Tnx for the PM, Pier2e, regarding ways to tighten security with these Inbound ports for WLM.
You already have the Inbound Network Monitor rules to Allow TCP/UDP (both protocols, correct?) to a range of Destination Ports 1024 - 5000; I imagine this is from Any Source IP to Any Destination IP, with Any Source Port as well. This allows the firewall to accept inbound traffic on those ports.
Since there probably is not any real way to tighten up the Network Monitor rule (unless your friends have static IP addresses), we will have to focus on Application Monitor, and take a few steps to add some layers of security there.
Essentially, you want your application rule for WLM to match the Network Monitor rule for those Protocols and Ports. You also want to make sure that no other application is allowed to receive Inbound connections for those ports, to minimize risk. This is because with CFP, in order to it to accept the traffic to Network Monitor, there must be an allowed application in Application Monitor actively running and listening on those Ports. So we want to make sure that is only WLM.
This means the first thing to do will be to remove the existing Application Monitor rule for WLM’s executable (make note of application and parent). Then you will add a new one. This rule will be the same .exe and Parent. The rest will be like this:
Action: Allow
Protocol: TCP
Direction: Out
Destination IP: Any
Destination Port: A Set of Ports: 80,443,1863,7001
Miscellaneous: (leave it blank - nothing checked)
Then Add a second rule for WLM. Same Application .exe, same Parent.
Action: Allow
Direction: In
Protocol: TCP/UDP
Destination IP: Any
Destination Port: A range of Ports: 1024 - 5000
Miscellaneous: (leave it blank - nothing checked)
Now you will want to Edit every other Application rule that shows to accept Inbound TCP/UDP connections (which may be several). On each, in the Destination Port tab, select the “Exclude” box, then check a Range of Ports: 1024-5000. This will keep them from accepting inbound connections on those ports.
The final step will be to go to Security/Advanced/Miscellaneous. Move the Alert Frequency slider to High. This will mean that all Application Monitor rules will include a level to detail of: Application, Direction, Protocol, and Port.
This will give you a greater level of control over how each application is allowed to Connect. However, you will thus see more alerts for each application, which may seem like duplicates. You also may end up with more rules for each application in Application Monitor. That’s the down-side of the increased detail levels.
If you have any questions about these, please ask. I’m posting this here in this WLM thread for everyone’s benefit.
LM