# How to confirm firewall settings and close port 29644 on NovaSeq 6000

Before making firewall modifications, confirm with your system or network administrator that the following changes will not conflict with existing policies.

#### **Confirm that Firewall is Enabled**1. Open the **Windows Defender Firewall with Advanced Security** application.

1. #### Select **Inbound Rules**. Two rules should exist for **universal-copy-service**: one for Transmission Control Protocol (TCP) and one for User Datagram Protocol (UDP).

![](https://761066130-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGM9W2DuBTgEXv1ClCm8H%2Fuploads%2Fgit-blob-339e2e296a75b8a19cb29aefc86b47755ec8bc38%2Fimage1.png?alt=media\&token=05b2cce2-a02e-4dce-83c8-da3a4f226e7a)

2. Double-click the universal-copy-service rule and edit the properties as follows.
3. Navigate to the **General** tab, and then ensure that **Block the connection** is selected

![](https://761066130-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGM9W2DuBTgEXv1ClCm8H%2Fuploads%2Fgit-blob-c9e8ce8944b4743a610de11c2d0d93bddd28e60f%2Fimage2.png?alt=media\&token=bb6e58c3-4303-4410-a90d-301c1115d06d)

3. If currently set to "Allow the connection", select the "Block the connection" option, and then select **Apply**.
4. Navigate to the **Advanced** tab, and ensure the **Domain**, **Private**, and **Public** checkboxes are selected.
5. If any checkboxes are not selected, select the **Domain**, **Private**, and **Public** checkboxes as needed, and then select **Apply**.
6.

```
![](https://761066130-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGM9W2DuBTgEXv1ClCm8H%2Fuploads%2Fgit-blob-8651b46088f787dfab13734f05b8787dab3505df%2Fimage3.png?alt=media)
```

7. To return to the list of inbound rules, select OK.
8. Repeat for the remaining UCS rule.
9. In **Inbound Rules**, confirm that the UCS rules are set to **All** in the **Profile** column and **Block** in the **Action** column.

###

#### **Confirm that Firewall Port 29644 is Blocked**

1. Open the **Windows Defender Firewall with Advanced** Security application.
2. Select Inbound Rules.
3. From the Actions pane, select New Rule.\
   ![](https://761066130-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGM9W2DuBTgEXv1ClCm8H%2Fuploads%2Fgit-blob-97fd749b8ec8f4173c8491fa4da8a566a7b0d06d%2Fimage4.png?alt=media)
4. For the rule type, select **Port**, and then select **Next**.\
   ![](https://761066130-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGM9W2DuBTgEXv1ClCm8H%2Fuploads%2Fgit-blob-fcb3fbb8bf7ff520648d40772c7606d962c7a570%2Fimage5.png?alt=media)
5. Select "Specific local ports", and enter **29644** then select **Next**. ![](https://761066130-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGM9W2DuBTgEXv1ClCm8H%2Fuploads%2Fgit-blob-863a70571a83e3b71c09f82f3202a2c9cf9236fb%2Fimage6.png?alt=media)
6. Select "Block the connection", and then select **Next**.\
   ![](https://761066130-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGM9W2DuBTgEXv1ClCm8H%2Fuploads%2Fgit-blob-8f0edcb043c5ac89490dc25fd1eb378787dbbb91%2Fimage7.png?alt=media)
7. To apply the rule to each profile type, select the **Domain**, **Private**, and **Public** checkboxes. Select **Next**.\
   ![](https://761066130-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGM9W2DuBTgEXv1ClCm8H%2Fuploads%2Fgit-blob-63e1a1ce9ee67ab23f12ac408ff8a5f012aeb942%2Fimage8.png?alt=media)
8. Enter a name for your new rule (for example, block port 29644). \[Optional] Add a description to the rule.\
   ![](https://761066130-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FGM9W2DuBTgEXv1ClCm8H%2Fuploads%2Fgit-blob-92043e221fac105ea0d492b598d908ef63834fbb%2Fimage9.png?alt=media)
9. Select **Finish**.
10. Repeat steps 3-9, selecting the **UDP** radio button under 'Does this rule apply to TCP or UDP?' selection in Step 5.

\
\
\ <br>

|                                                                                                                                                                                                                                                                                                                                                                        |
| :--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------: |
| *For any feedback or questions regarding this article (Illumina Knowledge Article #7848), contact Illumina Technical Support* [*techsupport@illumina.com*](mailto:techsupport@illumina.com?subject=Question%2FFeedback%20Regarding%20Illumina%20Knowledge%20Article%20#000007848%20-%20Instrumentation%20\&body=Dear%20Illumina%20Technical%20Support,%0D%0A%0D%0A)*.* |
