posted 16 years ago
I understand that there is some ambiguity, but we can definetely defend the answers given as regards port filtering.
Let me start this way:
Port filtering is the task that most people seem to think of when they think of firewalls.There are 65,535 separate TCP and another 65,535 UDP ports that can be used for communications.
A common hacking technique is to do a port scan against an IP address. A port scan is a technique that provides the hacker with a list of the ports that are open. Once the hacker has such a list, they will sometimes try to use protocols (such as Telnet) over ports that are normally used for other purposes as a way of gaining entry into the system.
This is where port filtering comes into play. Port filtering ensures that nothing can pass through an open port except for the protocol that the Administrator has chosen to allow. For example, if port filtering were applied to TCP port 21, then FTP communications would be allowed, but no other types of communications would be allowed over that port.
Port filtering can also deny access to a packet originating from an IP address that the administrator has chosen to block. Port filtering works by examining the packet�s header and looking at things such as the source address, destination address, port number, etc.
After this inital idea of port filtering, we can safely assume, that there is no guarantee even if you have an access to a given port you will be able to run your app in that port since the company firewall might be allowing only some specific kind of packet header on that port.
However you might argue with me, what if you want to do tunneling ???..at this I give up.The company firewall will not be able to prevent that, in that case we have to depend on A.
--Bose
I will meet the fairy queen soon !