TCP/UDP # General Name Short Description

Size: px
Start display at page:

Download "TCP/UDP # General Name Short Description"

Transcription

1 This appendix is designed to provide general information about service ports that are discovered on IP networks. Outlined are ports 1-80, along with many other common higher ports and specific ports found within the environment. TCP/UDP # General Name Short Description 0 Reserved Reserved 1 TCP Port N/A Service Multiplex 2 Compressnet Proprietary Management Utility 3 Compressnet Proprietary Compression Process 4 Unassigned Unassigned 5 RJE Remote Job Entry Protocol. [email protected] 6 Unassigned N/A 7 ECHO Echo protocol, used to discovered live IP hosts on an IP network. 8 Unassigned N/A 9 Discard Discard protocol, used for packet discard signaling. 10 Unassigned N/A 11 Sysstat Sysstat protocol, used to determine information about active remote users connected to a system. 12 Unassigned N/A 13 Daytime Daytime (RFC 867), used to determine the time from a remote computer hosting this service. 14 Unassigned N/A 15 Unassigned N/A 16 Unassigned N/A 17 QOTD QOTD (Quote of the Day) protocol, used to obtain a quote of information from a remote computer hosting this service. 18 MSP MSP (Message Sent Protocol), used to send general network messages to computers on an IP network. 19 CHARGEN Character Generator protocol, used to generate random character strings from a remote computer. 20 FTP-DATA FTP (File Transfer Protocol), used to download data from a remote IP host. 1/9

2 21 FTP FTP (File Transfer Protocol), used to control the downloading of data from a remote IP host. 22 (SSH) SSH SSH Remote Login Protocol, used as an alternative to TELNET to provide encryption of remote shell and logon processes. 22 (PCAnywhere) PCAnywhere Symantecs PCAnywhere uses port 22 for remote client authentication when providing a PCAnywhere session. 23 TELNET TELNET, a remote shell and login protocol, providing remote shell access on IP hosts. 24 APMS Any Private Mail System. (No Description) 25 SMTP SMTP (Simple Mail Transfer Protocol) is used to delivery and remotely queue IP mail between IP hosts and domains. 26 Unassigned N/A 27 NSW User System FE Proprietary for NSM systems, sometimes used by SLMAIL. 28 Unassigned N/A 29 MSG ICP Proprietary, No 30 Unassigned N/A 31 MSG AUTH MSG Authentication, Proprietary. No 32 Unassigned N/A 33 DSP Display Support Protocol, Proprietary. No 34 Unassigned N/A 35 APPS Any Private Printer Server, flexible for all IP Print servers. 36 Unassigned N/A 37 TIME Time Protocol, used to determine the time from a remote computer hosting this service. 38 RAP Route Access Protocol, used to discovered IP network gateways, when one is not assigned. (Experimental) 39 RLP Resource Location Protocol, used to find hosted resources on remote IP clients. 40 Unassigned N/A 41 Graphics Graphics, used for accelerated graphics over the network, used via Direct3D. 42 (IANA) HNS 2/9

3 Host Name Server, used for hostname resolution to IP address. 42 (Microsoft) WINS Windows Internet Naming Service, used to resolve NetBIOS computer names to IP address. 43 WHOIS WHOIS, used to find information about a remote IP host. 44 MPM-FLAGS MPM Flags Protocol, Proprietary. No 45 MPM Message Processing Module. (RECV), Proprietary. No 46 MPM-SND MPM Send, Proprietary. No 47 NI-FTP NI FTP, Proprietary. No 48 AUDITD Digital Audit Daemon, Proprietary. No 49 TACAS Login Host Protocol, provides central authentication services for network communications devices. 50 R -CH Remote Mail Checking Protocol, Proprietary. No 51 LA-MAINT IMP Logical Address Maintenance, Proprietary. No 52 XNS-TIME XNS Time Protocol, Proprietary. No 53 DNS Domain Name Service, provides hostname to IP address resolution for IP networks. 54 XNS-CH XNS Clearing House, Proprietary. No 55 ISI-GL ISI Graphics Language, Proprietary. No 56 XNS-AUTH XNS Authentication, Proprietary. No 57 APTA Any Private Terminal Access, Proprietary. No 58 XNS-MAIL XNS Mail Protocol, Proprietary. No 59 APFS Any Private File Service, Proprietary. No 60 Unassigned N/A 61 NI-MAIL NI MAIL, Proprietary. No 62 ACAS ACA Services, Proprietary. No 63 WHOIS++ WHOIS++, Proprietary. No 64 COVIA 3/9

