ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Firewalls & Restricting Outbound Traffic

    IT Discussion
    8
    92
    7.3k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • anthonyhA
      anthonyh @anthonyh
      last edited by

      @anthonyh said in Firewalls & Restricting Outbound Traffic:

      Well, I guess I did invite the conversation myself by asking if I should rely on UTM features instead of limiting outbound traffic. D'oh! πŸ˜›

      Fixed! πŸ˜„

      1 Reply Last reply Reply Quote 0
      • anthonyhA
        anthonyh
        last edited by

        Ok, so the consensus so far for a good baseline is:

        TCP 80/443 for all
        TCP & UDP 53 for DNS servers
        UDP 123 for NTP servers

        Anything I'm missing? Any others to consider?

        ObsolesceO anthonyhA 2 Replies Last reply Reply Quote 1
        • scottalanmillerS
          scottalanmiller @anthonyh
          last edited by

          @anthonyh said in Firewalls & Restricting Outbound Traffic:

          Well, I guess I did invite the conversation myself by asking if I should rely on UTM features instead of limiting outbound traffic. D'oh! πŸ˜›

          Just a tad.

          1 Reply Last reply Reply Quote 1
          • ObsolesceO
            Obsolesce @anthonyh
            last edited by

            @anthonyh said in Firewalls & Restricting Outbound Traffic:

            Ok, so the consensus so far for a good baseline is:

            TCP 80/443 for all
            TCP & UDP 53 for DNS servers
            UDP 123 for NTP servers

            Anything I'm missing? Any others to consider?

            Any applications like TeamViewer for example?

            anthonyhA 1 Reply Last reply Reply Quote 0
            • anthonyhA
              anthonyh @Obsolesce
              last edited by

              @Tim_G said in Firewalls & Restricting Outbound Traffic:

              @anthonyh said in Firewalls & Restricting Outbound Traffic:

              Ok, so the consensus so far for a good baseline is:

              TCP 80/443 for all
              TCP & UDP 53 for DNS servers
              UDP 123 for NTP servers

              Anything I'm missing? Any others to consider?

              Any applications like TeamViewer for example?

              TeamViewer seems to work over 80/443.

              scottalanmillerS ObsolesceO 2 Replies Last reply Reply Quote 0
              • scottalanmillerS
                scottalanmiller @anthonyh
                last edited by

                @anthonyh said in Firewalls & Restricting Outbound Traffic:

                @Tim_G said in Firewalls & Restricting Outbound Traffic:

                @anthonyh said in Firewalls & Restricting Outbound Traffic:

                Ok, so the consensus so far for a good baseline is:

                TCP 80/443 for all
                TCP & UDP 53 for DNS servers
                UDP 123 for NTP servers

                Anything I'm missing? Any others to consider?

                Any applications like TeamViewer for example?

                TeamViewer seems to work over 80/443.

                Outbound? A little surprising but not totally.

                1 Reply Last reply Reply Quote 0
                • ObsolesceO
                  Obsolesce @anthonyh
                  last edited by

                  @anthonyh said in Firewalls & Restricting Outbound Traffic:

                  @Tim_G said in Firewalls & Restricting Outbound Traffic:

                  @anthonyh said in Firewalls & Restricting Outbound Traffic:

                  Ok, so the consensus so far for a good baseline is:

                  TCP 80/443 for all
                  TCP & UDP 53 for DNS servers
                  UDP 123 for NTP servers

                  Anything I'm missing? Any others to consider?

                  Any applications like TeamViewer for example?

                  TeamViewer seems to work over 80/443.

                  The preferred method is 5938. 80/443 is preferred as backup.

                  anthonyhA 1 Reply Last reply Reply Quote 0
                  • scottalanmillerS
                    scottalanmiller
                    last edited by

                    Any need for SSH.

                    anthonyhA 1 Reply Last reply Reply Quote 0
                    • anthonyhA
                      anthonyh @scottalanmiller
                      last edited by anthonyh

                      @scottalanmiller said in Firewalls & Restricting Outbound Traffic:

                      Any need for SSH.

