ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Firewalls & Restricting Outbound Traffic

    IT Discussion
    8
    92
    7.4k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • scottalanmillerS
      scottalanmiller @Dashrender
      last edited by

      @Dashrender said in Firewalls & Restricting Outbound Traffic:

      @anthonyh said in Firewalls & Restricting Outbound Traffic:

      @scottalanmiller said in Firewalls & Restricting Outbound Traffic:

      @anthonyh said in Firewalls & Restricting Outbound Traffic:

      Or..should I trust the UTM features of the firewall(s) and not worry about it?

      Or neither, Just turn them off πŸ™‚

      But I thought "NGFW's" were the thing now? I upgrade and then disable all the fancy UTM features? I'm hoping they do more good than harm. lol

      This is why the recommendation around ML is to NOT buy a UTM. But a firewall that does firewall stuff, and buy a filter that does filtering stuff, if you really need it.

      Most of hte time. There ARE exceptions, of course, but not with gear like Fortinet. On the rare case that you want a UTM, you want a serious one like Palo Alto or maybe Sophos.

      dafyreD 1 Reply Last reply Reply Quote 1
      • dafyreD
        dafyre @scottalanmiller
        last edited by

        @scottalanmiller said in Firewalls & Restricting Outbound Traffic:

        @Dashrender said in Firewalls & Restricting Outbound Traffic:

        @anthonyh said in Firewalls & Restricting Outbound Traffic:

        @scottalanmiller said in Firewalls & Restricting Outbound Traffic:

        @anthonyh said in Firewalls & Restricting Outbound Traffic:

        Or..should I trust the UTM features of the firewall(s) and not worry about it?

        Or neither, Just turn them off πŸ™‚

        But I thought "NGFW's" were the thing now? I upgrade and then disable all the fancy UTM features? I'm hoping they do more good than harm. lol

        This is why the recommendation around ML is to NOT buy a UTM. But a firewall that does firewall stuff, and buy a filter that does filtering stuff, if you really need it.

        Most of hte time. There ARE exceptions, of course, but not with gear like Fortinet. On the rare case that you want a UTM, you want a serious one like Palo Alto or maybe Sophos.

        The networking guys here like the Palo Altos!

        1 Reply Last reply Reply Quote 1
        • scottalanmillerS
          scottalanmiller @EddieJennings
          last edited by

          @EddieJennings said in Firewalls & Restricting Outbound Traffic:

          @scottalanmiller said in Firewalls & Restricting Outbound Traffic:

          @EddieJennings said in Firewalls & Restricting Outbound Traffic:

          @scottalanmiller said in Firewalls & Restricting Outbound Traffic:

          @anthonyh said in Firewalls & Restricting Outbound Traffic:

          @EddieJennings Yeah. I'm thinking the common ports for mail will be included in our "base set" of what's allowed out. SMTP(S), IMAP(S), POP3(S)...whatever is required for clients to send/receive messages. Our mail server is in the DMZ and I've already got that squared away between the various zones, so this would simply be for non-organization email access.

          Normally you specifically block those, not allow them. Why do you need outbound email protocol(s) or ports from your clients?

          Perhaps I'm just having a brain fart. Let's say you send an E-mail from your mail client. Mail client connects to a mail server (for this case, assume it's not Exchange). Let's say this server is off site. Does this client not use SMTP to talk to this server, which would mean, your firewall would need to allow outbound SMTP traffic?

          Yes, that would use SMTP in many cases. That's if you are using a general case client (Thunderbird, Geary, etc.) and if you are using an email host that uses the normal ports for internal traffic. Major mail systems typically use HTTPS, ActiveSync, a web page or custom ports for that. There are exceptions, but of business class systems, it's pretty much unheard of to use port 25 internally.

          Yeah, I was assuming the client used 25/587 to connect rather than ActiveSync, etc. I just wanted to make sure I didn't have a flawed understanding of basic networking :P. End result is allow outbound traffic for whatever port your mail client uses.

          There are cases for that, but they are pretty rare or are options. We use Zimbra for email and it uses those ports with third party fat clients, but it is not needed for the native client or the native fat client.

          1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller
            last edited by

            @dafyre said in Firewalls & Restricting Outbound Traffic:

            @scottalanmiller said in Firewalls & Restricting Outbound Traffic:

            @Dashrender said in Firewalls & Restricting Outbound Traffic:

            @anthonyh said in Firewalls & Restricting Outbound Traffic:

            @scottalanmiller said in Firewalls & Restricting Outbound Traffic:

            @anthonyh said in Firewalls & Restricting Outbound Traffic:

            Or..should I trust the UTM features of the firewall(s) and not worry about it?