4 Communications Integrator. (CI), Proprietary. No 65 TACAS-DS TACAS Database Service provides database services for the TACAS protocol. 66 SQL*NET Used by Oracle and SQL*NET for network database services over IP. 67 BOOTPS Bootstrap Protocol Server, used to allow diskless workstation clients to boot onto an IP network and obtain its IP address automatically from servers hosting this service. 68 BOOTPC Bootstrap Protocol Client, used by diskless clients to query BOOTPS for an IP address. 69 TFTP TFTP (Trivial File Transfer Protocol) provides downloading and uploading of data between network hosts on an IP network. 70 Gopher Gopher provides search engine type functions over an IP network. 71 NETRJS-1 Remote Job Service #1, Proprietary. No 72 NETRJS-2 Remote Job Service #1, Proprietary. No 73 NETRJS-2 Remote Job Service #1, Proprietary. No 74 NETRJS-4 Remote Job Service #1, Proprietary. No 75 APDOS Any Private Dial Out Service, Proprietary. No 76 DEOS Distributed External Object Store, Proprietary. No 77 APRJES Any Private RJE Service, Proprietary. No 78 VETTCP VET TCP, Proprietary. No 79 FINGER Finger services provide information about users logged onto a remote system. 80 HTTP HTTP (HyperText Transfer Protocol) provides web services such as websites and downloading/uploading of remote files. 88 KERBEROS Kerberos is an authentication protocol, used is Windows 2000 (NATIVE MODE) along with some implementations of UNIX. 109 POP2 4/9

5 POP2 (Post Office Protocol version 2) provides clients with the ability to download from remote IP mail servers hosting this service. 110 POP3 POP3 (Post Office Protocol version 3) provides clients with the ability to download from remote IP mail servers hosting this service. 111 SUNRPC SUN Remote Procedure Call Protocol, remote execution ability in RPC with Sun Micro systems. 113 AUTH Authentication provides remote authentication mechanism. Usually hosted on firewalls. 115 SFTP SFTP (Simple File Transfer Protocol) used to download data from a remote IP host. 118 SQLSERV Legacy SQL database services. 119 NNTP NNTP (Network News Transfer Protocol) used to provide global newsgroup capabilities in an IP network. 123 NTP NTP (Network Time Protocol) used to provide remote IP clients with Time synchronization capabilities. 135 EPMAP DCE Endpoint Resolution. 137 NETBIOS-NS NETBIOS Name Service, used in Microsoft Networks to provide remote name resolution 138 NEBIOS-DGM NETBIOS Datagram Service, used in Microsoft Networks for NETBIOS UDP support. 139 NETBIOS-SSN NETBIOS Session Service, used in Microsoft Networks for NETBIOS session layer support. 143 IMAPv4 IMAP (Internet Message Access Protocol version 4) provides clients with the ability to download from remote IP mail servers hosting this service. 161 SNMP SNMP (Simple Network Management Protocol) used to capture statistical network data from devices running SNMP services. 194 IRC IRC (Internet Relay Chat Protocol) provides IRC clients the ability to connect to IRC-SERV (see port 529) on an IP network to provide Instant Messaging. 199 SMUX SMUX is used for providing multiplexing capabilities over IP networks. (Primarily in UNIX) 5/9

