SlideShare a Scribd company logo
1 of 11
PORT FORWARDING
SILICON CHIPS TAMILAN
WHAT IS PORT FORWARDING?
• Port forwarding, also known as port management, allows remote servers and devices on
the internet to be able to access devices that are on a private network.
• If you are not using port forwarding, only devices on that private internal network can
have access to each other or your network.
• A port is a communication endpoint and is identified as a port number that is always
associated with an IP address.
Four ways to mitigate the security impact of port forwarding
• 1. Only forward ports to devices in a DMZ
• 2. Only forward the specific ports that are required
• 3. Restrict the IP addresses that are allowed to access the port forward.
• 4. Don't port forward at all.
ONLY FORWARD PORTS TO DEVICES IN A DMZ
• Forwarding ports through a DMZ gives you an extra layer of security and protects
your network from being vulnerable.
• A DMZ or demilitarized zone is a perimeter that protects and adds an extra layer of
security to an organization’s internal network from untrusted outside traffic.
ONLY FORWARD THE SPECIFIC PORTS THAT ARE
REQUIRED
• Forwarding to specific ports that you need will make your network much safer.
• If you were to forward to lots of different ports that may not be necessary, you could be
opening up your network to cyber-attacks and data breaches.
RESTRICT THE IP ADDRESSES THAT ARE
ALLOWED TO ACCESS THE PORT FORWARD.
• If you aren’t restricting IP addresses, your server could be accessed by a malicious
source.
• You can allow access to specific IP addresses so that only those IP addresses have
access to your server.
• If you have a vendor that requires access to a server that you manage, then you can
restrict access to the port forward for that server to only the IP addresses that your vendor
uses.
DON'T PORT FORWARD AT ALL.
• Instead of port forwarding, you can use services like SASE which uses secure VPN
tunnels to allow authenticated and secured access to resources.
Local Port Forwarding
Local Port Forwarding is the common type of port forwarding. It is used to let a user
connect from the local computer to another server, i.e forward data securely from another
client application running on the same computer as a Secure shell client. By using local port
forwarding , firewalls that block certain web pages are able to Bypass.
Remote Port Forwarding
This form of port forwarding enables applications on the server side of a secure shell.
There are proprietary for the same general purpose. To use remote port forwarding the
address of the destination server and two port number must be known. The port number
chosen depend on which application is to be used.
Port Number Usage
20 File Transfer Protocol (FTP) Data Transfer
21 File Transfer Protocol (FTP) Command Control
22 Secure Shell (SSH)
23 Telnet - Remote login service, unencrypted text messages
25 Simple Mail Transfer Protocol (SMTP) E-mail Routing
53 Domain Name System (DNS) service
80 Hypertext Transfer Protocol (HTTP) used in World Wide Web
110 Post Office Protocol (POP3) used by e-mail clients to retrieve e-mail from a server
119 Network News Transfer Protocol (NNTP)
123 Network Time Protocol (NTP)
143 Internet Message Access Protocol (IMAP) Management of Digital Mail
161 Simple Network Management Protocol (SNMP)
194 Internet Relay Chat (IRC)
443 HTTP Secure (HTTPS) HTTP over TLS/SSL
14 common network ports
port forwarding.pptx

More Related Content

Similar to port forwarding.pptx

Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
Module 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 PresentationModule 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 Presentation9921103075
 
topicCybersecurity_4
topicCybersecurity_4topicCybersecurity_4
topicCybersecurity_4Anne Starr
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8suddenven
 
gkk_2021123rg5hSecurity essentials domain 2
gkk_2021123rg5hSecurity essentials   domain 2gkk_2021123rg5hSecurity essentials   domain 2
gkk_2021123rg5hSecurity essentials domain 2Anne Starr
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2Anne Starr
 
gkk20211e4djwew4dSecurity essentials domain 2
gkk20211e4djwew4dSecurity essentials   domain 2gkk20211e4djwew4dSecurity essentials   domain 2
gkk20211e4djwew4dSecurity essentials domain 2Anne Starr
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptxkarthikvcyber
 
CNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsCNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsSam Bowne
 
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjchapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjAmitDeshai
 
DDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL LeeDDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL LeeMyNOG
 
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...Boston Institute of Analytics
 
Ch 13: Network Protection Systems
Ch 13: Network Protection SystemsCh 13: Network Protection Systems
Ch 13: Network Protection SystemsSam Bowne
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)sonangrai
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2sweta dargad
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy ServerLakshyaArora12
 

Similar to port forwarding.pptx (20)

Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Module 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 PresentationModule 7 Firewalls Part - 2 Presentation
Module 7 Firewalls Part - 2 Presentation
 
topicCybersecurity_4
topicCybersecurity_4topicCybersecurity_4
topicCybersecurity_4
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8
 
MVA slides lesson 8
MVA slides lesson 8MVA slides lesson 8
MVA slides lesson 8
 
Network Concepts
Network ConceptsNetwork Concepts
Network Concepts
 
gkk_2021123rg5hSecurity essentials domain 2
gkk_2021123rg5hSecurity essentials   domain 2gkk_2021123rg5hSecurity essentials   domain 2
gkk_2021123rg5hSecurity essentials domain 2
 
gkkSecurity essentials domain 2
gkkSecurity essentials   domain 2gkkSecurity essentials   domain 2
gkkSecurity essentials domain 2
 
gkk20211e4djwew4dSecurity essentials domain 2
gkk20211e4djwew4dSecurity essentials   domain 2gkk20211e4djwew4dSecurity essentials   domain 2
gkk20211e4djwew4dSecurity essentials domain 2
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptx
 
CNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection SystemsCNIT 123: Ch 13: Network Protection Systems
CNIT 123: Ch 13: Network Protection Systems
 
Unit08
Unit08Unit08
Unit08
 
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjchapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhj
 
DDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL LeeDDOS Mitigation Experience from IP ServerOne by CL Lee
DDOS Mitigation Experience from IP ServerOne by CL Lee
 
Port forwarding
Port forwardingPort forwarding
Port forwarding
 
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
Nmap project presentation : Unlocking Network Secrets: Mastering Port Scannin...
 
Ch 13: Network Protection Systems
Ch 13: Network Protection SystemsCh 13: Network Protection Systems
Ch 13: Network Protection Systems
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy Server
 

More from Vignesh kumar

Multiprotocol label switching (MPLS).pptx
Multiprotocol label switching (MPLS).pptxMultiprotocol label switching (MPLS).pptx
Multiprotocol label switching (MPLS).pptxVignesh kumar
 
CCNP in networking notes #ccna #ccnp notes
CCNP in networking notes #ccna #ccnp notesCCNP in networking notes #ccna #ccnp notes
CCNP in networking notes #ccna #ccnp notesVignesh kumar
 
OSI model full details
OSI model full detailsOSI model full details
OSI model full detailsVignesh kumar
 
what is Cloud VPN.pptx
what is Cloud VPN.pptxwhat is Cloud VPN.pptx
what is Cloud VPN.pptxVignesh kumar
 
 Site to Site VPN.pptx
 Site to Site VPN.pptx Site to Site VPN.pptx
 Site to Site VPN.pptxVignesh kumar
 
Desktop Support Engineer Roles
Desktop Support Engineer Roles Desktop Support Engineer Roles
Desktop Support Engineer Roles Vignesh kumar
 
Spanning Tree Protocol (STP).pptx
Spanning Tree Protocol (STP).pptxSpanning Tree Protocol (STP).pptx
Spanning Tree Protocol (STP).pptxVignesh kumar
 
Network basic interview questions.
Network basic interview questions.Network basic interview questions.
Network basic interview questions.Vignesh kumar
 
