Best practice - should we turn off any of these ports?

This support forum board is for support questions relating to Nagios XI, our flagship commercial network monitoring solution.
Locked
PhilG
Posts: 286
Joined: Thu Jan 16, 2014 10:24 am

Best practice - should we turn off any of these ports?

Post by PhilG »

Hello:
I had my security guy check to see if we are applying good security practices and had him run a scan against our Nagios XI monitoring server.
He identified the following:
"
For the most part things look good. There are a few open ports that I would question both why they are open and what is using them.
Those ports are:
5666
8400
8402
9998
There are more ports open of course, but they are easily identified (ssh, apache, ntp, etc..)
"
I am noting that it's obvious that we would need to allow for port 5666 for NRPE checks, but what would you suggest to keep and/or close - I'm thinking at least 9998 should be?
Thank you.
Newbie '14
User avatar
lmiltchev
Bugs find me
Posts: 13589
Joined: Mon May 23, 2011 12:15 pm

Re: Best practice - should we turn off any of these ports?

Post by lmiltchev »

Yes, tcp port 5666 is for NRPE checks,(usually it's open on the client box that you are monitoring via NRPE). I am not sure about the rest of the ports, but you can probably run nmap against these ports and try to identify what they are used for...

Code: Select all

nmap localhost -p <port number>
for udp ports

Code: Select all

nmap -sU localhost -p <port number>
Be sure to check out our Knowledgebase for helpful articles and solutions!
PhilG
Posts: 286
Joined: Thu Jan 16, 2014 10:24 am

Re: Best practice - should we turn off any of these ports?

Post by PhilG »

You may freeze this post.
Newbie '14
cmerchant
Posts: 546
Joined: Wed Sep 24, 2014 11:19 am

Re: Best practice - should we turn off any of these ports?

Post by cmerchant »

We'll go ahead and close this thread. Thanks.
Locked