Blocked and Allowed Ports: Difference between revisions
Admin-ulm-1 (talk | contribs) |
No edit summary |
||
| (5 intermediate revisions by 2 users not shown) | |||
| Line 18: | Line 18: | ||
|- | |- | ||
|- | |- | ||
|} | |||
== Region Mannheim == | == Region Mannheim == | ||
The bwCloud-OS networks are accessible from the outside on '''all ports'''. | |||
The following ports are blocked outbound (for all networks): | |||
The following ports are blocked | |||
{| class="wikitable" | {| class="wikitable" | ||
! Transport !! Port | ! Transport !! Port !! Description | ||
|- | |- | ||
| TCP || | | UDP, TCP || 128 || Reserved / GSS X License | ||
|- | |- | ||
| TCP || | | TCP || 129-139 || NetBIOS / RPC | ||
|- | |- | ||
| TCP || | | UDP, TCP || 445 || SMB / Microsoft-DS | ||
|- | |- | ||
| UDP | | UDP || 11211 || Memcached | ||
|- | |- | ||
| UDP || 32100 || IoT | |||
| UDP || 32100 || IoT | |||
|} | |} | ||
| Line 169: | Line 114: | ||
| TCP, UDP || 49664 - 49670 || MS-RPC, allow incoming only established | | TCP, UDP || 49664 - 49670 || MS-RPC, allow incoming only established | ||
|- | |- | ||
|- | |||
| TCP || 25 || SMTP, with explicit allow list | |||
|- | |- | ||
| TCP || 110 || POP | | TCP || 110 || POP | ||
|- | |||
| TCP || 389 || LDAP, with explicit allow list | |||
|- | |- | ||
| TCP || 873 || rsync - maybe make a Server ACL like FTP | | TCP || 873 || rsync - maybe make a Server ACL like FTP | ||
| Line 192: | Line 141: | ||
| TCP || 27017 || MongoDB | | TCP || 27017 || MongoDB | ||
|- | |- | ||
|- | |||
| UDP || 53 || DNS, with explicit allow list | |||
|- | |||
| UDP || 123 || NTP, with explicit allow list | |||
|- | |- | ||
| UDP || 177 || XDMCP, X Display Manager ... | | UDP || 177 || XDMCP, X Display Manager ... | ||
| Line 200: | Line 153: | ||
|- | |- | ||
| UDP || 3283 || Apple Remote Desktop | | UDP || 3283 || Apple Remote Desktop | ||
|- | |||
| UDP || 3478 || STUN, with explicit allow list | |||
|- | |- | ||
| UDP || 3702 || WS-Discovery | | UDP || 3702 || WS-Discovery | ||
Latest revision as of 18:29, 13 April 2026
General
The data centers of the universities of the bwCloud-OS operating sites block certain ports within their respective networks for security reasons. The bwCloud-OS regions are also affected, because the bwCloud-OS hardware is connected to the central network infrastructure.
Some of the public IP ranges of the bwCloud-OS regions are part of the BelWü address space. These addresses are logically outside the network ranges of the hosting universities (the locations of bwCloud). The addresses are treated as external by the firewalls of the respective institutions.
Effects of the Packet Firewall for Users
The most important effect for users is that the network runs more reliably and securely. Many hacker attacks are already blocked at the packet firewall and do not reach the campus or the end systems. The importance of this protection is evident from the fact that attacks now occur almost daily.
However, there are a number of limitations to consider: if services other than the generally allowed ones listed here should be accessible from outside, this must be reported to the university IT. The corresponding service will then be enabled on the packet firewall.
It may also happen that seemingly outbound connections from the instance to certain services do not work. This occurs whenever the external server providing the service tries to establish a return connection to the instance, which is often difficult for the user to verify.
Region Freiburg
TODO: add
| Transport | Port | Protocol | Description | Blocking |
|---|
Region Mannheim
The bwCloud-OS networks are accessible from the outside on all ports.
