Ports Blocked on SmartCom’s Network

Introduction

For the protection of the network and our customers, Smartcom blocks certain ports. Learn which ports are blocked and why.

List of ports that are blocked

The ports listed below are blocked to protect against common viruses and worms, malicious intruders, and other security risks. These ports are blocked to protect our customers and the integrity of the Smartcom Network; these blocks cannot be lifted.

PortTransportProtocolHow and why it’s blocked
0TCPN/AInbound and outbound, blocked by default.Port 0 is a reserved port, which means it should not be used by applications. Network abuse has prompted the need to block this port.E
68UDPBOOTP/DHCPInbound only, blocked by default. Used to obtain dynamic Internet protocol (IP) address information from Smartcom’s dynamic host configuration protocol (DHCP) server that assigns IP addresses to customer computers. DHCP ports can be used for malicious attacks, such as obtaining access to a computer or network and its devices.
135-139TCP/UDPNetBIOSInbound and outbound, blocked by default. Allows file sharing over networks. When improperly configured, they can expose critical system files or give full file system access (run, delete, copy) to any malicious intruder connected to the network.
161-162TCP/UDPSNMPInbound and outbound, blocked by default. SNMP is vulnerable to reflected amplification distributed denial of service (DDoS) attacks.
445TCPMS-DS-SMBInbound and outbound, blocked by default. Security risks; vulnerable to attacks, exploits, and worms (such as Sasser and Ninder).
520TCP/UDPRIPInbound and outbound, blocked by default. Vulnerable to malicious route updates, which provide several attack possibilities.
1080TCPSOCKSInbound only, blocked by default. Multiple vulnerabilities (viruses, worms, DoS attacks).