What is Port Blocking within LAN ?
Last Updated :
17 Dec, 2021
Port Blocking is the action performed by an Internet Service Provider (ISP) to identify and block the Internet traffic by using the Port Number and Transfer Protocol.
Port Blocking within LAN refers to restricting the users from accessing a set of Services within the local area network. This may include blocking physical ports like USB, removable devices, DVD/CD-ROM, floppy, smartphones, and many such plug-and-play devices.
Need of Port Blocking within LAN
Consider a scenario where DHCP service is enabled within your network. Now if any user with a laptop connects the LAN cable with your device, with this connectivity that user can get your IP address from the DHCP and can access your network resources. So to avoid this if port security can be enabled within the LAN, then whenever the port gets mismatched with the MAC-Address, the switch will shut the port off and the anonymous user will not get the IP.
Example: Suppose we want to block a switch port with a particular MAC address. Consider we have an 8-port switch, now if we connect a machine having MAC Address suppose 2c.54.91.88.c9.e3 and we block the switch port with this address, whenever a foreign mac address other than the above one is detected, your switch will cut the connection off and your machine will be secured.
The data transmission takes place through some specific ports. For routing the traffic, Computer uses port numbers. Some ports use Transmission Control Protocol (TCP) whereas some use User datagram protocol (UDP). These protocols determine the data transmission i.e. how the data should be transferred once computers are connected to each other over a network.
Steps to Block Ports on Computer
1. Go to Start -> Control Panel -> System and Security -> Windows Firewall.
2. Select ‘Advance Settings’ -> ‘Inbound Rules’ (to block an inbound port)’ OR ‘Outbound Rules’ (to block an outbound port).
3. Select ‘New Rule‘ choose ‘Port‘ from options and click Next.
4. Choose ‘TCP‘ or ‘UDP‘ and click on ‘Specific Local Ports‘.
5. Enter the Port Number and click ‘Next‘.
6. Click ‘Block the Connection‘ and then click ‘Next‘. Choose the network location (public, private, domain) on which the rule applies and click ‘Next‘.
7. Create a Rule name and add a description for it. Click on ‘finish‘ to block ports on a computer.
Impact of blocking
Many of the ports are usually associated with the windows application. they appeal to the hackers because of the lack of expertise in system administration and network security.
The services which are used by these ports are not meant to be used across a wide area network or between the management domains; so blocking the port will not impact the properly designed applications except a few older applications.
Advantages
1. Port Blocking within LAN helps prevent unwanted data from entering your computer.
2. Faster network.
Disadvantages:
1. Improper functionality of applications since applications lose access to the ports which are supposed to be used by them for proper working.
2. It complicates the process of designing and developing an application and creates unreliability about whether the product or application will properly work or not.
Similar Reads
What is Port Blocking within LAN ?
Port Blocking is the action performed by an Internet Service Provider (ISP) to identify and block the Internet traffic by using the Port Number and Transfer Protocol. Port Blocking within LAN refers to restricting the users from accessing a set of Services within the local area network. This may inc
3 min read
What is Ports in Networking?
Whenever any application in one computer sends data to another application of a different computer then it sends using IP Address and MAC Address but how does our computer know that this data is for a specific application and this data is sent by any specific application? There comes the concept of
4 min read
What is IP Blocklisting?
IP blacklisting is a security measure used to block access to a network or system from specific IP addresses. IP blacklisting is one of the simplest and most effective kinds of access denial in the world of computers. Blacklists are lists that comprise IP address ranges or single addresses that you
5 min read
Port Scan in Ethical Hacking
Port Scanning is the name of the technique used to identify available ports and services on hosts on a network. Security engineers sometimes use it to scan computers for vulnerabilities, and hackers also use it to target victims. It can be used to send connection requests to target computers and the
2 min read
Configuring Port Security on Cisco IOS Switch
Overview :Switch is a network device, which is configured to connect and maintain communication channel between various devices. Ethernet ports are present on a switch, which are used to connect devices, such as Router, computer system and Laptop in the network. To connect all these network, Etherne
4 min read
Blocking Methods in Java
Blocking methods in java are the particular set of methods that block the thread until its operation is complete. So, they will have to block the current thread until the condition that fulfills their task is satisfied. Since, in nature, these methods are blocking so-called blocking methods. For exa
4 min read
What is Port 80?
Whenever someone tries to access a website and its content then the port 80 is used for that purpose but how does the computer know it needs to use the port 80? and how is data sent to the browsers using this port. For that, we need to understand what is port 80. What is Port 80?Whenever we go to a
5 min read
What is Network Port?
In today's technological age, data stands out as a crucial asset, and to make regular advancements, we need to share data among ourselves. We can share data in two ways either using wired connections or the internet. In wired connections, we use connectors called physical ports for the transfer of d
8 min read
What is TCP-ACK Scanning?
TCP-ACK is a third step of the TCP 3-Way Handshake process (SYN, SYN-ACK, ACK). In TCP-ACK, the client acknowledges the response of the Server, and establish a connection to proceed with the data transfer and any other communication processes. TCP-ACK Scanning: In this scan, the ACK packets are sent
2 min read
What is a Switch Port?
A network switch is a piece of hardware that allows computers to communicate with one another. It accepts physical connectors from computers and other network devices and then uses packet switching to receive and forward data. Connecting different devices to the ports on a network switch allows them
2 min read