Personally I would look at it the other way. Open up the ports you know that you are going to need, such as http, https, ftp, dns, ntp & smtp then block all else. You can log what is blocked and wait for someone to complain about what they can't get to and find the corresponding block log to identify the port required.
|