?
Solved

Ports to block security

Posted on 2015-02-18
9
Medium Priority
?
292 Views
Last Modified: 2015-03-26
hey guys,

i have a cloud server, and i'm looking for a list of essential ports to block to keep it safe. This wont be anything production so its not a big deal, but looking for a basic list.

Thanks
0
Comment
Question by:Cobra25
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 4
9 Comments
 
LVL 30

Expert Comment

by:serialband
ID: 40618243
What does your server do?  You're going about it backwards.  The standard practice is to block everything except the ports you want running.

If you're running  a web server, you'd leave port 80 and port 443 or just port 443 open.  You probably want to RDP to it, so you should open a port for RDP, although I suggest not using the standard port, unless you only allow certain known, fixed IPs through.
0
 
LVL 4

Author Comment

by:Cobra25
ID: 40618248
ok, im looking for standard ports to block please thats all.
0
 
LVL 30

Expert Comment

by:serialband
ID: 40618252
Block ports 137, 138, 139, and 445

It's still better to block everything and whitelist the ones you want.  It prevents random software from opening ports on you without your knowledge.
0
Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

 
LVL 4

Author Comment

by:Cobra25
ID: 40618263
thanks serial! what ports does SQL use? any other ports? are those all TCP or UDP?

Kind of doing an experiment here.
0
 
LVL 30

Expert Comment

by:serialband
ID: 40618315
They're a mix.

UDP on 138
TCP on 139
both on 137 & 445

SQL on 1433, and client ports are assigned a random value between 1024 and 5000.
0
 
LVL 4

Author Comment

by:Cobra25
ID: 40618316
I thought SQL used more than 1 port.

Client ports I'm not concerned with
0
 
LVL 4

Accepted Solution

by:
Monika Bharti earned 2000 total points
ID: 40618538
Hi,

You have to start from all these essential ports to block security.

Port 19 (Chargen)
Blocked Inbound
This port is blocked the incoming service to enter in campus network.

Port 123 (NTP)
Blocked unapproved Server from In
This port is connected with NTP (Network Time Protocol). Due to continuing security weaknesses, incoming networks are only acceptable to connect to support NTP servers of campus.
 
Ports 135, 137, 138, and 139 (TCP and UDP Microsoft NetBIOS)
Blocked In and Out both services
In file sharing and windows file for windows NT/ME/98/95, these ports are used including Exchange Server and MS Outlook clients.

Ports 161-162 (SNMP)
Blocked only In service
These ports are generally used by SNMP (Network Monitoring Protocol). Due to continuing (ongoing) security liabilities, these ports are allowed to exit and blocked to enter in the campus network.
 
Port 445 TCP and UDP
Blocked In and out both service
For file sharing of Windows XP/2000 & 2003 these ports are used.
 
Ports 41170 and 1434 (Denial of service file sharing)
Blocked Both in and out
These ports are used DOS service for file sharing.
0
 
LVL 30

Expert Comment

by:serialband
ID: 40618769
You're right.  I found the SQL port information from this site
https://msdn.microsoft.com/en-us/library/cc646023.aspx

UDP port 1434
TCP port 1433
TCP port 433
TCP port 4022
TCP port 135

@Monika If you're going to cut and paste full text someone else's information from what appears to be some college website, please at least link to it and quote it.  They deserve some credit.
0
 
LVL 4

Author Comment

by:Cobra25
ID: 40624463
Thanks guys!

Any others were missing?
0

Featured Post

Cyber Threats to Small Businesses (Part 2)

The evolving cybersecurity landscape presents SMBs with a host of new threats to their clients, their data, and their bottom line. In part 2 of this blog series, learn three quick processes Webroot’s CISO, Gary Hayslip, recommends to help small businesses beat modern threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
For anyone that has accidentally used newSID with Server 2008 R2 (like I did) and hasn't been able to get the server running again because you were unlucky (as I was) and had no backups - I was able to get things working by doing a Registry Hive rec…
This tutorial will show how to configure a new Backup Exec 2012 server and move an existing database to that server with the use of the BEUtility. Install Backup Exec 2012 on the new server and apply all of the latest hotfixes and service packs. The…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …

718 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question