What is Network Security.pptx
What is Network Security.pptxWhat is Network Security.pptx
What is Network Security.pptxVignesh kumar
 
What is Subnet Mask.pptx
What is Subnet Mask.pptxWhat is Subnet Mask.pptx
What is Subnet Mask.pptxVignesh kumar
 
Types of Storage Devices in Network
Types of Storage Devices in NetworkTypes of Storage Devices in Network
Types of Storage Devices in NetworkVignesh kumar
 
Virtual Local Area Networks (VLANs) and Types.pptx
Virtual Local Area Networks (VLANs) and Types.pptxVirtual Local Area Networks (VLANs) and Types.pptx
Virtual Local Area Networks (VLANs) and Types.pptxVignesh kumar
 
What is NET Bios.pptx
What is NET Bios.pptxWhat is NET Bios.pptx
What is NET Bios.pptxVignesh kumar
 
domain controller vs child domain controller.
domain controller vs child domain controller.domain controller vs child domain controller.
domain controller vs child domain controller.Vignesh kumar
 
PRTG Network Monitoring Tool.pptx
PRTG Network Monitoring Tool.pptxPRTG Network Monitoring Tool.pptx
PRTG Network Monitoring Tool.pptxVignesh kumar
 
What is mail server? ,what is WHM?
What is mail server? ,what is WHM?What is mail server? ,what is WHM?
What is mail server? ,what is WHM?Vignesh kumar
 
HELP DESK interview questions and answers
HELP DESK interview questions and answersHELP DESK interview questions and answers
HELP DESK interview questions and answersVignesh kumar
 

More from Vignesh kumar (20)

Multiprotocol label switching (MPLS).pptx
Multiprotocol label switching (MPLS).pptxMultiprotocol label switching (MPLS).pptx
Multiprotocol label switching (MPLS).pptx
 
CCNP in networking notes #ccna #ccnp notes
CCNP in networking notes #ccna #ccnp notesCCNP in networking notes #ccna #ccnp notes
CCNP in networking notes #ccna #ccnp notes
 
OSI model full details
OSI model full detailsOSI model full details
OSI model full details
 
what is Cloud VPN.pptx
what is Cloud VPN.pptxwhat is Cloud VPN.pptx
what is Cloud VPN.pptx
 
 Site to Site VPN.pptx
 Site to Site VPN.pptx Site to Site VPN.pptx
 Site to Site VPN.pptx
 
Desktop Support Engineer Roles
Desktop Support Engineer Roles Desktop Support Engineer Roles
Desktop Support Engineer Roles
 
Spanning Tree Protocol (STP).pptx
Spanning Tree Protocol (STP).pptxSpanning Tree Protocol (STP).pptx
Spanning Tree Protocol (STP).pptx
 
Network basic interview questions.
Network basic interview questions.Network basic interview questions.
Network basic interview questions.
 
What is Network Security.pptx
What is Network Security.pptxWhat is Network Security.pptx
What is Network Security.pptx
 
What is Subnet Mask.pptx
What is Subnet Mask.pptxWhat is Subnet Mask.pptx
What is Subnet Mask.pptx
 
Types of Storage Devices in Network
Types of Storage Devices in NetworkTypes of Storage Devices in Network
Types of Storage Devices in Network
 
Virtual Local Area Networks (VLANs) and Types.pptx
Virtual Local Area Networks (VLANs) and Types.pptxVirtual Local Area Networks (VLANs) and Types.pptx
Virtual Local Area Networks (VLANs) and Types.pptx
 
What is RAID.pptx
What is RAID.pptxWhat is RAID.pptx
What is RAID.pptx
 
What is NET Bios.pptx
What is NET Bios.pptxWhat is NET Bios.pptx
What is NET Bios.pptx
 
domain controller vs child domain controller.
domain controller vs child domain controller.domain controller vs child domain controller.
domain controller vs child domain controller.
 
