McAfee TSA00M005PAA Processor Guide - Page 87

Firewall configuration

Page 87 highlights

Using Firewall Protection Firewall configuration Examples of system services that typically require ports to be opened are: • E mail server - You do not need to open a mail server port to receive email. You need to open a port only if the computer running firewall protection acts as an email server. • W  eb server - You do not need to open a web server port to run a web browser. You need to open a port only if the computer running firewall protection acts as a web server. NOTE: An opened service port that does not have an application running on it poses no security threat. However, we recommend that you close unused ports. Standard assignments for system service ports These commonly used standard service ports are listed by default, where you can open or close them: • F ile and Print Sharing • R emote Desktop • R emote Assistance You can add other service ports as needed. Standard service ports for typical system services are: System Service File Transfer Protocol (FTP) Mail Server (IMAP) Mail Server (POP3) Mail Server (SMTP) Microsoft Directory Server (MSFT DS) Microsoft SQL Server (MSFT SQL) Network Time Protocol Port Remote Assistance / Terminal Server (RDP) Remote Procedure Calls (RPC) Secure Web Server (HTTPS) Universal Plug and Play (UPNP) Web Server (HTTP) Windows File Sharing (NETBIOS) Port(s) 20-21 143 110 25 445 1433 123 3389 (same as Remote Assistance and Remote Desktop) 135 443 5000 80 137-139 (same as File and Print Sharing) Firewall configuration Protecting computers from suspicious activity with a firewall involves monitoring network activity to identify applications, IP addresses, and ports, and blocking those that could cause harm. There are two methods of establishing firewall protection: • T he administrator configures firewall settings in a Total Protection Service policy. • E ach client computer user configures firewall settings for their computer. McAfee Total Protection Service Product Guide 87

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134

McAfee Total Protection Service Product Guide
87
Examples of system services that typically require ports to be opened are:
Email server
— You do not need to open a mail server port to receive email. You need to
open a port only if the computer running firewall protection acts as an email server.
Web server
— You do not need to open a web server port to run a web browser. You
need to open a port only if the computer running firewall protection acts as a web server.
NOTE:
An opened service port that does not have an application running on it poses no
security threat. However, we recommend that you close unused ports.
Standard assignments for system service ports
These commonly used standard service ports are listed by default, where you can open or
close them:
File and Print Sharing
Remote Desktop
Remote Assistance
You can add other service ports as needed. Standard service ports for typical system
services are:
Firewall configuration
Protecting computers from suspicious activity with a firewall involves monitoring network
activity to identify applications, IP addresses, and ports, and blocking those that could cause
harm. There are two methods of establishing firewall protection:
The administrator configures firewall settings in a Total Protection Service policy.
Each client computer user configures firewall settings for their computer.
Port(s)
System Service
20-21
File Transfer Protocol (FTP)
143
Mail Server (IMAP)
110
Mail Server (POP3)
25
Mail Server (SMTP)
445
Microsoft Directory Server (MSFT DS)
1433
Microsoft SQL Server (MSFT SQL)
123
Network Time Protocol Port
3389 (same as Remote Assistance and Remote Desktop)
Remote Assistance / Terminal Server (RDP)
135
Remote Procedure Calls (RPC)
443
Secure Web Server (HTTPS)
5000
Universal Plug and Play (UPNP)
80
Web Server (HTTP)
137-139 (same as File and Print Sharing)
Windows File Sharing (NETBIOS)
Using Firewall Protection
Firewall configuration