SEOUL NATIONAL UNIVERSITY
검색창 닫기

Request Service Port Access

Request Service Port Access

Request Service Port Access

IS&T SNU blocks main service ports to protect the SNU internet network but is able to open some ports if a user requests port access.

Go to Request

mySNU → SNUIn Support → IT service → Security(보안서비스) → Service Port (서비스 포트 신규 신청)

Targets of Service

Members of the SNU community (SNU_ID users)

How to Use

Users may request port permission, return, and extension of permission via mySNU portal and Campus Network Management System.

Login to mySNU (http://my.snu.ac.kr) → SNUIn Support → IT SERVICES → Port Permission Request / Request Security Accident

Procedure

Request port permission, return, and extension of permission

Requested by user → Approval email sent to manager → Approval email received → Port permitted → Process completion email sent

Request for web service port (80)

Requested by user  → Guideline email sent for new 80 port processing → (Board vulnerability checkup and report email sent) → Vulnerability search and resolution using  Web Vulnerability Checkup System (webscan) → Results of  resolution reported → Resolution confirmed/ Port permitted

※ The board vulnerability checkup is performed by the IS&T SNU only for the websites including a board. Temporary ID information may be requested if login is needed.

※ Active information system should undergo a vulnerability checkup each year. If this does not occur, the service port may be automatically recalled.

 

Request Checkpoints

Request port permission

Expiration of port permission request: one year from request date (automatically recalled after the expiration date if not extended)

Effective period for extension request: 15 days before the expiration date

Packaged processing of port permission requests: 5 p.m. each day (If requested after 5 p.m., the process will be done on the next day.)

Request for web service port (80)

Necessary checkpoints before request: The port should be checked after data backup, as the data may be deleted during the web vulnerability search due to the processing logics, including web application addition/correction/deletion, implemented with a simple URL.
(Data requiring backup: database, file data, web source, entire code, etc.)

Current Blocked Ports

Service Ports

Name of Service

Blocking Direction

TCP 21

FTP (file transfer)

Outside SNU → Inside SNU

TCP 22

SSH (secured remote access)

TCP 25

SMTP (outgoing email)

Outside SNU → Inside SNU
(bidirectional block)

TCP 80

HTTP (web service)

Outside SNU → Inside SNU

TCP 110

POP3 (incoming email)

TCP 143

IMAP (incoming email)

TCP 1433

MS_SQL (DB access)

Outside SNU → Inside SNU
(bidirectional block)

TCP 1434

MS_SQL(DB access)

TCP 3306

MySQL(DB access)

Outside SNU → Inside SNU

TCP 3389

MSTSC (remote Windows access)

TCP 5800

VNC(remote Windows access)

TCP 5900

other

Service ports suspected to be spreading worms or viruses (about 200 ports)

Outside SNU → Inside SNU
(bidirectional block)

 

수정요청

현재 페이지에 대한 의견이나 수정요청을 관리자에게 보내실 수 있습니다.
아래의 빈 칸에 내용을 간단히 작성해주세요.

닫기