Hi chaps,

 

We are looking at setting up a DMZ based wifi AP at a remote site where
they have lots of freelancers coming and going. This would be used for
the freelancers and would stop them accessing internal resources while
allowing them external access. There would be another wifi AP for the
internal staff to use. 

 

I want to also block certain outgoing ports on the DMZ based Wifi AP so
that traffic use is limited. Essentially I want to limit access to just
the basics. Now, my 'basics' and someone else's 'basics' are two
different things I'm sure. I thought I might asked the list whether
anyone has looked at the kind of traffic internal staff legitimately
use/create and what ports other people are blocking.

 

The list so far is;

 

To Allow:

HTTP (80)

HTTPS (443)

FTP (21)

RDP (3389)

RWW (4415)

 

To Block (ideally all but at least):

SMTP (25)

IRC (6666 - 6669)

 

Any others? 

 

Olly

 

--

G2 Support

Online Backups 

 

Email:  [EMAIL PROTECTED]
<mailto:[EMAIL PROTECTED]> 

Web:    http://www.g2support.com <http://www.g2support.com> 

 

 


~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to