 Comments
 
LVL 54

Accepted Solution

by:
McKnife earned 500 total points
ID: 40365037
You can consult the firewall log file after setting it to log dropped packages.
C:\windows\system32\logfiles\firewall

Next, get an idea of what firewall exceptions look like by using the exception wizard.
0
 
LVL 54

Expert Comment

by:McKnife
ID: 40366141
If you need more info, give feedback. A "good" rating means the answer was not satisfactory.
0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
Read about achieving the basic levels of HRIS security in the workplace.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question