Access Keys:
Skip to content (Access Key - 0)

Which ports are blocked or allowed by the firewall on MIT GUEST wireless network?

On this page:

Answer

The MIT GUEST network is intended for visitor and guest access. Devices on the MIT GUEST network will be assigned an address outside of MIT's standard 18.x.x.x class A address block. (Network addresses on MIT GUEST will begin with 10.189.x.x.)

Blocked ports and address ranges

The following services are blocked:

  • Network printing (ports 515 and 631)
  • Some Java Tomcat applications (ports 8080 and 8443)
  • Pharos Student Printing and Pharos Popup Client (port 28212)
  • CrashPlan/Code42 installation (auto-detecting license and server information)
  • SAP eLearning ("MIT Learning Center") training portal accessed via Atlas
  • Comcast IP TV pilot (requires 18.x.x.x network address)
  • Unauthentic SMTP (port 25)

The list above is not comprehensive.

Allowed ports

A general list of allowed ports on the MIT GUEST wireless network can be found below. Ports not listed below will be blocked by the firewall.

See Also:

The Wireless Networks at MIT
How to connect to the MIT SECURE wireless network
Eduroam Landing Page
The MIT GUEST wireless network
Wireless RADIUS Server Certificate Fingerprints
Troubleshooting and reporting problems on the MIT wireless network
List of devices that can or can't connect to MIT SECURE

IS&T Contributions

Documentation and information provided by IS&T staff members


Last Modified:

November 16, 2023

Get Help

Request help
from the Help Desk
Report a security incident
to the Security Team
Labels:
wireless wireless Delete
c-wireless c-wireless Delete
met met Delete
guest guest Delete
firewall firewall Delete
ports ports Delete
blocked blocked Delete
access access Delete
Enter labels to add to this page:
Please wait 
Looking for a label? Just start typing.
Feedback
This product/service is:
Easy to use
Average
Difficult to use

This article is:
Helpful
Inaccurate
Obsolete
Adaptavist Theme Builder (4.2.3) Powered by Atlassian Confluence 3.5.13, the Enterprise Wiki