Port filtering is an extra level of security that protects you from cyber attacks and blocks specific inbound traffic with no impact on your normal browsing, streaming, or email services. You can turn it off and on at any time by logging into My Orcon and scrolling to the bottom of the home page.
We block the following ports and inbound traffic (TCP/UDP) on a network level:
Port Number |
Inbound Traffic |
20 | FTP data |
21 | FTP data |
22 | SSH (Secure Shell) and file transfers |
23 | Telnet |
25 | SMTP (Sending emails) |
53 | DNS servers |
67 | DHCP Bootstrap servers |
68 | DHCP Bootstrap servers |
80 | HTTP servers |
110 | POP3 servers |
135 | Remotely managed DHCP and DNS servers |
137 | NetBIOS named services |
138 | NetBIOS datagrams |
139 | NetBIOS sessions |
143 | IMAP servers |
161 | SNMP |
162 | SNMP |
443 | HTTPS servers |
445 | SMB over IP |
547 | DHCPv6 servers |
593 | HTTP RPC remote procedures |
1900 | SSDP (Discovery of UPnP devices) |
2049 | NFS (File sharing) |
5060 | VoIP/SIP |
5431 | UPnP ports |
If you have an on-site email server (business email server), web server, NAS servers, or admin acces to a remote router, you'll want to disable the port filtering and test your services again.
Need something else?
Check out other setup information, changes you can make online, or some helpful tips: