See also /tag/firewall-software
Firewall rules ∞
Blizzard / World of Warcraft ∞
|TCP Ports||UDP Ports|
|Battle.net app||80, 443, 1119||80, 443, 1119|
|Voice Chat||80, 443, 1119||3478-3479, 5060, 5062, 6250, 12000-64000|
|Downloader||1119, 1120, 3724, 4000, 6112-6114||1119, 1120, 3724, 4000, 6112-6114|
|World of Warcraft||3724, 1119, 6012||3724, 1119, 6012|
Some old notes ∞
6881/udpis optionally used for fetching additional peers.
4444/udpis the “UDP tracker port”
9420is used by FoxTorrent
- Gnutella: 6346:6348/tcp
The common stuff all in one ∞
6881:6999/tcp 6881:6999/udp 4444/udp 6680:6699/tcp 123/udp 6346:6348/tcp 9420/tcp 9420/udp
Firewall notes ∞
Some Host-Based Firewalls (designed to protect a single machine):
Some Network Firewalls (designed to protect a network of machines):
Certain firewall software packages can be run as either network or host-based firewalls, a few of examples are:
Uwe Hermann’s firewall script ∞
Tested 2005-09-13, on (distribution not recorded) – My notes had kwrite and konsole, so perhaps it was PCLinuxOS.
These notes are not mine. Perhaps I never tested this script.
- Cut and paste that webpage into an editor, making sure to keep the formatting the same.
- Save the file to your home directory as
- Open up a terminal, type
suand then your root password
Issue the command
cd /home/yourusername chmod +x firewall cp firewall /usr/bin
- next command:
put “firewall” on one line without quotes then
ctrl +xto save
At every boot, the firewall will be run.
Timothy Scott Morizot’s firewall generator ∞
Tested 2009-07-18 on Slackware 12.2, updated 2009-07-17. Seems to work just fine.. but I’m not sure how to test it. =p