The following ports are blocked outbound (for all networks):
| Transport | Port | Description |
|---|---|---|
| UDP, TCP | 128 | Reserved / GSS X License |
| TCP | 129-139 | NetBIOS / RPC |
| UDP, TCP | 445 | SMB / Microsoft-DS |
| UDP | 11211 | Memcached |
| UDP | 32100 | IoT |
Region Karlsruhe
In the bwCloud-OS Karlsruhe network, the following ports are blocked:
| Transport | Port | Protocol | Description | Blocking |
|---|---|---|---|---|
| UDP, TCP | 111 | RPC Portmapper | Portmapper Security | inbound/outbound |
Region Ulm
In the bwCloud-OS Region Ulm the following ports are blocked by the Uni border firewall:
| Transport | Port Range | Description / Reason |
|---|---|---|
| TCP, UDP | 0 - 19 | lower protocols, like chargen, etc. used for DDoS |
| TCP, UDP | 23 | telnet |
| TCP, UDP | 42 | WINS |
| TCP, UDP | 67 - 69 | DHCP, tftp |
| TCP, UDP | 111 | rpc |
| TCP, UDP | 119 | nntp |
| TCP, UDP | 135 | loc-srv |
| TCP, UDP | 137 - 139 | SMB |
| TCP, UDP | 143 | IMAP, with explicit allow list |
| TCP, UDP | 161 - 162 | SNMP |
| TCP, UDP | 427 | SLP, Service Location Protocol |
| TCP, UDP | 445 | ms-ds |
| TCP, UDP | 512 - 515 | exec, login, who, syslog, shell, printer |
| TCP, UDP | 520 - 521 | rip, ripng |
| TCP, UDP | 548 | AFP, Apple File Protocol |
| TCP, UDP | 623 | IPMI |
| TCP, UDP | 631 | cups |
| TCP, UDP | 993 | IMAP, with explicit allow list |
| TCP, UDP | 1900 | SSDP |
| TCP, UDP | 2049 | nfsd |
| TCP, UDP | 3306 | MySQL |
| TCP, UDP | 3389 | RDP |
| TCP, UDP | 4045 | nfs lockd |
| TCP, UDP | 4369 | Erlang Port Mapper Daemon (EPMD) |
| TCP, UDP | 5432 | Postgres |
| TCP, UDP | 6443 | Kubernetes |
| TCP, UDP | 9000 - 10999 | 3CX RTP, with explicit allow list |
| TCP, UDP | 9100 | raw printer queues |
| TCP, UDP | 49152 | MS-RPC, allow incoming only established |
| TCP, UDP | 49664 - 49670 | MS-RPC, allow incoming only established |
| TCP | 25 | SMTP, with explicit allow list |
| TCP | 110 | POP |
| TCP | 389 | LDAP, with explicit allow list |
| TCP | 873 | rsync - maybe make a Server ACL like FTP |
| TCP | 995 | POPS |
| TCP | 1801 | Microsoft Message Queuing Service, CVE-2023-21554 |
| TCP | 5800 | VNC |
| TCP | 5900 | VNC |
| TCP | 5901 | VNC, sic may be more... |
| TCP | 6000 | X-Server |
| TCP | 6379 | REDIS |
| TCP | 9401 | Veeam Backup, CVE-2023-27532 |
| TCP | 27017 | MongoDB |
| UDP | 53 | DNS, with explicit allow list |
| UDP | 123 | NTP, with explicit allow list |
| UDP | 177 | XDMCP, X Display Manager ... |
| UDP | 389 | LDAP, UDP-based Amplification Attacks |
| UDP | 1434 | MS-SQL |
| UDP | 3283 | Apple Remote Desktop |
| UDP | 3478 | STUN, with explicit allow list |
| UDP | 3702 | WS-Discovery |
| UDP | 5093 | SPSS License Server |
| UDP | 5353 | mDNS, UDP-based Amplification Attacks |