Request Service Port Access

IS&T SNU blocks main service ports to protect the SNU internet network but is able to open some ports if a user requests port access.

Targets of Service

  • Members of the SNU community (SNU_ID users)

How to Use

  • Users may request port permission, return, and extension of permission via mySNU portal and Campus Network Management System.
  • Login to mySNU (http://my.snu.ac.kr) → SNUIn Support → IT SERVICES → Port Permission Request / Request Security Accident

Procedure

Request port permission and extension of permission

  • Requested by user → Approval email sent to manager → Approval email received → Port permitted → Process completion email sent
Request for web service port (80)
  • Requested by user  → Guideline email sent for new 80 port processing → (Board vulnerability checkup and report email sent) → Vulnerability search and resolution using  Web Vulnerability Checkup System (webscan) → Results of  resolution reported → Resolution confirmed/ Port permitted

※ The board vulnerability checkup is performed by the IS&T SNU only for the websites including a board. Temporary ID information may be requested if login is needed.

※ Active information system should undergo a vulnerability checkup each year. If this does not occur, the service port may be automatically recalled.

Request Checkpoints

Request port permission
  • Expiration of port permission request: one year from request date (automatically recalled after the expiration date if not extended)
  • Effective period for extension request: 15 days before the expiration date
  • Packaged processing of port permission requests: 5 p.m. each day (If requested after 5 p.m., the process will be done on the next day.)

Request for web service port (80)

  • Necessary checkpoints before request: The port should be checked after data backup, as the data may be deleted during the web vulnerability search due to the processing logics, including web application addition/correction/deletion, implemented with a simple URL.

(Data requiring backup: database, file data, web source, entire code, etc.)

Current Blocked Ports
Service Ports Name of Service Blocking Direction
TCP 21 FTP (file transfer) Outside SNU → Inside SNU
TCP 22 SSH (secured remote access)
TCP 25 SMTP (outgoing email) Outside SNU → Inside SNU (bidirectional block)
TCP 80 HTTP (web service) Outside SNU → Inside SNU
TCP 110 POP3 (incoming email)
TCP 143 IMAP (incoming email)
TCP 1433 MS_SQL (DB access) Outside SNU → Inside SNU (bidirectional block)
TCP 1434 MS_SQL (DB access)
TCP 3306 MySQL(DB access) Outside SNU → Inside SNU
TCP 3389 MSTSC (remote Windows access)
TCP 5800 VNC(remote Windows access)
TCP 5900
other Service ports suspected to be spreading worms or viruses (about 200 ports) Outside SNU → Inside SNU (bidirectional block)
Inquiries

TEL : 02-880-8282(ITSC : IT Service Center) / E-mail :  itsc@snu.ac.kr