6 280 HTTP-MGT HTTP (HyperText Transfer Protocol Management) provides a remote management configuration through HTTP, or web services. 389 LDAP LDAP (Lightweight Directory Access Protocol) provides access to a networked directory over IP networks. 443 HTTPS HTTP over SSL, provides HTTP services (See port 80) over SSL (secure socket layer) to 445 Microsoft-DS Microsoft Directory Service provides for File and Print Sharing through the Active Directory in Windows KPASSWD Kerberos Password provides a means to transmit Kerberos (See port 88) logon credentials in an encrypted format over an IP network. 512 (EXEC) TCP 512 (Comsat) UDP 512 (BIFF) UDP 513 (LOGIN) TCP 513 (WHO) UDP 514 (SHELL) TCP 514 (SYSLOG) UDP EXEC COMSAT BIFF LOGIN WHO SHELL SYSLOG EXEC provides remote process execution authentication performed using passwords and UNIX login names. COMSAT, Proprietary. No BIFF provides mail notification to remote clients to alert them when new mail has arrived. (UNIX) Login provides remote login via telnet, automatic authentication performed based on privileged port numbers and distributed databases which identify "authentication domains". (UNIX) WHO maintains databases showing who's logged in to machines on a local net and the load average of the CPU. (UNIX) Shell provides a cmd.exe interface like exec, but automatic authentication is performed through the login server. (UNIX) SYSLOG provides statistical logging information about devices on an IP network. 515 SPOOLER SPOOLER allows for remote print queuing, which is usually present on most network print servers in an IP network. 529 IRC-SERV IRC (Internet Relay Chat Protocol Server) provides IRC services to IRC clients. 6/9

7 563 NNTPS NNTP over SSL provides NNTP services (See port 119) over SSL (secure socket layer) to 585 IMAP4S IMAP version 4 over SSL provides IMAP4 services (See port 143) over SSL (secure socket layer) to provide encryption, to protect data as it (Also found on Port 993) 593 HTTP/DCE HTTP-RPC-EPMAP provides RPC (Remote Procedure Call) functionality through the HTTP protocol. 636 LDAPS LDAP over SSL provides LDAP services (See port 389) over SSL (secure socket layer) to 799 ControlIT / Remotely Possible 800 ControlIT / Remotely Possible Computer Associates Remotely Possible and ControlIT product lines use this port to establish remote control sessions. Computer Associates Remotely Possible and ControlIT product lines use this port to establish remote control sessions. 989 FTP-DATAS FTP-DATA over SSL provides FTP-DATA services (See port 20) over SSL (secure socket layer) to 990 FTPS FTP over SSL provides FTP services (See port 21) over SSL (secure socket layer) to provide encryption, to protect data as it transverses an IP network. 992 TELNETS Telnet over SSL provides TELNET services (See port 23) over SSL (secure socket layer) to 993 IMAPS IMAP version 4 over SSL provides IMAP4 services (See port 143) over SSL (secure socket layer) to provide encryption, to protect data as it (Also found on Port 585) 994 IRCS IRC over SSL provides IRC services (See port 194) over SSL (secure socket layer) to provide encryption, to protect data as it transverses an 7/9

8 IP network. 995 POP3S POP3 over SSL provides POP3 services (See port 110) over SSL (secure socket layer) to (IANA) Reserved N/A (Microsoft) FPS Microsofts File and Print Sharing Services, allowing for remote registry changes over NetBIOS SQL Microsofts SQL database access protocol for SQL over an IP network Citrix ICA Citrix Thin-Client technology provides terminal services to remote clients for low bandwidth usage FunkProxy Funk softwares Proxy product line hosts remote control services over IP networks H323 H323 provides Voice over IP capabilities on an IP network, to effectively encapsulate Analog voice into Digital IP packets to be routed PPTP PPTP (Point to Point Tunneling Protocol) provides tunnel encryption capabilities between hosts on an IP network Remotely Anywhere 2001 Remotely Anywhere xx Remote Printer Queuing 3389 Terminal Services Remotely Anywhere hosts remote control services over IP networks. Remotely Anywhere hosts remote control services over IP networks. These ports are often found hosting remote print capabilities on a network print server in an IP network. Microsofts Terminal Services provides remote clients with a low bandwidth remote access to server resources PCAnywhere Symantecs PCAnywhere hosts remote control services over IP networks PCAnywhere Symantecs PCAnywhere hosts remote control services over IP networks xx VNC AT&Ts VNC (Virtual Network Control) hosts remote control services over IP networks through emulated HTTP services using JAVA APPLETS. 8/9

