Networking Ports Flashcards

And What They Do

1
Q

Ports are a transport layer (Layer 4) concept.

Only a transport protocol such as the Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) can indicate which port a packet should go to.

A

Port Numbers:

There are 65,535 possible port numbers, although not all are in common use.

The Internet Assigned Numbers Authority (IANA) maintains the full list of port numbers and protocols assigned to them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TCP

A

TCP

Transmission Control Protocol

TCP is a standard that dictates how to establish and maintain a connection through which two programs may exchange data.

TCP’s job is to break down messages or files into smaller pieces (called packets) that are then sent over the Internet. These packets are then received by another TCP layer that then reassembles the data into a complete file or message. TCP is also responsible for error-checking that data stream to ensure the delivery of the data; if an error is found TCP retransmits the packet(s).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

UDP

A

UDP

User Datagram Protocol

UDP is an alternative protocol to the (Transmission Control Protocol / Internet Protocol) TCP/IP that runs on top of IP and is sometimes referred to as UDP/IP. Unlike TCP/IP, UDP does not divide each transmission into packets, which allows for a faster transmission. However, UDP does not provide error checking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

PORT(s) 20/21

A

FTP

File Transfer Protocol

FTP is the most common way of sending and receiving files between two computers. An example of how FTP is used today is by web developers, who connect to their web server using an FTP client or FTP program (e.g., FileZilla) to send (upload) updated versions of a web page. Port 21 establishes connection and Port 20 transfers data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

PORT 22

A

SSH

Secure SHell

SSH (developed by SSH Communications Security Ltd.) is a secure protocol for remote logins. Using an SSH client, a user can connect to a server to transfer information in a more secure manner than other methods, such as telnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PORT 23

A

TELNET (TELetype NETwork)

A terminal emulation that enables a user to connect to a remote host or device using a telnet client, usually over port 23. For example, typing telnet hostname would connect a user to a hostname named hostname. Telnet enables a user to manage an account or device remotely. For example, a user may telnet into a computer that hosts their website to manage his or her files remotely. In the image to the right, is an example of a telnet session. As can be seen from this example, a telnet session is a command line interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PORT 25

A

SMTP

Simple Mail Transfer Protocol

SMTP is an Internet standard for the sending of e-mail messages over port 25. While it is mostly used for transfer from one mail server to another, some client mail applications use SMTP for relaying messages; whereas receiving happens via POP or IMAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PORT 53

A

DNS

Domain Name System

DNS is a service that receives a request containing a domain name hostname and responds with the corresponding IP address. The first DNS was designed and implemented by Paul Mockapetris and Jon Postel in 1983.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PORT(s) 67/68

A

DHCP

Dynamic Host Configuration Protocol

DHCP is a protocol used to assign an IP address to a computer or device connected to a network automatically. Routers, switches, or servers that use DHCP to assign addresses to other computerscan make setup and management easier for the network administrator.

On a home network, DHCP can be set up by purchasing a home router, wireless router, or switch with NAT/DHCP and connecting each computer to it. If the network has a firewall, ports 67 and 68 need to be open for devices to function properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PORT 80

A

HTTP

Hypertext Transfer Protocol

HTTP is a set of standards that allow users of the World Wide Web to exchange information found on web pages.

Today’s browsers no longer require HTTP in front of the URL since it is the default method of communication. However, it is kept in browsers because of the need to separate protocolssuch as FTP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PORT 110

A

POP3

Post Office Protocol

POP or POP mail is one of the most commonly used protocols used to receive e-mail on many e-mail clients. There are two different versions of POP: POP2 and POP3.

POP2 was an early standard of POP that was only capable of receiving e-mail and required SMTP to send e-mail.