PRTG Network Monitoring Tool.pptx
PRTG Network Monitoring Tool.pptxPRTG Network Monitoring Tool.pptx
PRTG Network Monitoring Tool.pptx
 
c-Panel vs WHM.pptx
c-Panel vs WHM.pptxc-Panel vs WHM.pptx
c-Panel vs WHM.pptx
 
What is mail server? ,what is WHM?
What is mail server? ,what is WHM?What is mail server? ,what is WHM?
What is mail server? ,what is WHM?
 
SSL VS TLS.pptx
SSL VS TLS.pptxSSL VS TLS.pptx
SSL VS TLS.pptx
 
HELP DESK interview questions and answers
HELP DESK interview questions and answersHELP DESK interview questions and answers
HELP DESK interview questions and answers
 

Recently uploaded

Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 

Recently uploaded (20)

Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 

port forwarding.pptx

  • 2. WHAT IS PORT FORWARDING? • Port forwarding, also known as port management, allows remote servers and devices on the internet to be able to access devices that are on a private network. • If you are not using port forwarding, only devices on that private internal network can have access to each other or your network. • A port is a communication endpoint and is identified as a port number that is always associated with an IP address.
  • 3. Four ways to mitigate the security impact of port forwarding • 1. Only forward ports to devices in a DMZ • 2. Only forward the specific ports that are required • 3. Restrict the IP addresses that are allowed to access the port forward. • 4. Don't port forward at all.
  • 4. ONLY FORWARD PORTS TO DEVICES IN A DMZ • Forwarding ports through a DMZ gives you an extra layer of security and protects your network from being vulnerable. • A DMZ or demilitarized zone is a perimeter that protects and adds an extra layer of security to an organization’s internal network from untrusted outside traffic.
  • 5.
  • 6. ONLY FORWARD THE SPECIFIC PORTS THAT ARE REQUIRED • Forwarding to specific ports that you need will make your network much safer. • If you were to forward to lots of different ports that may not be necessary, you could be opening up your network to cyber-attacks and data breaches.
  • 7. RESTRICT THE IP ADDRESSES THAT ARE ALLOWED TO ACCESS THE PORT FORWARD. • If you aren’t restricting IP addresses, your server could be accessed by a malicious source. • You can allow access to specific IP addresses so that only those IP addresses have access to your server. • If you have a vendor that requires access to a server that you manage, then you can restrict access to the port forward for that server to only the IP addresses that your vendor uses.
  • 8. DON'T PORT FORWARD AT ALL. • Instead of port forwarding, you can use services like SASE which uses secure VPN tunnels to allow authenticated and secured access to resources.
  • 9. Local Port Forwarding Local Port Forwarding is the common type of port forwarding. It is used to let a user connect from the local computer to another server, i.e forward data securely from another client application running on the same computer as a Secure shell client. By using local port forwarding , firewalls that block certain web pages are able to Bypass. Remote Port Forwarding This form of port forwarding enables applications on the server side of a secure shell. There are proprietary for the same general purpose. To use remote port forwarding the address of the destination server and two port number must be known. The port number chosen depend on which application is to be used.
  • 10. Port Number Usage 20 File Transfer Protocol (FTP) Data Transfer 21 File Transfer Protocol (FTP) Command Control 22 Secure Shell (SSH) 23 Telnet - Remote login service, unencrypted text messages 25 Simple Mail Transfer Protocol (SMTP) E-mail Routing 53 Domain Name System (DNS) service 80 Hypertext Transfer Protocol (HTTP) used in World Wide Web 110 Post Office Protocol (POP3) used by e-mail clients to retrieve e-mail from a server 119 Network News Transfer Protocol (NNTP) 123 Network Time Protocol (NTP) 143 Internet Message Access Protocol (IMAP) Management of Digital Mail 161 Simple Network Management Protocol (SNMP) 194 Internet Relay Chat (IRC) 443 HTTP Secure (HTTPS) HTTP over TLS/SSL 14 common network ports