Security ports blocked by Allied Telesis Capital Corporation

Avatar

By Keith Southard

updated 7 months ago

Ports that are blocked by Allied Telesis Capital Corporation - (As of 5/23/2017)

Port
TransportProtocol
Inbound/Outbound
Reason
25TCPSMTPBothSimple Mail Transfer Protocol (SMTP)—used for e-mail routing between mail servers. An industry recommendation to block due to infected computers sending spam email.
68UDPBOOTP, DHCPInboundDesigned to prohibit a customer’s misconfigured network device from impersonating an ISP’s DCHP server.
67UDPBOOTP, DHCPOutboundDesigned to prohibit a customer’s misconfigured network device from impersonating an ISP’s DCHP server.
111UDPRPCBothPortmapper is vulnerable to DDoS(denial of service) attacks.
135-139
TCP/UDPNetBIOSBothNetBIOS services allow file sharing over networks. When improperly configured, they can expose critical system files or give full file system access (run, delete, copy) to any malicious intruder connected to the network.
161-162
TCP/UDP
SNMPBothSNMP is vulnerable to DDoS(denial of service) attacks.
445TCPMS-DS, SMB
BothMicrosoft-DS SMB file sharing - Vulnerable to attacks, exploits and malware.(Sasser and Nimda worms.)
520TCP/UDP
RIPBothRouting Information Protocol (RIP) - Vulnerable to various attacks.
1080TCPSOCKSOutboundSocket Secure (SOCKS) - Vulnerable to viruses, worms and DoS attacks.
1900UDPUPNPOutboundSimple Mail Transfer Protocol (SMTP)—used for e-mail routing between mail servers. An industry recommendation to block due to infected computers sending spam email.
6080TCPHTTPInboundModem management access

Did this answer your question?