Port Filtering
This page will help provide some information about Port Filtering with Slingshot Broadband.
What is Port Filtering?
Port filtering is a network security technique that allows or blocks data packets based on their port number, which corresponds to specific applications or services. It’s commonly used in firewalls, routers, and other access control devices to manage traffic flow and protect systems from unauthorised access.
Think of ports as virtual doors on a device—each one assigned to a specific service:
- Port 80: HTTP (web traffic)
- Port 443: HTTPS (secure web traffic)
- Port 22: SSH (remote login)
- Port 53: DNS (domain name resolution)
Port filtering ensures that only approved traffic can pass through these doors, helping to isolate and secure network communications.
How do I disable Port Filtering?
By default, Slingshot adds port filtering to all Broadband accounts.
To disable it, follow the below method:
- Simply log into your MySlingshot account
- Click on your Broadband service
- Scroll down to the bottom and click Disable
Inbound Traffic Ports
Below are a list of ports that can be used to enable/disable certain Internet traffic.
|
Port |
Inbound traffic |
|
0 |
|
|
20 |
FTP data |
|
21 |
FTP data |
|
22 |
SSH (Secure Shell), File transfers |
|
23 |
Telnet |
|
25 |
SMTP (email sending) |
|
53 |
DNS server |
|
67 |
Bootstrap server, DHCP |
|
68 |
Bootstrap client, DHCP |
|
80 |
HTTP server |
|
110 |
POP3 server |
|
135 |
remote manage DHCP, DNS server |
|
137 |
NetBIOS name service |
|
138 |
NetBIOS Datagram |
|
139 |
NetBIOS Session |
|
143 |
IMAP server |
|
161 |
SNMP |
|
162 |
SNMP |
|
443 |
HTTPS server |
|
547 |
DHCPv6 server |
|
593 |
HTTP RPC remote procedure |
|
2049 |
NFS |
