Secure Mobile Access 12.4 Administration Guide

Securing Application Ports for Reverse Connections

By default, reverse connections from resources to users have access to all ports on users’ computers. For enhanced security, create access control rules for reverse connections that confine access to the ports that an application specifically uses. Consult the application’s documentation for information about which firewall ports must be open in order to use the application.

When configuring an access rule for a reverse connection, use the Destination restrictions option to confine access to the ports required by the application making the reverse connection. See Configuring Advanced Access Control Rule Attributes for information on this option.

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.