W
Will
I have a Windows 2003 Server Domain Controller with Windows Firewall enabled
and set up correctly, and the domain controller works fine. But I
occasionally see dropped packets for protocols in the pfirewall.log file
that are absolutely authorized for travel through the firewall. For
example, we have rules that allow any incoming packets on UDP ports 53, 88,
and 389, yet I still see entries in Windows firewall such as these:
2008-03-05 18:47:00 DROP UDP 192.168.14.121 192.168.105.13 3825 389
246 - - - - - - - RECEIVE
2008-03-05 18:47:00 DROP UDP 192.168.14.121 192.168.105.13 3825 389
246 - - - - - - - RECEIVE
2008-03-05 18:47:00 DROP UDP 192.168.14.121 192.168.105.13 3825 389
246 - - - - - - - RECEIVE
2008-03-05 18:47:00 DROP UDP 192.168.14.121 192.168.105.13 3825 389
246 - - - - - - - RECEIVE
2008-03-05 18:47:01 DROP UDP 192.168.14.121 192.168.105.13 3826 53
105 - - - - - - - RECEIVE
2008-03-05 18:47:02 DROP UDP 192.168.14.121 192.168.105.13 3830 88
1403 - - - - - - - RECEIVE
192.168.105.13 is the host that is protected by the firewall in this case,
and 192.168.14.121 is a member server communicating to the domain
controller.
I'm well aware of the many special requirements that domain controllers have
when used with firewalls. I don't need to read Knowledgebase 555381 for
example.
My question is under what circumstances does it make sense for the firewall
to be blocking the above UDP packets when the firewall rule explicitly
allows them as exceptions? Maybe someone who understands details about
the Windows Firewall's internals could explain why such packets might be
dropped.
--
Will
and set up correctly, and the domain controller works fine. But I
occasionally see dropped packets for protocols in the pfirewall.log file
that are absolutely authorized for travel through the firewall. For
example, we have rules that allow any incoming packets on UDP ports 53, 88,
and 389, yet I still see entries in Windows firewall such as these:
2008-03-05 18:47:00 DROP UDP 192.168.14.121 192.168.105.13 3825 389
246 - - - - - - - RECEIVE
2008-03-05 18:47:00 DROP UDP 192.168.14.121 192.168.105.13 3825 389
246 - - - - - - - RECEIVE
2008-03-05 18:47:00 DROP UDP 192.168.14.121 192.168.105.13 3825 389
246 - - - - - - - RECEIVE
2008-03-05 18:47:00 DROP UDP 192.168.14.121 192.168.105.13 3825 389
246 - - - - - - - RECEIVE
2008-03-05 18:47:01 DROP UDP 192.168.14.121 192.168.105.13 3826 53
105 - - - - - - - RECEIVE
2008-03-05 18:47:02 DROP UDP 192.168.14.121 192.168.105.13 3830 88
1403 - - - - - - - RECEIVE
192.168.105.13 is the host that is protected by the firewall in this case,
and 192.168.14.121 is a member server communicating to the domain
controller.
I'm well aware of the many special requirements that domain controllers have
when used with firewalls. I don't need to read Knowledgebase 555381 for
example.
My question is under what circumstances does it make sense for the firewall
to be blocking the above UDP packets when the firewall rule explicitly
allows them as exceptions? Maybe someone who understands details about
the Windows Firewall's internals could explain why such packets might be
dropped.
--
Will