HTTP uses port 80 and HTTPS uses port 443 for a web server to be able to work with these protocols the firewall would need to allow communications through on these ports.
FTP over TLS/SSL need to have a rule added to the firewall which allows TCP to pass through insection. The rule can be added with a command like ‘netsh advfirewall firewall add rule name=”FTP for IIS7″ service=ftpsvc action=allow protocol=TCP dir=in’. The user also must disable stateful insection of FTP communications. Port 21 must be open.
SMTP uses port 25 so the firewall must allow commuications on that port through. If an application is being used to manage email on the server the firewall might need the email application added to it’s white list as well.
Remote administration can be implement by selecting the Windows Management Instrumentation exception option on the windows firewall screen. The port 443 must be open.
MariaDB requires both inbound and outbound rules which open port 3306. Although if installed properly these rules should automatically be created. These rules must function on Domain, private, and public networks as such need to work with the 103.28.250.99/192.168.0.2 ip addresses.
MSSQL uses port 1433 with tcp so the fire wall must allow this. For the sever verson of MSSQL an additional port must be opened for UDP this port is 1434.
Rules:
HTTP; Inbound/ Detestation 103.28.251.162 port 80 Source any port 80. Outbound / Detestation Any port 80 Source 192.168.0.1
Firewall rules are important as they allow users to decide what ports and programs are allowed to interact with their system. With out strong rules it becomes easy for outside entities to interact with a system. However, strong rules can prevent programs and services to function properly. This is why is is important to be able to create and manage firewall rules. With additional knowledge of the programs which need to run on a network it could be possible to create firewall rules which only allow desired programs and services to function on the network. I feel that the example used in this lab were not sufficient to learn about configuring firewall rules. Through this lab we only did the most most basic of changes to a preexisting firewall rule. I think that this task would have be a lot more help full if instead on focusing on ‘testing’ the rules of the firewall were working, even though we were turning the same rule off and on, we could have work with different rules or created our own.