TCP/UDP # General Name Short Description



Similar documents
Basic Network Configuration

List of Common TCP/IP port numbers

Communication Ports Used by Citrix Technologies. April 2011 Version 1.5

Addresses, Protocols, and Ports

41376 UDP performing get device status Command Workstation (CWS), Harmony, Bi-directional Driver TCP/UDP

Communication ports used by Citrix Technologies. July 2011 Version 1.5

Roles for Servers in the SCW Database

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

NAM CLI Commands: - logout

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

VPNSCAN: Extending the Audit and Compliance Perimeter. Rob VandenBrink

Citrix TCP Ports Communication Ports Used By Citrix Technologies. August 2009 Version 1.0

TCP/IP Ports and Protocols:

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

EXPLORER. TFT Filter CONFIGURATION

Network-Based Application Recognition

Product Standard General Interworking: Internet Server

PCI DSS Requirement Vulnerable Hosts Based on Open Ports Report

Windows Server 2003 default services

Copyright 2006 Comcast Communications, Inc. All Rights Reserved.

Configuring a Backup Path Test Using Network Monitoring

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Port Requirements for SolarWinds Products

First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring

Inforland

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK

How To Set Up A Server On A Windows 7.5 (Windows) With A Powerline (Windows 7) On A Pc Orion (Windows 8) On An Ipm (Networking) On Your Pc Ornet (Netware)

Classification of Firewalls and Proxies

Exam Questions SY0-401

- Basic Router Security -

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0

Secure Shell (SSH) used for secure logins, file transfers (scp, sftp) and port forwarding

imagepress CR Server A7000 Powered by Creo Color Server Technology For the Canon imagepress C7000VP/C6000VP/ C6000

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

Manual. By GFI Software Ltd. GFI Network Server Monitor

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Linux MDS Firewall Supplement

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

A Guide to New Features in Propalms OneGate 4.0

Preparing for GO!Enterprise MDM On-Demand Service

LifeSize Transit Deployment Guide June 2011

IBM. Vulnerability scanning and best practices

Inside-Out Attacks. Covert Channel Attacks Inside-out Attacks Seite 1 GLÄRNISCHSTRASSE 7 POSTFACH 1671 CH-8640 RAPPERSWIL

Interwise Connect. Working with Reverse Proxy Version 7.x

Distributed Systems. 2. Application Layer

Chapter 6 Virtual Private Networking Using SSL Connections

Novell Access Manager SSL Virtual Private Network

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

F-Secure Messaging Security Gateway. Deployment Guide

Security Guide for ActiveRoles Server 6.1

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

Inside-Out Attacks. Security Event April 28, 2004 Page 1. Responses to the following questions

Network Working Group Request for Comments: 840 April Official Protocols

Network Configuration Settings

Cross-platform TCP/IP Socket Programming in REXX

How To Monitor Your Network Server With Gfi Network Server Monitor

My FreeScan Vulnerabilities Report

Security. TestOut Modules

Barracuda SSL VPN Administrator s Guide

Introduction to the EIS Guide

GoToMyPC Corporate Advanced Firewall Support Features

Pre Sales Communications

Connecting to and Setting Up a Network

SolarWinds Technical Reference

FAQs for Oracle iplanet Proxy Server 4.0

File Transfer Protocol (FTP) & SSH

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

Cyber Essentials. Test Specification

Clientless SSL VPN Users

CTS2134 Introduction to Networking. Module Network Security

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

SonicWALL PCI 1.1 Implementation Guide

SSL VPN A look at UCD through the tunnel

Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7. Product Application Guide October 8, 2012

IT Security Standard: Network Device Configuration and Management

Improving Web Application Firewall Testing (WAF) for better Deployment in Production Networks January 2009 OWASP Israel

VMware vcenter Log Insight Security Guide

Managed Network Services

How Reflection Software Facilitates PCI DSS Compliance

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Application Monitoring using SNMPc 7.0

Chapter 12 Supporting Network Address Translation (NAT)

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

Overview - Using ADAMS With a Firewall

Transport server data paths

Univention Corporate Server. Operation of a Samba domain based on Windows NT domain services

Citrix Access on SonicWALL SSL VPN

ACE Management Server Deployment Guide VMware ACE 2.0

Overview - Using ADAMS With a Firewall

Click Studios. Passwordstate. Installation Instructions

Can You Afford Network Downtime?

