Filtered Ports: Difference between revisions

From XMission Wiki
Jump to navigation Jump to search
DoS
remove the redundant redundancy
Line 21: Line 21:


== UTOPIA ==
== UTOPIA ==
Currently at this time we do not have any filtered ports for customers specific to UTOPIA
At this time we do not have any filtered ports for customers specific to UTOPIA


[[Category:Troubleshooting]]
[[Category:Troubleshooting]]

Revision as of 15:57, 3 September 2014

Network Wide

The following ports are filtered at XMission's borders, primarily due to their abuse in "Denial of Service" attacks.

  • 19 (udp) chargen
  • 1900 (udp) SSDP
  • 53 (udp) domain - IP addresses that test positive for open recursion DNS servers
  • 123 (udp) ntp - IP addresses that test positive for open query NTP servers

DSL / Dialup

We currently filter (block) the following ports on all DSL and Dialup connections by default:

  • 135 (tcp, udp)
  • 137-139 (tcp, udp) NETBIOS
  • 445 (tcp, udp) Microsoft-DS (CIFS)
  • 1433, 1434 (udp) MS SQL Server
  • 4444 (tcp) Worm-sign
  • 31337 (tcp) BackOrifice

We filter and block these ports by default to cut down on the number of 'drive-by' infections.

UTOPIA

At this time we do not have any filtered ports for customers specific to UTOPIA