9 42509 InoculateIT etrust Admin Server InoculateIT etrust client service InoculateIT 6.0 admin service provides policy based virus software management over an IP network. InoculateIT 6.0 client service queries admin services to receive policies pertaining to virus protection software / NetMeeting Microsofts NetMeeting product line offers remote control capabilities, along with video and voice conferencing over IP based networks PCAnywhere Symantecs PCAnywhere provides remote control services over IP networks. 9/9

Basic Network Configuration

Basic Network Configuration Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the

More information

List of Common TCP/IP port numbers

List of Common TCP/IP port numbers List of Common TCP/IP port numbers For those of you who configure firewalls, routers, port forwarding, and applications connectivity, this regularly updated document lists all standard, common, well known,

More information

Communication Ports Used by Citrix Technologies. April 2011 Version 1.5

Communication Ports Used by Citrix Technologies. April 2011 Version 1.5 Communication Ports Used by Citrix Technologies April 2011 Version 1.5 Overview Introduction This document provides an overview of ports that are used by Citrix components and must be considered as part

More information

Addresses, Protocols, and Ports

Addresses, Protocols, and Ports APPENDIXD This appendix provides a quick reference for IP addresses, protocols, and applications. This appendix includes the following sections: IPv4 Addresses and Subnet Masks, page D-1 IPv6 Addresses,

More information

41376 UDP performing get device status Command Workstation (CWS), Harmony, Bi-directional Driver 8021-8022 TCP/UDP

41376 UDP performing get device status Command Workstation (CWS), Harmony, Bi-directional Driver 8021-8022 TCP/UDP TCP/IP ports that might be used with Canon office equipment (in alphabetical order) 3/1/2009 Axis Print server. This port is used to identify the status the axis print server. This is performed approx

More information

Communication ports used by Citrix Technologies. July 2011 Version 1.5

Communication ports used by Citrix Technologies. July 2011 Version 1.5 Communication ports used by Citrix Technologies July 2011 Version 1.5 Overview Introduction This document provides an overview of ports that are used by Citrix components and must be considered as part

More information

Roles for Servers in the SCW Database

Roles for Servers in the SCW Database Roles for Servers in the SCW Database Application BizTalk 2004 Business Activity BizTalk 2004 Messaging and Orchestration ASP.NET session state BizTalk 2004 EDI Integration BizTalk 2004 Rules Engine Audit

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

NAM CLI Commands: email - logout

NAM CLI Commands: email - logout CHAPTER 3 NAM CLI Commands: email - logout This chapter provides information about the following commands: email entity alias entity assetid exit exsession ftp help ip address ip broadcast ip domain ip

More information

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module Collax SSL VPN Howto This howto describes the easy configuration of a Collax server as SSL VPN gateway in order to enable external access to selected applications in the company network. Except for a common

More information

VPNSCAN: Extending the Audit and Compliance Perimeter. Rob VandenBrink [email protected]

VPNSCAN: Extending the Audit and Compliance Perimeter. Rob VandenBrink rvandenbrink@metafore.ca VPNSCAN: Extending the Audit and Compliance Perimeter Rob VandenBrink [email protected] Business Issue Most clients have a remote access or other governing policy that has one or more common restrictions

More information

Citrix TCP Ports Communication Ports Used By Citrix Technologies. August 2009 Version 1.0

Citrix TCP Ports Communication Ports Used By Citrix Technologies. August 2009 Version 1.0 Citrix TCP Ports Communication Ports Used By Citrix Technologies August 2009 Version 1.0 Overview Introduction This document provides an overview of TCP ports that are used by Citrix components and must

More information

TCP/IP Ports and Protocols:

TCP/IP Ports and Protocols: TCP/IP Ports and Protocols Programme NPfIT DOCUMENT RECORD ID KEY Sub-Prog / Technology Office NPFIT-FNT-TO-TAR-0050.01x Project Prog. Director Mark Ferrar Owner Malcolm Version 1.0 McKeating Author Phil

More information

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE Virtual Server and DDNS For BIPAC 741/743GE August, 2003 1 Port Number In TCP/IP and UDP networks, a port is a 16-bit number, used by the host-to-host protocol to identify to which application program

More information

EXPLORER. TFT Filter CONFIGURATION

EXPLORER. TFT Filter CONFIGURATION EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content