POP3 is the latest standard and can send and receive e-mail only using POP, but can also be used to receive e-mail and then use SMTP to send e-mail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PORT 123

A

NTP

Network Time Protocol

The Network Time Protocol allows computer clocks to sync with each other, a process that is essential for encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PORT(s) 137 to 139

A

NetBIOS/NetBT

Network Basic Input/Output System

NetBIOS was developed by IBM, Microsoft, and Sytek. NetBIOS allows computers and applications to communicate with network hardware, and allow data to be transmitted properly over a network. For example, Microsoft Windows computers that are named in a workgroup and not a domain use NetBIOS names, which are converted to IP addresses.

NetBIOS commonly communicates on ports 137, 138, and 139. If your firewall blocks any of these ports you may get errors when your computer communicates with another computer that utilizes NetBIOS (e.g., MicrosoftWindows). To prevent these errors or warnings, you must provide access on these ports.

Udp 137 nbname
Udp 138 nbdatagram
Tcp 139 nbsession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PORT 143

A

IMAP

Internet Message Access Protocol

IMAP was first developed by Mark Crispin while at Stanford University in 1986. It is a protocol for retrieving e-mail from a server, similar to POP. The secure version of IMAP is called IMAPS, which stands for IMAP over SSL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PORT(s) 161/162

A

SNMP

Simple Network Management Protocol

SNMP was first introduced in 1988 and is a query, command, and response protocol.

SNMP examines and changes configuration parameters of LAN and WAN connected repeaters, bridges, routers, switches, and other devices connected to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

PORT 179

A

Border Gateway Protocol (BGP).

BGP is essential for establishing efficient routes between the large networks that make up the Internet (these large networks are called autonomous systems). Autonomous systems use BGP to broadcast which IP (Internet Protocol) addresses they control.

17
Q

PORT 389

A

LDAP

Lightweight Directory Access Protocol

LDAP is an Internet protocol that runs over TCP.
Most e-mail clients today and in the future contain this protocol or OpenLDAP.

18
Q

PORT 427

A

SLP

Service Location Protocol

(SLP, srvloc) is a service discovery protocol that allows computers and other devices to find services in a local area network without prior configuration. SLP has been designed to scale from small, unmanaged networks to large enterprise networks. It has been defined in RFC 2608 and RFC 3224 as standards track document.

19
Q

PORT 443

A

HTTPS

Hypertext Transfer Protocol Secure

HTTPS is a protocol which uses HTTP on a connection encrypted by transport-layer security. HTTPS is used to protect transmitted data from eavesdropping. It is the default protocol for conducting financial transactions on the web, and can protect a website’s users from censorship by a government or an ISP.

20
Q

PORT 445

A

SMB

Server Message Block

SMB is a common network communications method used on Microsoft operating systems allowing those computers to communicate with other SMB computers. SMB is akin to FTP, but for Microsoft.

CIFS

Common Internet File System

CIFS is a network file service protocol developed by Microsoft. It is used in conjunction with TCP/IP to facilitate file sharing across multiple platforms for a large number of simultaneous users.

21
Q

PORT 500

A

Internet Security Association and Key Management Protocol (ISAKMP), which is part of the process of setting up secure (Internet Protocol Security) IPsec connections.

22
Q

PORT 587

A

SMTP with authentication

23
Q

PORT 548

A

AFP

The Apple Filing Protocol

(AFP), formerly AppleTalk Filing Protocol, is a proprietary network protocol, and part of the Apple File Service (AFS), that offers file services for macOS and the classic Mac OS. In macOS, AFP is one of several file services supported, with others including Server Message Block (SMB), Network File System (NFS), File Transfer Protocol (FTP), and WebDAV.

24
Q

PORT 993

A

IMAPS

IMAP with Secure Sockets Layer

25
Q

PORT 995

A

POP3S

POP3 with Secure Sockets Layer

26
Q

PORT 3389

A

RDP

Remote Desktop Protocol

RDP is the protocol that enables Remote Desktop Connection to communicate with Microsoft Terminal Services. The Remote Desktop Protocol is commonly accessed through port 3389.