cmdbash Posted April 30, 2012 Share Posted April 30, 2012 Hi all, As per policy's go, would one GSP typically block every port other then the ones being used for the actual game servers, TCAdmin, ftp, and other critical needs? I ask because I really want to do my best at locking down our firewall, and I'm trying to find the most effective policy I can get. Link to comment Share on other sites More sharing options...
icekohl Posted April 30, 2012 Share Posted April 30, 2012 YES! Least I would. Link to comment Share on other sites More sharing options...
Jack Posted May 1, 2012 Share Posted May 1, 2012 I have blocked everything, pinging, etc. Then with that only open the ports on a remote IP scope, rather than TCA opening the ports I use custom scripts to createand then delete the rules so I know exactly what's going on with the firewall. Link to comment Share on other sites More sharing options...
Monk Posted May 2, 2012 Share Posted May 2, 2012 I would not block icmp, that breaks PMTU. Link to comment Share on other sites More sharing options...
icekohl Posted May 2, 2012 Share Posted May 2, 2012 Don't make them google shiz monk. Link to comment Share on other sites More sharing options...
cmdbash Posted May 2, 2012 Author Share Posted May 2, 2012 Don't make them google shiz monk. I'm okay with Googlein Shiz, gives me a chance to learn on my own. I also dont mind direct information lol. Link to comment Share on other sites More sharing options...
cmdbash Posted May 15, 2012 Author Share Posted May 15, 2012 Anyone have a recommended list of Ports to block? Link to comment Share on other sites More sharing options...
Jack Posted June 3, 2012 Share Posted June 3, 2012 Anyone have a recommended list of Ports to block? Block everything and then open what you need :confused: isn't that just logic? Link to comment Share on other sites More sharing options...
Admin-Nation-Servers Posted June 4, 2012 Share Posted June 4, 2012 All ports should be blocked for TCP/UDP transport protocols, if they are not needed for game server use or administration. All ports that must be open for administration (EX: RDC) should be limited to certain IP addresses for incoming connections. I also recommend disabling the default administrator account and using a complex username and password for access/TCAdmin use. These are just basic recommendations. You can use McAfee's PCI compliance tool to test for known vulnerabilities. Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.