In any discussion about network security — which includes protecting both the voice and data communications –, there is always some mention of “ports.” By this, we do *not* mean deep-sea harbors (which are my favorite!), of course, but the “holes” made in the firewall so that some communication protocols can pass through.
It is not intended for you to get too deep technically on this topic, but it is an item of importance. Plus, there is uncertainty whether 100% of everyone fully understands what significance ports play in a networked environment. So, let’s discuss that… specifically, what do you do (or should you do) as it pertains to ports and securing an environment?
When responding to this topic, it is important to consider the context of ports, services, and protocols. If you are involved in network security,
Explain your approach.
And related to this, what is the best rule — shut everything off, then allow the services you need *or* turn everything on and shut off the bad stuff?
By the way, if you do need a quick link that identifies some of the ports and services, check out: