• Contact Us
  • Select a Location
    Close Location Selection

    Current Location:

    Let us know the location you'd like to browse.

    Select a Location
    OR

Internet Ports Blocked or Restricted by Cox

Details

There are several reasons for filtering ports. Learn more with the following information.

  • Protecting our customers - Certain ports are filtered to protect our customers. They can protect against certain common worms and from dangerous services on our customers' computers that could allow intruders access.
  • Protecting upstream bandwidth - Upstream bandwidth to a cable plant is limited. If customers overuse their upstream bandwidth by running high-traffic servers, or become infected with a worm or virus, it can affect the service of other customers in their area.
  • Protecting the rest of the internet - Some filters prevent against attacks on other computers by way of the internet. In addition to being in our best interest for protecting bandwidth, Cox considers preventing the abuse of our network our responsibility.

The following tables outline the filtered ports and the specific reasons for filtering each.

PortTransportProtocolDirectionReason for Filtering
25TCPSMTPBoth

Note: SMTP is only permitted outbound to Cox-provided SMTP servers.
SMTP Relays
80TCPHTTPInboundWeb servers, worms
135UDPNetBiosBothNet Send Spam / Pop-ups, Worms
136-139UDP, TCPNetBiosBothWorms, Network Neighborhood
143TCPIMAPInboundWithout Transport Layer Security (TLS) enabled, customers are more susceptible to having their passwords compromised
445TCPMS-DS/ NetBiosBothWorms, Network Neighborhood
1433TCPMS-SQLInboundWorms, Trojans
1434UDPMS-SQLInboundWorms, SQLslammer
1900UDPMS-DS / NetBiosBothWorms, Network Neighborhood

Explanations of Filtered Ports

PortExplanation
25 / TCP - SMTPMail servers use Simple Mail Transport Protocol (SMTP) to exchange email. We block this to protect upstream bandwidth and prevent customers from running open relays could potentially be used by others to send spam via our network.
80 / TCP - HTTPWeb browsers use Hypertext Transport Protocol (HTTP) to communicate with web servers. In addition to protecting bandwidth by preventing customers from running high-traffic web servers, we can stop many destructive worms that spread through security holes in web server software.
110 - POPThe Post Office Protocol (POP) is a mail protocol used for receiving email. We block this port because without SSL enabled, it is not encrypted and leaves customers vulnerable to having their user information and passwords compromised.
135, 137 / UDP, 135, 139 / TCP, 445 MS-DC – NetBIOSNetBIOS, also known as Server Message Block, LanManager, and Common Internet File System, are networked file sharing protocols. The Microsoft Windows Network Neighborhood runs over NetBIOS. Cox filters these ports to protect customers from exposing files on their computers, and to block worms which spread through open file shares. The latest addition to this series, a consolidated service port, such as TCP445, has also opened new similar security risks in Win2K and WinXP.
143 - IMAPThe Internet Message Access Protocol (IMAP) is a mail protocol used for receiving email. We block this port because without TLS enabled, it is not encrypted and leaves customers vulnerable to having their user information and passwords compromised.
1433 / TCP, 1434 / UDP –
MS-SQL
Microsoft SQL Server is a database application with a long history of security exploits, and is noted for the propagation of the SQLslammer worm. These ports are filtered to prevent exploitation and propagation of such MS-SQL exploits.
1900 / UDP - UPnPDiscovery / SSDP is a service that runs by default on WinXP. It creates an immediately exploitable security vulnerability for any network. Filtering this port proactively prevents XP systems from being remotely compromised by malicious worms or intruders.

Search for More Articles