            Or neither, Just turn them off πŸ™‚

            But I thought "NGFW's" were the thing now? I upgrade and then disable all the fancy UTM features? I'm hoping they do more good than harm. lol

            This is why the recommendation around ML is to NOT buy a UTM. But a firewall that does firewall stuff, and buy a filter that does filtering stuff, if you really need it.

            Most of hte time. There ARE exceptions, of course, but not with gear like Fortinet. On the rare case that you want a UTM, you want a serious one like Palo Alto or maybe Sophos.

            The networking guys here like the Palo Altos!

            They are generally considered the best. It's an attempt to ride their coattails that all these crappy vendors started making their own UTMs and hope that people think that since PA had a good idea, that it's a good idea from everyone else.

            1 Reply Last reply Reply Quote 0
            • scottalanmillerS
              scottalanmiller
              last edited by

              UTMs are a bit like SANs. When you are a special case and need one, it's going to be hugely expensive and a big deal. For most everyone else, the stuff you get isn't appropriate. And like a SAN, the most common best use scenario for a UTM is "turn it off." Just like in most SMB use cases, the best way to use your SAN is to unplug it.

              1 Reply Last reply Reply Quote 0
              • anthonyhA
                anthonyh
                last edited by

                Well, for what it's worth, I was handed the Fortigates and told to set them up as our new firewalls. Soo, can we focus on my OP rather than a debate on UTMs or not, pretty please? πŸ˜„

                anthonyhA 1 Reply Last reply Reply Quote 0
                • anthonyhA
                  anthonyh @anthonyh
                  last edited by

                  Well, I guess I did invite the conversation myself by asking if I should rely on UTM features instead of limiting outbound traffic. D'oh! πŸ˜›

                  anthonyhA scottalanmillerS 2 Replies Last reply Reply Quote 2
                  • anthonyhA
                    anthonyh @anthonyh
                    last edited by

                    @anthonyh said in Firewalls & Restricting Outbound Traffic:

                    Well, I guess I did invite the conversation myself by asking if I should rely on UTM features instead of limiting outbound traffic. D'oh! πŸ˜›

                    Fixed! πŸ˜„

                    1 Reply Last reply Reply Quote 0
                    • anthonyhA
                      anthonyh
                      last edited by

                      Ok, so the consensus so far for a good baseline is:

                      TCP 80/443 for all
                      TCP & UDP 53 for DNS servers
                      UDP 123 for NTP servers

                      Anything I'm missing? Any others to consider?

                      ObsolesceO anthonyhA 2 Replies Last reply Reply Quote 1
                      • scottalanmillerS
                        scottalanmiller @anthonyh
                        last edited by

                        @anthonyh said in Firewalls & Restricting Outbound Traffic:

                        Well, I guess I did invite the conversation myself by asking if I should rely on UTM features instead of limiting outbound traffic. D'oh! πŸ˜›

                        Just a tad.

                        1 Reply Last reply Reply Quote 1
                        • ObsolesceO
                          Obsolesce @anthonyh
                          last edited by

                          @anthonyh said in Firewalls & Restricting Outbound Traffic:

                          Ok, so the consensus so far for a good baseline is:

                          TCP 80/443 for all
                          TCP & UDP 53 for DNS servers
                          UDP 123 for NTP servers

                          Anything I'm missing? Any others to consider?

                          Any applications like TeamViewer for example?

                          anthonyhA 1 Reply Last reply Reply Quote 0
                          • anthonyhA
                            anthonyh @Obsolesce
                            last edited by

                            @Tim_G said in Firewalls & Restricting Outbound Traffic:

                            @anthonyh said in Firewalls & Restricting Outbound Traffic:

                            Ok, so the consensus so far for a good baseline is:

                            TCP 80/443 for all
                            TCP & UDP 53 for DNS servers
                            UDP 123 for NTP servers

                            Anything I'm missing? Any others to consider?

                            Any applications like TeamViewer for example?

                            TeamViewer seems to work over 80/443.