LifeSize Control TM Deployment Guide

Transcription:

This appendix is designed to provide general information about service ports that are discovered on IP networks. Outlined are ports 1-80, along with many other common higher ports and specific ports found within the environment. TCP/UDP # General Name Short Description 0 Reserved Reserved 1 TCP Port N/A Service Multiplex 2 Compressnet Proprietary Management Utility 3 Compressnet Proprietary Compression Process 4 Unassigned Unassigned 5 RJE Remote Job Entry Protocol. postel@isi.edu 6 Unassigned N/A 7 ECHO Echo protocol, used to discovered live IP hosts on an IP network. 8 Unassigned N/A 9 Discard Discard protocol, used for packet discard signaling. 10 Unassigned N/A 11 Sysstat Sysstat protocol, used to determine information about active remote users connected to a system. 12 Unassigned N/A 13 Daytime Daytime (RFC 867), used to determine the time from a remote computer hosting this service. 14 Unassigned N/A 15 Unassigned N/A 16 Unassigned N/A 17 QOTD QOTD (Quote of the Day) protocol, used to obtain a quote of information from a remote computer hosting this service. 18 MSP MSP (Message Sent Protocol), used to send general network messages to computers on an IP network. 19 CHARGEN Character Generator protocol, used to generate random character strings from a remote computer. 20 FTP-DATA FTP (File Transfer Protocol), used to download data from a remote IP host. 1/9

21 FTP FTP (File Transfer Protocol), used to control the downloading of data from a remote IP host. 22 (SSH) SSH SSH Remote Login Protocol, used as an alternative to TELNET to provide encryption of remote shell and logon processes. 22 (PCAnywhere) PCAnywhere Symantecs PCAnywhere uses port 22 for remote client authentication when providing a PCAnywhere session. 23 TELNET TELNET, a remote shell and login protocol, providing remote shell access on IP hosts. 24 APMS Any Private Mail System. (No Description) 25 SMTP SMTP (Simple Mail Transfer Protocol) is used to delivery and remotely queue IP mail between IP hosts and domains. 26 Unassigned N/A 27 NSW User System FE Proprietary for NSM systems, sometimes used by SLMAIL. 28 Unassigned N/A 29 MSG ICP Proprietary, No 30 Unassigned N/A 31 MSG AUTH MSG Authentication, Proprietary. No 32 Unassigned N/A 33 DSP Display Support Protocol, Proprietary. No 34 Unassigned N/A 35 APPS Any Private Printer Server, flexible for all IP Print servers. 36 Unassigned N/A 37 TIME Time Protocol, used to determine the time from a remote computer hosting this service. 38 RAP Route Access Protocol, used to discovered IP network gateways, when one is not assigned. (Experimental) 39 RLP Resource Location Protocol, used to find hosted resources on remote IP clients. 40 Unassigned N/A 41 Graphics Graphics, used for accelerated graphics over the network, used via Direct3D. 42 (IANA) HNS 2/9

Host Name Server, used for hostname resolution to IP address. 42 (Microsoft) WINS Windows Internet Naming Service, used to resolve NetBIOS computer names to IP address. 43 WHOIS WHOIS, used to find information about a remote IP host. 44 MPM-FLAGS MPM Flags Protocol, Proprietary. No 45 MPM Message Processing Module. (RECV), Proprietary. No 46 MPM-SND MPM Send, Proprietary. No 47 NI-FTP NI FTP, Proprietary. No 48 AUDITD Digital Audit Daemon, Proprietary. No 49 TACAS Login Host Protocol, provides central authentication services for network communications devices. 50 RE-MAIL-CH Remote Mail Checking Protocol, Proprietary. No 51 LA-MAINT IMP Logical Address Maintenance, Proprietary. No 52 XNS-TIME XNS Time Protocol, Proprietary. No 53 DNS Domain Name Service, provides hostname to IP address resolution for IP networks. 54 XNS-CH XNS Clearing House, Proprietary. No 55 ISI-GL ISI Graphics Language, Proprietary. No 56 XNS-AUTH XNS Authentication, Proprietary. No 57 APTA Any Private Terminal Access, Proprietary. No 58 XNS-MAIL XNS Mail Protocol, Proprietary. No 59 APFS Any Private File Service, Proprietary. No 60 Unassigned N/A 61 NI-MAIL NI MAIL, Proprietary. No 62 ACAS ACA Services, Proprietary. No 63 WHOIS++ WHOIS++, Proprietary. No 64 COVIA 3/9

