Difference between revisions of "Filtered Ports"
From XMission Wiki
(DoS) |
(remove the redundant redundancy) |
||
Line 21: | Line 21: | ||
== UTOPIA == | == UTOPIA == | ||
− | + | At this time we do not have any filtered ports for customers specific to UTOPIA | |
[[Category:Troubleshooting]] | [[Category:Troubleshooting]] |
Revision as of 15:57, 3 September 2014
Network Wide
The following ports are filtered at XMission's borders, primarily due to their abuse in "Denial of Service" attacks.
- 19 (udp) chargen
- 1900 (udp) SSDP
- 53 (udp) domain - IP addresses that test positive for open recursion DNS servers
- 123 (udp) ntp - IP addresses that test positive for open query NTP servers
DSL / Dialup
We currently filter (block) the following ports on all DSL and Dialup connections by default:
- 135 (tcp, udp)
- 137-139 (tcp, udp) NETBIOS
- 445 (tcp, udp) Microsoft-DS (CIFS)
- 1433, 1434 (udp) MS SQL Server
- 4444 (tcp) Worm-sign
- 31337 (tcp) BackOrifice
We filter and block these ports by default to cut down on the number of 'drive-by' infections.
UTOPIA
At this time we do not have any filtered ports for customers specific to UTOPIA