                      I was thinking about that. I may open it up on a case by case basis starting with my workstation. πŸ˜„

                      1 Reply Last reply Reply Quote 1
                      • anthonyhA
                        anthonyh @Obsolesce
                        last edited by anthonyh

                        @Tim_G said in Firewalls & Restricting Outbound Traffic:

                        @anthonyh said in Firewalls & Restricting Outbound Traffic:

                        @Tim_G said in Firewalls & Restricting Outbound Traffic:

                        @anthonyh said in Firewalls & Restricting Outbound Traffic:

                        Ok, so the consensus so far for a good baseline is:

                        TCP 80/443 for all
                        TCP & UDP 53 for DNS servers
                        UDP 123 for NTP servers

                        Anything I'm missing? Any others to consider?

                        Any applications like TeamViewer for example?

                        TeamViewer seems to work over 80/443.

                        The preferred method is 5938. 80/443 is preferred as backup.

                        I was just about to paste this:

                        If TeamViewer can’t connect over port 5938, it will next try to connect over TCP port 443. However, the connection speed using this port may not be quite as optimal as using port 5938.

                        https://community.teamviewer.com/t5/Knowledge-Base/Which-ports-are-used-by-TeamViewer/ta-p/4139

                        We do have one software vendor who uses TeamViewer for on demand remote support. I'll keep TCP/UDP 5938 in mind if 443 is not optimal.

                        If TeamViewer can’t connect over port 5938 or 443, then it will try on TCP port 80. The connection speed over these ports is also not as optimal as port 5938.

                        1 Reply Last reply Reply Quote 0
                        • scottalanmillerS
                          scottalanmiller
                          last edited by

                          I would just open that port up.

                          1 Reply Last reply Reply Quote 0
                          • scottalanmillerS
                            scottalanmiller
                            last edited by

                            Is there really any reason to be blocking all of the ports? I mean it's fine, but will the additional security offset the potential problems?

                            anthonyhA 1 Reply Last reply Reply Quote 0
                            • anthonyhA
                              anthonyh @anthonyh
                              last edited by

                              @anthonyh said in Firewalls & Restricting Outbound Traffic:

                              Ok, so the consensus so far for a good baseline is:

                              TCP 80/443 for all
                              TCP & UDP 53 for DNS servers
                              UDP 123 for NTP servers

                              Anything I'm missing? Any others to consider?

                              UPDATE

                              TCP 80/443 for all
                              TCP & UDP 5938 for all
                              TCP & UDP 53 for DNS servers
                              UDP 123 for NTP servers

                              ObsolesceO 1 Reply Last reply Reply Quote 1
                              • anthonyhA
                                anthonyh @scottalanmiller
                                last edited by

                                @scottalanmiller said in Firewalls & Restricting Outbound Traffic:

                                Is there really any reason to be blocking all of the ports? I mean it's fine, but will the additional security offset the potential problems?

                                The only reason is to try to limit what can initiate connections to the outside from inside our network. I've been wondering this myself, and am not sure. I'm not sure what problems will arise. I know there will be a period of time where "this" doesn't work or "that" doesn't work because they were things I didn't consider and/or forgot about...but in theory it should normalize. Who knows, if I do decide to do this it may turn into a nightmare and I'll end up throwing in an "any any" statement.

                                scottalanmillerS 1 Reply Last reply Reply Quote 0
                                • scottalanmillerS
                                  scottalanmiller @anthonyh
                                  last edited by

                                  @anthonyh said in Firewalls & Restricting Outbound Traffic:

                                  @scottalanmiller said in Firewalls & Restricting Outbound Traffic:

                                  Is there really any reason to be blocking all of the ports? I mean it's fine, but will the additional security offset the potential problems?

