Martin DiViaio on 4 Dec 2003 21:08:02 -0500 |
Make sure you have opened BOTH tcp and udp protocols on ports 137-139. Port 445 (BOTH tcp and udp). Be aware that 445 is also how the Blaster worm gets in. There is also port 1512 (Again, both tcp and udp). This is the WINS port. You probably don't need it since WINS is not a required protocol. On the 4th day of December in the year 2003 you wrote: > Date: Thu, 04 Dec 2003 07:28:25 -0500 > From: Jesse Huestis <jhuestis@comcast.net> > To: plug@lists.phillylinux.org > X-Spam-Status: No, hits=0.1 required=5.0 tests=AWL, > RCVD_IN_SORBS autolearn=no > version=2.60 > Subject: Re: [PLUG] Ports needed to use Samba or MS networking functions > > Thanks for the log monitoring idea. That will give me some data. I > ma using WPA for exernal security. I have also made it so only the IP > range I have assigned can access the Internet and all others get know > access. It should frustrate a hacker and have them try elsewhere since > there are open WI-FI LAN around I have identified using Netstumbler. > > We have temp. shared a local printer for the wireless folks to use. > > Any other ideas as to the ports, please keep it coming. > > Thanks, > > Jesse > > Paul wrote: > > > Michael C. Toren wrote: > > > >> A third option, and the one I would strongly recommend, would be to > >> implement a VPN server, and require wireless users who wish to access > >> your internal network to first establish a VPN connection. > >> > >> > > > > The use of WPA (Wi-Fi Protected Access) sounds like another good > > alternative if the hardware supports it. > > > ___________________________________________________________________________ Philadelphia Linux Users Group -- http://www.phillylinux.org Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce General Discussion -- http://lists.phillylinux.org/mailman/listinfo/plug
|
|