More information

Network-Based Application Recognition

Network-Based Application Recognition Network-Based Application Recognition Last Updated: March 2009 Cisco Content Networking delivers the network agility required by the enterprise to deploy new Internet business applications critical to

More information

Product Standard General Interworking: Internet Server

Product Standard General Interworking: Internet Server General Interworking: Internet Server The Open Group Copyright August 1998, The Open Group All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted,

More information

PCI DSS Requirement 11.2 - Vulnerable Hosts Based on Open Ports Report

PCI DSS Requirement 11.2 - Vulnerable Hosts Based on Open Ports Report Report This report lists the most vulnerable host machines, based on the number of open ports found. Generated on Generated by 6/3/2011 2:27:16 PM calin Advanced Settings Report items Target Entire Network

More information

Windows Server 2003 default services

Windows Server 2003 default services Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.

More information

Copyright 2006 Comcast Communications, Inc. All Rights Reserved.

Copyright 2006 Comcast Communications, Inc. All Rights Reserved. ii Copyright 2006 Comcast Communications, Inc. All Rights Reserved. Comcast is a registered trademark of Comcast Corporation. Comcast Business IP Gateway is a trademark of Comcast Corporation. The Comcast

More information

Configuring a Backup Path Test Using Network Monitoring

Configuring a Backup Path Test Using Network Monitoring 6AOSCG0006-29B February 2011 Configuration Guide Configuring a Backup Path Test Using Network Monitoring This configuration guide describes how to configure a demand routing test call to test the availability

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

Port Requirements for SolarWinds Products

Port Requirements for SolarWinds Products Port Requirements for SolarWinds Products ipmonitor KiWi Syslog Server LANsurveyor Log & Event Manager (LEM) Network Topology Mapper (NTM) Orion Additional Pollers Orion Enterprise Console (EOC) IP Address

More information

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department

More information

Inforland 048-592-2768

Inforland 048-592-2768 資 料 Windows 7 の TCP IP の Protocol と Services Inforland 048-592-2768 Rev. 01 2009/09/11 株 式 会 社 インフォランド 1. Protocol (Windows 7) Copyright (c) 1993-2006 Microsoft Corp. This file contains the Internet protocols

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK

Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK Barracuda Networks Technical Documentation Barracuda SSL VPN Administrator s Guide Version 2.x RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks, Inc. www.barracuda.com v20-110511w-02-110915jc

More information

How To Set Up A Server On A Windows 7.5 (Windows) With A Powerline (Windows 7) On A Pc Orion (Windows 8) On An Ipm (Networking) On Your Pc Ornet (Netware)

How To Set Up A Server On A Windows 7.5 (Windows) With A Powerline (Windows 7) On A Pc Orion (Windows 8) On An Ipm (Networking) On Your Pc Ornet (Netware) SolarWinds Technical Reference Port Requirements for SolarWinds Products Port Requirements for SolarWinds Products... 1 Application Performance Monitor... 1 Application Performance Monitor Component Monitors...

More information

Classification of Firewalls and Proxies

Classification of Firewalls and Proxies Classification of Firewalls and Proxies By Dhiraj Bhagchandka Advisor: Mohamed G. Gouda ([email protected]) Department of Computer Sciences The University of Texas at Austin Computer Science Research

More information

Exam Questions SY0-401

Exam Questions SY0-401 Exam Questions SY0-401 CompTIA Security+ Certification http://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened

More information

- Basic Router Security -

- Basic Router Security - 1 Enable Passwords - Basic Router Security - The enable password protects a router s Privileged mode. This password can be set or changed from Global Configuration mode: Router(config)# enable password

More information

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of

More information

Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0

Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0 Millbeck Communications Secure Remote Access Service Internet VPN Access to N3 VPN Client Set Up Guide Version 6.0 COPYRIGHT NOTICE Copyright 2013 Millbeck Communications Ltd. All Rights Reserved. Introduction

More information

Secure Shell (SSH) used for secure logins, file transfers (scp, sftp) and port forwarding

Secure Shell (SSH) used for secure logins, file transfers (scp, sftp) and port forwarding Porta/Protocolo Descrição Status 1/TCP,UDP TCP Port Service Multiplexer 2/TCP,UDP Management Utility 3/TCP,UDP Compression Process 4/TCP,UDP Unassigned 5/TCP,UDP Remote Job Entry 6/TCP,UDP Unassigned 7/TCP,UDP

