Identifying Firewall as the Problem
Firewall-blocked traffic symptoms: connection timeout (no response, not 'connection refused'), specific port fails while others work (port filtering), all traffic fails after a rule change, traffic works from some sources but not others (source-IP-based rules).
Testing methodology: ping works but application fails → application port is blocked. Use 'telnet host port' or 'Test-NetConnection -ComputerName host -Port port' to test specific TCP ports. 'Connection refused' = port reachable, no service listening. 'Connection timed out' = firewall dropping. Compare what ports work vs don't work to identify the rule pattern.
Bypass testing: test from a known-allowed source to confirm the firewall is the difference. If the same traffic works from the firewall administrator's workstation but not from the user's subnet, the rule is source-IP-based.
Common Firewall Problems
Missing permit rule: a new application requires a port that was never opened. Rule not added after deployment. Fix: add the required permit rule for the specific source, destination, and port.
Rule order: a deny rule appears before the permit rule for specific traffic — first match wins, so the deny takes effect. Review rule order — move the permit rule above the conflicting deny.
Stateful firewall returning traffic blocked: the outbound rule exists, but the return traffic (responses from the server) is being blocked by an inbound rule. Stateful firewalls should handle this automatically if the connection was established outbound — check if 'established' or 'related' return traffic is permitted.
NAT not working with firewall: when NAT and firewall rules coexist, the order of rule evaluation matters. Traffic may need to match NAT rules before or after firewall rules depending on the platform. Check NAT translations and firewall logs together.
ACL blocking DHCP or DNS: ACLs that are too restrictive may block UDP 53 (DNS) or UDP 67/68 (DHCP) traffic, preventing basic network services. Always verify that fundamental services (DNS, DHCP, ICMP for ping) are permitted in ACLs.