                                  The only reason is to try to limit what can initiate connections to the outside from inside our network. I've been wondering this myself, and am not sure. I'm not sure what problems will arise. I know there will be a period of time where "this" doesn't work or "that" doesn't work because they were things I didn't consider and/or forgot about...but in theory it should normalize. Who knows, if I do decide to do this it may turn into a nightmare and I'll end up throwing in an "any any" statement.

                                  Might not normalize. New software will need different ports over time, so it might be a continuous pain. Malware mostly uses the ports you've opened, almost exclusively. So the question is, I think, is ANY pain worth ZERO protection?

                                  anthonyhA 1 Reply Last reply Reply Quote 0
                                  • anthonyhA
                                    anthonyh @scottalanmiller
                                    last edited by

                                    @scottalanmiller said in Firewalls & Restricting Outbound Traffic:

                                    @anthonyh said in Firewalls & Restricting Outbound Traffic:

                                    @scottalanmiller said in Firewalls & Restricting Outbound Traffic:

                                    Is there really any reason to be blocking all of the ports? I mean it's fine, but will the additional security offset the potential problems?

                                    The only reason is to try to limit what can initiate connections to the outside from inside our network. I've been wondering this myself, and am not sure. I'm not sure what problems will arise. I know there will be a period of time where "this" doesn't work or "that" doesn't work because they were things I didn't consider and/or forgot about...but in theory it should normalize. Who knows, if I do decide to do this it may turn into a nightmare and I'll end up throwing in an "any any" statement.

                                    Might not normalize. New software will need different ports over time, so it might be a continuous pain. Malware mostly uses the ports you've opened, almost exclusively. So the question is, I think, is ANY pain worth ZERO protection?

                                    Well if it's "zero" then no. But I don't think it's zero. How close to zero, who knows.

                                    JaredBuschJ scottalanmillerS dafyreD 3 Replies Last reply Reply Quote 0
                                    • JaredBuschJ
                                      JaredBusch @anthonyh
                                      last edited by

                                      @anthonyh said in Firewalls & Restricting Outbound Traffic:

                                      @scottalanmiller said in Firewalls & Restricting Outbound Traffic:

                                      @anthonyh said in Firewalls & Restricting Outbound Traffic:

                                      @scottalanmiller said in Firewalls & Restricting Outbound Traffic:

                                      Is there really any reason to be blocking all of the ports? I mean it's fine, but will the additional security offset the potential problems?

                                      The only reason is to try to limit what can initiate connections to the outside from inside our network. I've been wondering this myself, and am not sure. I'm not sure what problems will arise. I know there will be a period of time where "this" doesn't work or "that" doesn't work because they were things I didn't consider and/or forgot about...but in theory it should normalize. Who knows, if I do decide to do this it may turn into a nightmare and I'll end up throwing in an "any any" statement.

                                      Might not normalize. New software will need different ports over time, so it might be a continuous pain. Malware mostly uses the ports you've opened, almost exclusively. So the question is, I think, is ANY pain worth ZERO protection?

                                      Well if it's "zero" then no. But I don't think it's zero. How close to zero, who knows.

                                      Seriously, do not block shit. It causes nothing but problems and solves not a damned thing.

                                      Not a single piece of effective malware on the planet uses anything except port 80 or port 443. Why? Because without those ports open no one can do anything. So they HAVE to be open. Why code your malware so that it can be trivially blocked by a home user?

                                      Blocking port 25 is great, to prevent spam leaving your network, but aside from that, there is no benefit to restricting everything.

                                      I can telly ou that you are already in for headaches by thinking you can not open the Teamviewer port when you know for a fact that the application is used.

                                      This is exactly the idiotic mentality that drives bad decisions. Think don't feel. When you think, you will see that there is ZERO upside to this type of blocking.

