Jetico PF 2 and ports 49152-65535

Discussion in 'other firewalls' started by Lexor, Feb 6, 2019.

  1. Lexor

    Lexor Registered Member

    Joined:
    Nov 26, 2017
    Posts:
    43
    Location:
    EU
    I use Windows 7 x64 with Jetico Personal Firewall 2. I have some question about ports 49152-65535.

    Quite big amount of different apps/games request inbound connect / outbound connect / send datagram to 127.0.0.1 over some port from 49152-65535 range. I've been using "my restricted rules" so far giving permissions only if app/game is requesting specific port but some apps/games are changing these ports on each start so it's a little annoying.

    I've also found this: https://support.microsoft.com/en-au...iew-and-network-port-requirements-for-windows
    Prior to Windows 7 I was using Windows XP with Kerio Personal Firewall and I've never heard about this "change".

    My question is: is it "a good idea" to set firewall rule to "allow inbound connect / outbound connect / send datagram to 127.0.0.1 over any port from 49152-65535 range" as a global one, which would mean: "for every app/game on my system, before any other rules"? I'm asking because if this is "safe thing to do" then why Jetico does not have it set by default?

    Does anyone still use Jetico 2 here? If yes then what is your personal "solution" for this "problem"? :)
     
    Last edited: Feb 6, 2019
  2. Sm3K3R

    Sm3K3R Registered Member

    Joined:
    Feb 29, 2008
    Posts:
    611
    Location:
    Wallachia
    You are complicating yourself.
    Make generic rules, create application tables or modify the existing ones, for example to accomplish generic rulesets,make them in the left panel, then you just link them when the network access connection request pops-up in relation to an app..
    Select a set of ports for receive /send datagram (UDP), outbound connect(TCP) , local and remote that you close with a block rule at the end.
    Make firstly generic ones like 1024-65535 local and remote for UDP, or add some other specific ports for TCP for destination ,then narrow the rules.

    Example for a simple game:
    Allow DNS -> accept local 1024-65535 to remote 53 receive /send datagram remote IP-s could be specified for IP-s , if the DNS default table is not used.
    Allow UDP-> accept local 1024-65535 to remote1024-65535 receive /send datagram
    Allow TCP-> accept local 1024-65535 to remote 1024-65535 , 80, 443 (or any other used/needed port by the game)outbound connect etc
    Protocol TCP/IP
    Block All the rest - > reject and log, to see whats being dropped.
    Yo can add here, before the block, an Allow ICMP rule, for BF4 for example, or you can allow send datagram to remote port 0 for the same purpose.

    Browser:
    Allow DNS -> accept local 1024-65535 to remote 53 receive /send datagram remote IP-s could be specified for IP-s
    Allow TCP-> accept local 1024-65535 to remote 80, 443 (or 8080 for proxy) outbound connect etc
    Protocol TCP/IP
    Block All the rest - > reject and log, to see whats being dropped.


    If the app works without a connection to a specific port leave it blocked.
    In this way you avoid filling pages of individual ports allowed.
    The more you play with the firewall the more tricks will discover to stop leaks and such and make it easier to handle.

    Hint : Another way of managing rulesets is under Groups-> Applications , under Network activity you will notice a Web browser rule for example that is before the rest and takes precedence, that will point to the application table in the left panel, where you should find by default a Web browser set.In this way you don t have to answer to a network activity interrogation if you ve already added an exe into those groups.
    Indirect access may create connectivity problems as most of the apps will use it and blocking one indirect will kill any other connection, so be careful if you use this one.
     
  3. Brummelchen

    Brummelchen Registered Member

    Joined:
    Jan 3, 2009
    Posts:
    5,940
    dynamic ports should NOT be blocked unless there exists a reason for SPECIAL programs to do so. if you want local restrictions then allow local (127.0.0.1:any) and deny the rest (2 rules)
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.