More information

imagepress CR Server A7000 Powered by Creo Color Server Technology For the Canon imagepress C7000VP/C6000VP/ C6000

imagepress CR Server A7000 Powered by Creo Color Server Technology For the Canon imagepress C7000VP/C6000VP/ C6000 English imagepress CR Server A7000 Powered by Creo Color Server Technology For the Canon imagepress C7000VP/C6000VP/ C6000 Version 1.0.1 731-01873A-EN Contents Overview... 1 Network... 2 Network Environments...2

More information

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series Cisco IOS Firewall Feature Set Feature Summary The Cisco IOS Firewall feature set is available in Cisco IOS Release 12.0. This document includes information that is new in Cisco IOS Release 12.0(1)T, including

More information

Manual. By GFI Software Ltd. GFI Network Server Monitor

Manual. By GFI Software Ltd. GFI Network Server Monitor GFI Network Server Monitor 6 Manual By GFI Software Ltd. GFI Network Server Monitor Contents i http://www.gfi.com Email: [email protected] Information in this document is subject to change without notice. Companies,

More information

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based

More information

Linux MDS Firewall Supplement

Linux MDS Firewall Supplement Linux MDS Firewall Supplement Table of Contents Introduction... 1 Two Options for Building a Firewall... 2 Overview of the iptables Command-Line Utility... 2 Overview of the set_fwlevel Command... 2 File

More information

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

Exhibit B5b South Dakota. Vendor Questions COTS Software Set Appendix C Vendor Questions Anything t Applicable should be marked NA. Vendor Questions COTS Software Set Infrastructure 1. Typically the State of South Dakota prefers to host all systems. In the event

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

LifeSize Transit Deployment Guide June 2011

LifeSize Transit Deployment Guide June 2011 LifeSize Transit Deployment Guide June 2011 LifeSize Tranist Server LifeSize Transit Client LifeSize Transit Deployment Guide 2 Firewall and NAT Traversal with LifeSize Transit Firewalls and Network Address

More information

IBM. Vulnerability scanning and best practices

IBM. Vulnerability scanning and best practices IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration

More information

Inside-Out Attacks. [email protected]. Covert Channel Attacks Inside-out Attacks Seite 1 GLÄRNISCHSTRASSE 7 POSTFACH 1671 CH-8640 RAPPERSWIL

Inside-Out Attacks. ivan.buetler@csnc.ch. Covert Channel Attacks Inside-out Attacks Seite 1 GLÄRNISCHSTRASSE 7 POSTFACH 1671 CH-8640 RAPPERSWIL Inside-Out Attacks [email protected] Covert Channel Attacks Inside-out Attacks Seite 1 Goals of this presentation! Responses to the following questions! What are inside-out attacks! Who will use this

More information

Interwise Connect. Working with Reverse Proxy Version 7.x

Interwise Connect. Working with Reverse Proxy Version 7.x Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web

More information

Distributed Systems. 2. Application Layer

Distributed Systems. 2. Application Layer Distributed Systems 2. Application Layer Werner Nutt 1 Network Applications: Examples E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Social

More information

Chapter 6 Virtual Private Networking Using SSL Connections

Chapter 6 Virtual Private Networking Using SSL Connections Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide

More information

Novell Access Manager SSL Virtual Private Network

Novell Access Manager SSL Virtual Private Network White Paper www.novell.com Novell Access Manager SSL Virtual Private Network Access Control Policy Enforcement Compliance Assurance 2 Contents Novell SSL VPN... 4 Product Overview... 4 Identity Server...

