1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

XP W2K3 W2K8 disabling UDP:69

Discussion in 'Windows Server System' started by metallica1973, 2012/02/02.

  1. 2012/02/02
    metallica1973

    metallica1973 Inactive Thread Starter

    Joined:
    2009/01/09
    Messages:
    8
    Likes Received:
    0
    I have a situation in which a PCI audit was conducted on our network. They found on several of our systems UDP:69 was found listening. We checked all of the machines that included XP,W2K3 server, W2K8 server and found that TFTP was not running as a service but only that the port was listening. I ran nmap against the ports and saw that they are in an open state. So I was asked to go around these system and disable these ports from listening. Some of these servers are Domain Controllers and most do not have firewalls running on them and are not permitted to have them enabled on them as well. So after reading several articles I was unable to disable UDP:69 using IPsec or going into c:\system32\drivers\etc\services like so forums have suggested.

    http://www.windowsnetworking.com/ar...erver-2008-advanced-firewall-MMC-snap-in.html



    http://support.microsoft.com/kb/813878



    http://www.techrepublic.com/blog/ne...igurations-on-windows-server-2008-systems/481

    Any suggestions ???
     
  2. 2012/02/02
    Arie

    Arie Administrator Administrator Staff

    Joined:
    2001/12/27
    Messages:
    15,174
    Likes Received:
    412
    TCP and UDP port 69 are reserved for TFTP. Windows does not run a TFTP service by default so if your box is listening on port 69 some application or trojan is opening the port.

    So you should be looking at what is listening.
     
    Arie,
    #2

  3. to hide this advert.

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.