Difference between revisions of "Filtered Ports"
From XMission Wiki
(DoS) |
|||
Line 1: | Line 1: | ||
== Network Wide == | == Network Wide == | ||
− | The following ports are filtered at XMission's borders. | + | The following ports are filtered at XMission's borders, primarily due to their abuse in "Denial of Service" attacks. |
*19 (udp) chargen | *19 (udp) chargen |
Revision as of 15:53, 3 September 2014
Network Wide
The following ports are filtered at XMission's borders, primarily due to their abuse in "Denial of Service" attacks.
- 19 (udp) chargen
- 1900 (udp) SSDP
- 53 (udp) domain - IP addresses that test positive for open recursion DNS servers
- 123 (udp) ntp - IP addresses that test positive for open query NTP servers
DSL / Dialup
We currently filter (block) the following ports on all DSL and Dialup connections by default:
- 135 (tcp, udp)
- 137-139 (tcp, udp) NETBIOS
- 445 (tcp, udp) Microsoft-DS (CIFS)
- 1433, 1434 (udp) MS SQL Server
- 4444 (tcp) Worm-sign
- 31337 (tcp) BackOrifice
We filter and block these ports by default to cut down on the number of 'drive-by' infections.
UTOPIA
Currently at this time we do not have any filtered ports for customers specific to UTOPIA