Feb 19, 2016 · udp for netlogon and netbios; TCP 139 for ; Opening above ports in Firewall between client computers and domain controllers, or between domain controllers, will enable Active Directory to function properly. "Please check the below link for more details.

Any decent firewall should have rules to implicitly deny NetBIOS towards the internet. Not doing that can result in situations like the well known Wannacry attack. Regarding the DNS servers, one of them may have additional roles installed (like client update services) that may use NetBIOS, but it should do that only within your network. "closing most ports through your firewall makes you secure" is a poor way to think about things. Closing ports makes you more secure by reducing attack surface and attacker access to vulnerabilities. "closing most ports through your firewall makes you more secure – Adam Shostack Aug 10 '16 at 22:59 Apr 29, 2020 · NetBIOS ports - This uses TCP/UDP port 137, TCP port 139, and TCP port 445. These ports are used when installing clients/agents via Remote Install and when clients/agents send quarantined files to the server using the UNC path. CIFS uses UDP ports 137 and 138, and TCP ports 139 and 445. Your storage system sends and receives data on these ports while providing CIFS service. If it is a member of an Active Directory domain, your storage system must also make outbound connections destined for DNS and Kerberos. The firewall on the SQL server is very restrictive. 1433 is open to my web server, but I'm getting conflicting information from the web on what additional ports (TCP/UDP) are needed for NTLM to succeed. It is currently fail; I can talk on 1433 to request NTLM, but the actual authentication always fails.

Feb 19, 2020 · If any of the above ports are restricted using a firewall or any other mechanism, IBM i Access or related functions may fail to operate. For assistance with configuring ports or working with a firewall beyond the above information, contact the firewall provider or obtain a consulting agreement.

NetBIOS over TCP/IP ports should never be allowed through a perimeter firewall. Period. To clarify how NetBIOS over TCP/IP works, it allows the use of NetBIOS over ports 137,138, and 139. It doesn't *enforce* it. File shares *can* use NetBIOS for access, but doing so is very outdated and unnecessary since the introduction of the SMB protocol Especially if the firewall is between your internal network and Internet. The problem with NBT is that at once you open it up through the firewall, people will have potential access to all NetBios services, not just a selection of them, such as printing. The following is a list of the ports used by NBT. * netbios-ns 137/tcp NETBIOS Name Service

CIFS uses UDP ports 137 and 138, and TCP ports 139 and 445. Your storage system sends and receives data on these ports while providing CIFS service. If it is a member of an Active Directory domain, your storage system must also make outbound connections destined for DNS and Kerberos.

Hello, I've recently had to move an AS400 system behind an internal ASA firewall and now users are unable to browse to it. The ASA is running Version 8.2(5) I get these messages: Sep 11 2012 17:09:59: %ASA-7-710005: UDP request discarded from 172.19.241.35/137 to outside:172.19.241.255/137 Is t Port 1433 is a common port used for SQL Server traffic, but additional ports may need to be opened as well. Please review this Microsoft knowledge base article for detailed information on how to allow SQL Server traffic through a firewall. I have a fortigate 90D. It is set to block netbios broadcast traffic, but it all gets logged, thousands per day. I have read conflicting opinions on disabling Netbios across the network, some say to rid of it, some say to keep it for legacy support and for network browsing. I can disable this on my Active Direcoty netowrk using DHCP option 001.