                                      ObsolesceO anthonyhA 2 Replies Last reply Reply Quote 2
                                      • scottalanmillerS
                                        scottalanmiller @anthonyh
                                        last edited by

                                        @anthonyh said in Firewalls & Restricting Outbound Traffic:

                                        @scottalanmiller said in Firewalls & Restricting Outbound Traffic:

                                        @anthonyh said in Firewalls & Restricting Outbound Traffic:

                                        @scottalanmiller said in Firewalls & Restricting Outbound Traffic:

                                        Is there really any reason to be blocking all of the ports? I mean it's fine, but will the additional security offset the potential problems?

                                        The only reason is to try to limit what can initiate connections to the outside from inside our network. I've been wondering this myself, and am not sure. I'm not sure what problems will arise. I know there will be a period of time where "this" doesn't work or "that" doesn't work because they were things I didn't consider and/or forgot about...but in theory it should normalize. Who knows, if I do decide to do this it may turn into a nightmare and I'll end up throwing in an "any any" statement.

                                        Might not normalize. New software will need different ports over time, so it might be a continuous pain. Malware mostly uses the ports you've opened, almost exclusively. So the question is, I think, is ANY pain worth ZERO protection?

                                        Well if it's "zero" then no. But I don't think it's zero. How close to zero, who knows.

                                        How much of "just a threat we imagined" is it worth? No risk is zero, but when keeping the big threat ports open... this seems silly.

                                        1 Reply Last reply Reply Quote 0
                                        • dafyreD
                                          dafyre @anthonyh
                                          last edited by

                                          @anthonyh said in Firewalls & Restricting Outbound Traffic:

                                          @scottalanmiller said in Firewalls & Restricting Outbound Traffic:

                                          @anthonyh said in Firewalls & Restricting Outbound Traffic:

                                          @scottalanmiller said in Firewalls & Restricting Outbound Traffic:

                                          Is there really any reason to be blocking all of the ports? I mean it's fine, but will the additional security offset the potential problems?

                                          The only reason is to try to limit what can initiate connections to the outside from inside our network. I've been wondering this myself, and am not sure. I'm not sure what problems will arise. I know there will be a period of time where "this" doesn't work or "that" doesn't work because they were things I didn't consider and/or forgot about...but in theory it should normalize. Who knows, if I do decide to do this it may turn into a nightmare and I'll end up throwing in an "any any" statement.

                                          Might not normalize. New software will need different ports over time, so it might be a continuous pain. Malware mostly uses the ports you've opened, almost exclusively. So the question is, I think, is ANY pain worth ZERO protection?

                                          Well if it's "zero" then no. But I don't think it's zero. How close to zero, who knows.

                                          The best advice I can offer is to block only outgoing ports that you KNOW are going to be issues... like Port 25... for anything but an email server... and Port 53 for anything but your internal DNS servers...

                                          The way I would do it for outgoing

                                          block 25 [except for internal emali server]
                                          block 53 [except for internal DNS servers]
                                          block 138,139,445 [SMB share traffic]
                                          block 1433 [SQL Server]
                                          block 3306 [MySQL / MariaDB]
                                          

                                          And allow most everything else.

                                          I'm sure there are others... but that would be my starting point.

                                          scottalanmillerS 1 Reply Last reply Reply Quote 1
                                          • ObsolesceO
                                            Obsolesce @anthonyh
                                            last edited by

                                            @anthonyh said in Firewalls & Restricting Outbound Traffic:

                                            @anthonyh said in Firewalls & Restricting Outbound Traffic:

                                            Ok, so the consensus so far for a good baseline is:

                                            TCP 80/443 for all
                                            TCP & UDP 53 for DNS servers
                                            UDP 123 for NTP servers

                                            Anything I'm missing? Any others to consider?

                                            UPDATE

                                            TCP 80/443 for all
                                            TCP & UDP 5938 for all
                                            TCP & UDP 53 for DNS servers
                                            UDP 123 for NTP servers

                                            Only UDP 5938.

                                            1 Reply Last reply Reply Quote 0
                                            • 1
                                            • 2
                                            • 3
                                            • 4
                                            • 5
                                            • 2 / 5
                                            • First post
                                              Last post