block ports permanently

Discussion in 'other firewalls' started by ajap, Aug 23, 2009.

Thread Status:
Not open for further replies.
  1. acuariano

    acuariano Registered Member

    Joined:
    Nov 4, 2005
    Posts:
    786
    can't find what you say about Blackspear ,,was googling..but
     
  2. acuariano

    acuariano Registered Member

    Joined:
    Nov 4, 2005
    Posts:
    786
    btw i'm behind a router firewall and at dslreports westell-forum i was given a good set of rules..i ran a test in shields-up testing all ports..and i pass the test

    should i run seconfig xp...after running this app.i see i have some tcp and udp ports open and some services enabled...
    generally i closed some services from other site's list..
     
  3. andyman35

    andyman35 Registered Member

    Joined:
    Nov 2, 2007
    Posts:
    2,336
  4. Joeythedude

    Joeythedude Registered Member

    Joined:
    Apr 19, 2007
    Posts:
    519
  5. Seer

    Seer Registered Member

    Joined:
    Feb 12, 2007
    Posts:
    2,068
    Location:
    Serbia
    ajap,

    no need to be confused. To simplify as much as possible, these are, in summary, all the blocking rules you should have for your specific coniguration -

    Tcp Outgoing Any Any Any 23
    Tcp Outgoing Any Any Any 445
    Udp Outgoing Any 137-138 Any Any
    Tcp Outgoing Any Any Any 139
    Udp Outgoing Any Any Any 1900
    Tcp Outgoing Any Any Any 5000
    Tcp Outgoing Any 135 Any Any

    The rest of the blocking rules should be deleted. This is my opinion.
    End of story.

    Cheers,
     
  6. ajap

    ajap Registered Member

    Joined:
    Aug 9, 2009
    Posts:
    42
    hi seer, that is what i really wanted.
    I deeply appreciate the help you have gave me
    for the rest who gave me suggestions too , thank for all
    end of the story and end of the post. you can close it.
     
  7. Searching_ _ _

    Searching_ _ _ Registered Member

    Joined:
    Jan 2, 2008
    Posts:
    1,988
    Location:
    iAnywhere
    I was just answering the above question.
    There was another site/paper I wanted to reference but couldn't locate. From the atackers perspective going through each step, starting with nmap progressing through the firewall or IDS. Would've been useful to the OP to see the anatomy of an attack. This was my next available via google.

    I have a firewall in my router, I block everything except DNS, HTTP, HTTPS and whatever else I choose to allow as needed.
     
    Last edited: Aug 31, 2009
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.