Communications Integrator. (CI), Proprietary. No 65 TACAS-DS TACAS Database Service provides database services for the TACAS protocol. 66 SQL*NET Used by Oracle and SQL*NET for network database services over IP. 67 BOOTPS Bootstrap Protocol Server, used to allow diskless workstation clients to boot onto an IP network and obtain its IP address automatically from servers hosting this service. 68 BOOTPC Bootstrap Protocol Client, used by diskless clients to query BOOTPS for an IP address. 69 TFTP TFTP (Trivial File Transfer Protocol) provides downloading and uploading of data between network hosts on an IP network. 70 Gopher Gopher provides search engine type functions over an IP network. 71 NETRJS-1 Remote Job Service #1, Proprietary. No 72 NETRJS-2 Remote Job Service #1, Proprietary. No 73 NETRJS-2 Remote Job Service #1, Proprietary. No 74 NETRJS-4 Remote Job Service #1, Proprietary. No 75 APDOS Any Private Dial Out Service, Proprietary. No 76 DEOS Distributed External Object Store, Proprietary. No 77 APRJES Any Private RJE Service, Proprietary. No 78 VETTCP VET TCP, Proprietary. No 79 FINGER Finger services provide information about users logged onto a remote system. 80 HTTP HTTP (HyperText Transfer Protocol) provides web services such as websites and downloading/uploading of remote files. 88 KERBEROS Kerberos is an authentication protocol, used is Windows 2000 (NATIVE MODE) along with some implementations of UNIX. 109 POP2 4/9

POP2 (Post Office Protocol version 2) provides e-mail clients with the ability to download e-mail from remote IP mail servers hosting this service. 110 POP3 POP3 (Post Office Protocol version 3) provides e-mail clients with the ability to download e-mail from remote IP mail servers hosting this service. 111 SUNRPC SUN Remote Procedure Call Protocol, remote execution ability in RPC with Sun Micro systems. 113 AUTH Authentication provides remote authentication mechanism. Usually hosted on firewalls. 115 SFTP SFTP (Simple File Transfer Protocol) used to download data from a remote IP host. 118 SQLSERV Legacy SQL database services. 119 NNTP NNTP (Network News Transfer Protocol) used to provide global newsgroup capabilities in an IP network. 123 NTP NTP (Network Time Protocol) used to provide remote IP clients with Time synchronization capabilities. 135 EPMAP DCE Endpoint Resolution. 137 NETBIOS-NS NETBIOS Name Service, used in Microsoft Networks to provide remote name resolution 138 NEBIOS-DGM NETBIOS Datagram Service, used in Microsoft Networks for NETBIOS UDP support. 139 NETBIOS-SSN NETBIOS Session Service, used in Microsoft Networks for NETBIOS session layer support. 143 IMAPv4 IMAP (Internet Message Access Protocol version 4) provides e-mail clients with the ability to download e-mail from remote IP mail servers hosting this service. 161 SNMP SNMP (Simple Network Management Protocol) used to capture statistical network data from devices running SNMP services. 194 IRC IRC (Internet Relay Chat Protocol) provides IRC clients the ability to connect to IRC-SERV (see port 529) on an IP network to provide Instant Messaging. 199 SMUX SMUX is used for providing multiplexing capabilities over IP networks. (Primarily in UNIX) 5/9

280 HTTP-MGT HTTP (HyperText Transfer Protocol Management) provides a remote management configuration through HTTP, or web services. 389 LDAP LDAP (Lightweight Directory Access Protocol) provides access to a networked directory over IP networks. 443 HTTPS HTTP over SSL, provides HTTP services (See port 80) over SSL (secure socket layer) to 445 Microsoft-DS Microsoft Directory Service provides for File and Print Sharing through the Active Directory in Windows 2000. 464 KPASSWD Kerberos Password provides a means to transmit Kerberos (See port 88) logon credentials in an encrypted format over an IP network. 512 (EXEC) TCP 512 (Comsat) UDP 512 (BIFF) UDP 513 (LOGIN) TCP 513 (WHO) UDP 514 (SHELL) TCP 514 (SYSLOG) UDP EXEC COMSAT BIFF LOGIN WHO SHELL SYSLOG EXEC provides remote process execution authentication performed using passwords and UNIX login names. COMSAT, Proprietary. No BIFF provides mail notification to remote clients to alert them when new mail has arrived. (UNIX) Login provides remote login via telnet, automatic authentication performed based on privileged port numbers and distributed databases which identify "authentication domains". (UNIX) WHO maintains databases showing who's logged in to machines on a local net and the load average of the CPU. (UNIX) Shell provides a cmd.exe interface like exec, but automatic authentication is performed through the login server. (UNIX) SYSLOG provides statistical logging information about devices on an IP network. 515 SPOOLER SPOOLER allows for remote print queuing, which is usually present on most network print servers in an IP network. 529 IRC-SERV IRC (Internet Relay Chat Protocol Server) provides IRC services to IRC clients. 6/9