                            scottalanmillerS ObsolesceO 2 Replies Last reply Reply Quote 0
                            • scottalanmillerS
                              scottalanmiller @anthonyh
                              last edited by

                              @anthonyh said in Firewalls & Restricting Outbound Traffic:

                              @Tim_G said in Firewalls & Restricting Outbound Traffic:

                              @anthonyh said in Firewalls & Restricting Outbound Traffic:

                              Ok, so the consensus so far for a good baseline is:

                              TCP 80/443 for all
                              TCP & UDP 53 for DNS servers
                              UDP 123 for NTP servers

                              Anything I'm missing? Any others to consider?

                              Any applications like TeamViewer for example?

                              TeamViewer seems to work over 80/443.

                              Outbound? A little surprising but not totally.

                              1 Reply Last reply Reply Quote 0
                              • ObsolesceO
                                Obsolesce @anthonyh
                                last edited by

                                @anthonyh said in Firewalls & Restricting Outbound Traffic:

                                @Tim_G said in Firewalls & Restricting Outbound Traffic:

                                @anthonyh said in Firewalls & Restricting Outbound Traffic:

                                Ok, so the consensus so far for a good baseline is:

                                TCP 80/443 for all
                                TCP & UDP 53 for DNS servers
                                UDP 123 for NTP servers

                                Anything I'm missing? Any others to consider?

                                Any applications like TeamViewer for example?

                                TeamViewer seems to work over 80/443.

                                The preferred method is 5938. 80/443 is preferred as backup.

                                anthonyhA 1 Reply Last reply Reply Quote 0
                                • scottalanmillerS
                                  scottalanmiller
                                  last edited by

                                  Any need for SSH.

                                  anthonyhA 1 Reply Last reply Reply Quote 0
                                  • anthonyhA
                                    anthonyh @scottalanmiller
                                    last edited by anthonyh

                                    @scottalanmiller said in Firewalls & Restricting Outbound Traffic:

                                    Any need for SSH.

                                    I was thinking about that. I may open it up on a case by case basis starting with my workstation. πŸ˜„

                                    1 Reply Last reply Reply Quote 1
                                    • anthonyhA
                                      anthonyh @Obsolesce
                                      last edited by anthonyh

                                      @Tim_G said in Firewalls & Restricting Outbound Traffic:

                                      @anthonyh said in Firewalls & Restricting Outbound Traffic:

                                      @Tim_G said in Firewalls & Restricting Outbound Traffic:

                                      @anthonyh said in Firewalls & Restricting Outbound Traffic:

                                      Ok, so the consensus so far for a good baseline is:

                                      TCP 80/443 for all
                                      TCP & UDP 53 for DNS servers
                                      UDP 123 for NTP servers

                                      Anything I'm missing? Any others to consider?

                                      Any applications like TeamViewer for example?

                                      TeamViewer seems to work over 80/443.

                                      The preferred method is 5938. 80/443 is preferred as backup.

                                      I was just about to paste this:

                                      If TeamViewer can’t connect over port 5938, it will next try to connect over TCP port 443. However, the connection speed using this port may not be quite as optimal as using port 5938.

                                      https://community.teamviewer.com/t5/Knowledge-Base/Which-ports-are-used-by-TeamViewer/ta-p/4139

                                      We do have one software vendor who uses TeamViewer for on demand remote support. I'll keep TCP/UDP 5938 in mind if 443 is not optimal.

                                      If TeamViewer can’t connect over port 5938 or 443, then it will try on TCP port 80. The connection speed over these ports is also not as optimal as port 5938.

                                      1 Reply Last reply Reply Quote 0
                                      • scottalanmillerS
                                        scottalanmiller
                                        last edited by

                                        I would just open that port up.

                                        1 Reply Last reply Reply Quote 0
                                        • scottalanmillerS
                                          scottalanmiller
                                          last edited by

                                          Is there really any reason to be blocking all of the ports? I mean it's fine, but will the additional security offset the potential problems?

                                          anthonyhA 1 Reply Last reply Reply Quote 0
                                          • anthonyhA
                                            anthonyh @anthonyh
                                            last edited by

                                            @anthonyh said in Firewalls & Restricting Outbound Traffic:

                                            Ok, so the consensus so far for a good baseline is:

                                            TCP 80/443 for all
                                            TCP & UDP 53 for DNS servers
                                            UDP 123 for NTP servers

                                            Anything I'm missing? Any others to consider?

                                            UPDATE

                                            TCP 80/443 for all
                                            TCP & UDP 5938 for all
                                            TCP & UDP 53 for DNS servers
                                            UDP 123 for NTP servers

                                            ObsolesceO 1 Reply Last reply Reply Quote 1
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 5
                                            • 2 / 5
                                            • First post
                                              Last post