Request Service Port Access
IS&T SNU blocks main service ports to protect the SNU internet network but is able to open some ports if a user requests port access.
Targets of Service
- Members of the SNU community (SNU_ID users)
How to Use
- Users may request port permission, return, and extension of permission via mySNU portal and Campus Network Management System.
- Login to mySNU (http://my.snu.ac.kr) → SNUIn Support → IT SERVICES → Port Permission Request / Request Security Accident
Procedure
Request port permission and extension of permission
- Requested by user → Approval email sent to manager → Approval email received → Port permitted → Process completion email sent
Request for web service port (80)
- Requested by user → Guideline email sent for new 80 port processing → (Board vulnerability checkup and report email sent) → Vulnerability search and resolution using Web Vulnerability Checkup System (webscan) → Results of resolution reported → Resolution confirmed/ Port permitted
※ The board vulnerability checkup is performed by the IS&T SNU only for the websites including a board. Temporary ID information may be requested if login is needed.
※ Active information system should undergo a vulnerability checkup each year. If this does not occur, the service port may be automatically recalled.
Request Checkpoints
Request port permission
- Expiration of port permission request: one year from request date (automatically recalled after the expiration date if not extended)
- Effective period for extension request: 15 days before the expiration date
- Packaged processing of port permission requests: 5 p.m. each day (If requested after 5 p.m., the process will be done on the next day.)
Request for web service port (80)
- Necessary checkpoints before request: The port should be checked after data backup, as the data may be deleted during the web vulnerability search due to the processing logics, including web application addition/correction/deletion, implemented with a simple URL.
(Data requiring backup: database, file data, web source, entire code, etc.)
Current Blocked Ports
Service Ports | Name of Service | Blocking Direction |
---|---|---|
TCP 21 | FTP (file transfer) | Outside SNU → Inside SNU |
TCP 22 | SSH (secured remote access) | |
TCP 25 | SMTP (outgoing email) | Outside SNU → Inside SNU (bidirectional block) |
TCP 80 | HTTP (web service) | Outside SNU → Inside SNU |
TCP 110 | POP3 (incoming email) | |
TCP 143 | IMAP (incoming email) | |
TCP 1433 | MS_SQL (DB access) | Outside SNU → Inside SNU (bidirectional block) |
TCP 1434 | MS_SQL (DB access) | |
TCP 3306 | MySQL(DB access) | Outside SNU → Inside SNU |
TCP 3389 | MSTSC (remote Windows access) | |
TCP 5800 | VNC(remote Windows access) | |
TCP 5900 | ||
other | Service ports suspected to be spreading worms or viruses (about 200 ports) | Outside SNU → Inside SNU (bidirectional block) |
Relevant Regulations
Inquiries
TEL : 02-880-8282(ITSC : IT Service Center) / E-mail : itsc@snu.ac.kr