563 NNTPS NNTP over SSL provides NNTP services (See port 119) over SSL (secure socket layer) to 585 IMAP4S IMAP version 4 over SSL provides IMAP4 services (See port 143) over SSL (secure socket layer) to provide encryption, to protect data as it (Also found on Port 993) 593 HTTP/DCE HTTP-RPC-EPMAP provides RPC (Remote Procedure Call) functionality through the HTTP protocol. 636 LDAPS LDAP over SSL provides LDAP services (See port 389) over SSL (secure socket layer) to 799 ControlIT / Remotely Possible 800 ControlIT / Remotely Possible Computer Associates Remotely Possible and ControlIT product lines use this port to establish remote control sessions. Computer Associates Remotely Possible and ControlIT product lines use this port to establish remote control sessions. 989 FTP-DATAS FTP-DATA over SSL provides FTP-DATA services (See port 20) over SSL (secure socket layer) to 990 FTPS FTP over SSL provides FTP services (See port 21) over SSL (secure socket layer) to provide encryption, to protect data as it transverses an IP network. 992 TELNETS Telnet over SSL provides TELNET services (See port 23) over SSL (secure socket layer) to 993 IMAPS IMAP version 4 over SSL provides IMAP4 services (See port 143) over SSL (secure socket layer) to provide encryption, to protect data as it (Also found on Port 585) 994 IRCS IRC over SSL provides IRC services (See port 194) over SSL (secure socket layer) to provide encryption, to protect data as it transverses an 7/9

IP network. 995 POP3S POP3 over SSL provides POP3 services (See port 110) over SSL (secure socket layer) to 1023-1030 (IANA) Reserved N/A 1023-1030 (Microsoft) FPS Microsofts File and Print Sharing Services, allowing for remote registry changes over NetBIOS. 1433 SQL Microsofts SQL database access protocol for SQL over an IP network. 1494 Citrix ICA Citrix Thin-Client technology provides terminal services to remote clients for low bandwidth usage. 1505 FunkProxy Funk softwares Proxy product line hosts remote control services over IP networks. 1720 H323 H323 provides Voice over IP capabilities on an IP network, to effectively encapsulate Analog voice into Digital IP packets to be routed. 1723 PPTP PPTP (Point to Point Tunneling Protocol) provides tunnel encryption capabilities between hosts on an IP network. 2000 Remotely Anywhere 2001 Remotely Anywhere 3000 30xx Remote Printer Queuing 3389 Terminal Services Remotely Anywhere hosts remote control services over IP networks. Remotely Anywhere hosts remote control services over IP networks. These ports are often found hosting remote print capabilities on a network print server in an IP network. Microsofts Terminal Services provides remote clients with a low bandwidth remote access to server resources. 5631 PCAnywhere Symantecs PCAnywhere hosts remote control services over IP networks. 5632 PCAnywhere Symantecs PCAnywhere hosts remote control services over IP networks. 5800 58xx VNC AT&Ts VNC (Virtual Network Control) hosts remote control services over IP networks through emulated HTTP services using JAVA APPLETS. 8/9

42509 InoculateIT etrust Admin Server 42510 InoculateIT etrust client service InoculateIT 6.0 admin service provides policy based virus software management over an IP network. InoculateIT 6.0 client service queries admin services to receive policies pertaining to virus protection software. 49408 / 49609 NetMeeting Microsofts NetMeeting product line offers remote control capabilities, along with video and voice conferencing over IP based networks. 65301 PCAnywhere Symantecs PCAnywhere provides remote control services over IP networks. 9/9