Securing Application Ports for Reverse Connections
By default, reverse connections from resources to users have access to all ports on users’ computers. For
enhanced security, create access control rules for reverse connections that confine access to the ports that an
application specifically uses. Consult the application’s documentation for information about which firewall ports
must be open in order to use the application.
When configuring an access rule for a reverse connection, use the Destination restrictions option to confine
access to the ports required by the application making the reverse connection. See Configuring Advanced Access Control Rule Attributes for information on this option.
Was This Article Helpful?
Help us to improve our support portal