{"id":283,"date":"2017-06-11T21:02:30","date_gmt":"2017-06-11T19:02:30","guid":{"rendered":"http:\/\/blog.etscheid.biz\/?p=283"},"modified":"2017-06-11T21:02:30","modified_gmt":"2017-06-11T19:02:30","slug":"gaengige-ports-fuer-firewall","status":"publish","type":"post","link":"https:\/\/etscheid.biz\/blog\/2017\/06\/11\/gaengige-ports-fuer-firewall\/","title":{"rendered":"G\u00e4ngige Ports f\u00fcr eine Router-Firewall"},"content":{"rendered":"<p>Bislang hatte ich bei meinen Routern immer jede Kommunikation bzw. Ports und Ziele uneingeschr\u00e4nkt zugelassen. Sicherer ist es aber, wenn nur die Kommunikation zugelassen wird, die man ausdr\u00fccklich erlaubt.<\/p>\n<p>Ich habe mir also Gedanken gemacht, welche Ports ich denn explizit \u00f6ffnen muss.<\/p>\n<p><!--more--><\/p>\n<p>Dieser Lancom Knowledgebase Artikel beschreibt die Vorgehensweise schon ganz gut.\u00a0<a href=\"https:\/\/support.lancom-systems.com\/knowledge\/pages\/viewpage.action?pageId=32982115\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/p>\n<p>Danach beginnt die Feinabstimmung, denn es gibt noch eine Reihe von Ports die ge\u00f6ffnet werden m\u00fcssen. <a href=\"https:\/\/support.lancom-systems.com\/knowledge\/display\/KB\/Firewall-Konfiguration+mit+Hilfe+von+bereitgestellten+Skripten\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/p>\n<p>Hier mal die f\u00fcr mich am besten passende Portliste mit meinen Anwendungen:<\/p>\n<table width=\"390\">\n<tbody>\n<tr>\n<td width=\"130\"><strong>Dienst<\/strong><\/td>\n<td width=\"130\"><strong>UDP<\/strong><\/td>\n<td width=\"130\"><strong>TCP<\/strong><\/td>\n<\/tr>\n<tr>\n<td>RTP<\/td>\n<td>16384-16472<\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>FTP<\/td>\n<td><\/td>\n<td>21<\/td>\n<\/tr>\n<tr>\n<td>Mail<\/td>\n<td><\/td>\n<td>25, 110, 143<\/td>\n<\/tr>\n<tr>\n<td>Secure Mail<\/td>\n<td><\/td>\n<td>587,993,995<\/td>\n<\/tr>\n<tr>\n<td>HTTP<\/td>\n<td><\/td>\n<td>80<\/td>\n<\/tr>\n<tr>\n<td>HTTPS<\/td>\n<td><\/td>\n<td>443<\/td>\n<\/tr>\n<tr>\n<td>TFTP<\/td>\n<td>69<\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>IPSEC<\/td>\n<td>500, 4500<\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>SSH<\/td>\n<td><\/td>\n<td>22<\/td>\n<\/tr>\n<tr>\n<td>DNS<\/td>\n<td>53<\/td>\n<td>53<\/td>\n<\/tr>\n<tr>\n<td>NETBIOS<\/td>\n<td>137-139<\/td>\n<td>137-139<\/td>\n<\/tr>\n<tr>\n<td>Elster<\/td>\n<td><\/td>\n<td>8000<\/td>\n<\/tr>\n<tr>\n<td>RDP<\/td>\n<td><\/td>\n<td>3389<\/td>\n<\/tr>\n<tr>\n<td>SNMP<\/td>\n<td>161-162<\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>NTP<\/td>\n<td>123<\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>HBCI Banking<\/td>\n<td><\/td>\n<td>3000<\/td>\n<\/tr>\n<tr>\n<td>SIP<\/td>\n<td>5060-5061<\/td>\n<td>5060-5061<\/td>\n<\/tr>\n<tr>\n<td>NAT-STUN<\/td>\n<td>3478-3497<\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>SMA Tripower<\/td>\n<td>9523, 3478, &gt;1024<\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td>Qivicon<\/td>\n<td><\/td>\n<td>44304<\/td>\n<\/tr>\n<tr>\n<td>Netatmo<\/td>\n<td><\/td>\n<td>25050<\/td>\n<\/tr>\n<tr>\n<td>Roomba<\/td>\n<td>5353,5678<\/td>\n<td>8883<\/td>\n<\/tr>\n<tr>\n<td>Push Handy<\/td>\n<td><\/td>\n<td>2195-2196,5222-5223<\/td>\n<\/tr>\n<tr>\n<td>Spotify<\/td>\n<td><\/td>\n<td>4070<\/td>\n<\/tr>\n<tr>\n<td>LDAP<\/td>\n<td><\/td>\n<td>636<\/td>\n<\/tr>\n<tr>\n<td>Steam<\/td>\n<td>\u00a03478, 4379, 4380, 15000, 3005, 3101, 28960<\/td>\n<td>27015<\/td>\n<\/tr>\n<tr>\n<td>Steam Client<\/td>\n<td>4380,27000-27030,27031-27036<\/td>\n<td>\u00a027014-27050, 27036-27037<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Bislang hatte ich bei meinen Routern immer jede Kommunikation bzw. Ports und Ziele uneingeschr\u00e4nkt zugelassen. Sicherer ist es aber, wenn nur die Kommunikation zugelassen wird, die man ausdr\u00fccklich erlaubt. Ich habe mir also Gedanken gemacht, welche Ports ich denn explizit \u00f6ffnen muss.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[68,44,69,70,71],"class_list":["post-283","post","type-post","status-publish","format-standard","hentry","category-voip","tag-firewall","tag-lancom","tag-ports","tag-tcp","tag-udp"],"_links":{"self":[{"href":"https:\/\/etscheid.biz\/blog\/wp-json\/wp\/v2\/posts\/283","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/etscheid.biz\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/etscheid.biz\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/etscheid.biz\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/etscheid.biz\/blog\/wp-json\/wp\/v2\/comments?post=283"}],"version-history":[{"count":0,"href":"https:\/\/etscheid.biz\/blog\/wp-json\/wp\/v2\/posts\/283\/revisions"}],"wp:attachment":[{"href":"https:\/\/etscheid.biz\/blog\/wp-json\/wp\/v2\/media?parent=283"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/etscheid.biz\/blog\/wp-json\/wp\/v2\/categories?post=283"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/etscheid.biz\/blog\/wp-json\/wp\/v2\/tags?post=283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}