More information

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Security Guide for ActiveRoles Server 6.1

Security Guide for ActiveRoles Server 6.1 Security Guide for ActiveRoles Server 6.1 Written by Einar Mykletun, Ph.D Security and Compliance Architect Quest Software, Inc. Technical Brief 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This document

More information

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit. SiteAudit Knowledge Base Deployment Check List June 2012 In This Article: Platform Requirements Windows Settings Discovery Configuration Before deploying SiteAudit it is recommended to review the information

More information

Inside-Out Attacks. [email protected]. Security Event April 28, 2004 Page 1. Responses to the following questions

Inside-Out Attacks. ivan.buetler@csnc.ch. Security Event April 28, 2004 Page 1. Responses to the following questions Inside-Out Attacks [email protected] Security Event April 28, 2004 Page 1 Goals of this presentation Responses to the following questions What are inside-out attacks Who will use this technique? How

More information

Network Working Group Request for Comments: 840 April 1983. Official Protocols

Network Working Group Request for Comments: 840 April 1983. Official Protocols Network Working Group Request for Comments: 840 J. Postel ISI April 1983 This RFC identifies the documents specifying the official protocols used in the Internet. Annotations identify any revisions or

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

Cross-platform TCP/IP Socket Programming in REXX

Cross-platform TCP/IP Socket Programming in REXX Cross-platform TCP/IP Socket programming in REXX Abstract: TCP/IP is the key modern network technology, and the various REXX implementations have useful, if incompatible interfaces to it. In this session,

More information

How To Monitor Your Network Server With Gfi Network Server Monitor

How To Monitor Your Network Server With Gfi Network Server Monitor GFI Network Server Monitor 5.5 Manual By GFI Software Ltd. GFI SOFTWARE Ltd. http://www.gfi.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names,

More information

My FreeScan Vulnerabilities Report

My FreeScan Vulnerabilities Report Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the

More information

Security. TestOut Modules 12.6 12.10

Security. TestOut Modules 12.6 12.10 Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card

More information

Barracuda SSL VPN Administrator s Guide

Barracuda SSL VPN Administrator s Guide Barracuda SSL VPN Administrator s Guide Version 1.5.x Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2004-2009, Barracuda Networks,

More information

Introduction to the EIS Guide

Introduction to the EIS Guide Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment

More information

GoToMyPC Corporate Advanced Firewall Support Features

GoToMyPC Corporate Advanced Firewall Support Features F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy

More information

Pre Sales Communications

Pre Sales Communications Pre Sales Communications OmniVista 4760 from R4.1 & OmniPCX Enterprise R7.1 IP Protocols and Ports All rights reserved 2006, Alcatel Table of contents 1. Objectives...3 2. IP protocols...3 2.1. Global

More information

Connecting to and Setting Up a Network

Connecting to and Setting Up a Network Chapter 9 Connecting to and Setting Up a Network Reviewing the Basics 1. How many bits are in a MAC address? 48 bits 2. How many bits are in an IPv4 IP address? In an IPv6 IP address? 32 bits, 128 bits

More information

SolarWinds Technical Reference

SolarWinds Technical Reference SolarWinds Technical Reference Port Requirements for SolarWinds Products Port Requirements for SolarWinds Products... 1 Server & Application Monitor (formerly APM)... 1 ipmonitor... 6 KiWi Syslog Server...

More information

FAQs for Oracle iplanet Proxy Server 4.0

FAQs for Oracle iplanet Proxy Server 4.0 FAQs for Oracle iplanet Proxy Server 4.0 Get answers to the questions most frequently asked about Oracle iplanet Proxy Server Q: What is Oracle iplanet Proxy Server (Java System Web Proxy Server)? A: Oracle

More information

File Transfer Protocol (FTP) & SSH

File Transfer Protocol (FTP) & SSH http://xkcd.com/949/ File Transfer Protocol (FTP) & SSH Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Some materials copyright 1996-2012 Addison-Wesley J.F Kurose and K.W.

More information

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without

More information

Cyber Essentials. Test Specification

Cyber Essentials. Test Specification Cyber Essentials Test Specification Contents Scope of the Audit...2 Assumptions...3 Success Criteria...3 External systems...4 Required tests...4 Test Details...4 Internal systems...7 Tester pre-requisites...8

More information

Clientless SSL VPN Users

Clientless SSL VPN Users Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you

More information

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by

More information

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

Course Description and Outline. IT Essential II: Network Operating Systems V2.0 Course Description and Outline IT Essential II: Network Operating Systems V2.0 Course Outline 1. Operating System Fundamentals 1.1 Operating System Basics 1.1.1 Overview of PC operating systems 1.1.2 PCs

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

SSL VPN A look at UCD through the tunnel

SSL VPN A look at UCD through the tunnel SSL VPN A look at UCD through the tunnel Background Why? Who is it for? Stakeholders IET Library Schools and Colleges Key Requirements Integrate with existing authentication Flexible security groups within

More information

Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7. Product Application Guide October 8, 2012

Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7. Product Application Guide October 8, 2012 Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7 Product Application Guide October 8, 2012 Table of Contents Introduction...3 Definitions and Abbreviations...3 GroundWork

More information

IT Security Standard: Network Device Configuration and Management

IT Security Standard: Network Device Configuration and Management IT Security Standard: Network Device Configuration and Management Introduction This standard defines the steps needed to implement Bellevue College policy # 5250: Information Technology (IT) Security regarding

More information

Improving Web Application Firewall Testing (WAF) for better Deployment in Production Networks January 2009 OWASP Israel

Improving Web Application Firewall Testing (WAF) for better Deployment in Production Networks January 2009 OWASP Israel Improving Web Application Firewall Testing (WAF) for better Deployment in Production Networks January 2009 OWASP Israel Gregory Fresnais Director of International Business Development Email: [email protected],

More information

VMware vcenter Log Insight Security Guide

VMware vcenter Log Insight Security Guide VMware vcenter Log Insight Security Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Managed Network Services

Managed Network Services ManagedNetwork Services Whatareyouwaitingfor? enesissystemsconsulting,inc.isaleading managed service provider of network, applicationsandserviceswithexpertisein voice,data,wireless,video,andvoiceover IP

More information

How Reflection Software Facilitates PCI DSS Compliance

How Reflection Software Facilitates PCI DSS Compliance Reflection How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance In 2004, the major credit

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

Application Monitoring using SNMPc 7.0

Application Monitoring using SNMPc 7.0 Application Monitoring using SNMPc 7.0 SNMPc can be used to monitor the status of an application by polling its TCP application port. Up to 16 application ports can be defined per icon. You can also configure

More information

Chapter 12 Supporting Network Address Translation (NAT)

Chapter 12 Supporting Network Address Translation (NAT) [Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information

More information

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network) 1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet

More information

Overview - Using ADAMS With a Firewall

Overview - Using ADAMS With a Firewall Page 1 of 6 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular

More information

Transport server data paths

Transport server data paths 1 of 14 14/11/2011 2:45 PM Applies to: Exchange Server 2010 SP1 Topic Last Modified: 2011-04-22 This topic provides information about ports, authentication, and for all data paths used by Microsoft Exchange

More information

Univention Corporate Server. Operation of a Samba domain based on Windows NT domain services

Univention Corporate Server. Operation of a Samba domain based on Windows NT domain services Univention Corporate Server Operation of a Samba domain based on Windows NT domain services 2 Table of Contents 1. Components of a Samba domain... 4 2. Installation... 5 3. Services of a Samba domain...

More information

Citrix Access on SonicWALL SSL VPN

Citrix Access on SonicWALL SSL VPN Citrix Access on SonicWALL SSL VPN Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through SonicWALL SSL VPN 5.0. It also includes information about configuring

More information

ACE Management Server Deployment Guide VMware ACE 2.0

ACE Management Server Deployment Guide VMware ACE 2.0 Technical Note ACE Management Server Deployment Guide VMware ACE 2.0 This technical note provides guidelines for the deployment of VMware ACE Management Servers, including capacity planning and best practices.

More information

Overview - Using ADAMS With a Firewall

Overview - Using ADAMS With a Firewall Page 1 of 9 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular

More information

Click Studios. Passwordstate. Installation Instructions

Click Studios. Passwordstate. Installation Instructions Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior

More information

Can You Afford Network Downtime?

Can You Afford Network Downtime? Can You Afford Network Downtime? Secure network monitoring software you can rely on to proactively MONITOR, ALERT and RECOVER your critical applications and infrastructure equipment. Proven agentless architecture

More information

LifeSize Control TM Deployment Guide

LifeSize Control TM Deployment Guide LifeSize Control TM Deployment Guide July 2011 LifeSize Control Deployment Guide 2 LifeSize Control This guide is for network administrators who use LifeSize Control to manage video and voice communications

More information