Default Network Ports for EFT and DMZ Gateway

The table below provides information about the default network ports used for clients (that is, browsers and web clients) and services such as AS2 and web services.

Ports

Purpose

EFT File Transfers protocols

TCP: 443 (HTTPS)

Inbound: Encrypted web connections for transferring files with EFT used by clients (browsers, web clients) and the services such:

AS2, Mobile Transfer Client

Invoke event rules via Web Services

EFT account management (password changed)

Outbound: Encrypted web connections used by EFT to transfer files via HTTPS with other application servers.

TCP: 80 (HTTP)

Inbound: Unencrypted web connections to transferring files with EFT used by clients (browsers, web clients) and other application servers.
Outbound: Unencrypted web connections used by EFT to transfer files via HTTP with other application servers.

TCP: 22 (SFTP)

Inbound: Encrypted TCP connections for transferring files with EFT via SFTP protocol used by SFTP clients.

Outbound: Encrypted TCP connections used by EFT to transfer files via SFTP protocol with other SFTP servers.

TCP: 21 (FTP)

Inbound: Unencrypted or Encrypted (Explicit SSL) TCP connections for transferring files with EFT via FTP protocol used by FTP clients.

Outbound: Unencrypted or Encrypted (Explicit SSL) TCP connections used by EFT to transfer files via FTP protocol with other FTP servers.

TCP: 990/ (FTP Implicit SSL)

TCP: 989 (outbound)

Inbound: Encrypted TCP connections for transferring files with EFT via FTP protocol used by FTP clients.

Outbound: Encrypted TCP connections used by EFT to transfer files via FTP protocol with other FTP servers.

TCP: 29000-30000
(FTP using PASV)

Inbound: Unencrypted or Encrypted TCP connections for transferring files with EFT via FTP when using PASV mode by FTP clients.

EFT Management, Notifications, and Auditing and Reporting

TCP: 1100 (administration Port)

TCP Unencrypted or Encrypted (SSL/TLS) connection used by EFT to manage its configuration via EFT administrator console or SFTPCOMInterface API

TCP: 4450 (HTTPS)

Port used by EFT for REST API.

TCP: 1433 (SQL Server)

TCP Unencrypted or encrypted (SSL/TLS) connection used to save and retrieve ARM logs into SQL Server

TCP: 1521 (Oracle)

TCP: 2484 (Oracle SSL)

TCP Unencrypted or encrypted (SSL/TLS) connection used to save and retrieve ARM logs into SQL Server

TCP: 25,465, 587 (SMTP)

TCP unencrypted connections used by EFT protocol for sending email notifications via SMTP.

TCP: 143 (IMAP)

TCP: 993 (IMAP SSL)

TCP unencrypted or encrypted (SSL) connections used by EFT for sending email notifications via IMAP.

EFT Content Integrity Control

TCP: 1344 (ICAP)

Unencrypted or encrypted (SSL/TLS) HTTP connection used by EFT to communicate with an ICAP server protocol for DLP (e.g. virus scanning, content filtering).

DMZ Gateway

UDP: 8443

Port used by DMZ gateway to connect to another DMZ using FAST protocol for file transfers using the accelerate transfer module.

TCP: 44500

TCP Unencrypted or encrypted (SSL/TLS) connections used by EFT to connect to, control DMZ and transfer files from DMZ gateway.

Storage

Direct TCP: 445

NetBIOS UDP: 137,138
NetBIOS TCP:138,139

SMB/CIFS protocol used by EFT to connect to a file shares (NAS) as a backend data storage

TCP: 860, 3260

iSCSI ports typically used by SAN storage, and consumed by EFT as storage presented as a NTFS local drive or file shares.

UDP: 138

DFS, Group Policy and NetBIOS used for Storage replication if used by EFT Server

EFT High Availability

TCP: 1801

RPC: 135, 2101*, 2103*, 2105*

UDP: 3527, 1801

Message Queuing default ports used by EFT to operate when deployed in High Availability mode and maintain its configuration synchronized and load balance processing of event rules.

UDP ports used when EFT is configured as multicast.

Active Directory

Active Directory

TCP: 135

RPC protocol used by Microsoft for Active Directory replication

UDP: 67

DHCP Server

TCP 139

User and Computer Authentication, Replication, DFSN, NetBIOS Session Service, NetLogon

TCP and UDP: 53

User and Computer Authentication, Name Resolution, Trusts

LDAP

TCP and UDP: 389

LDAP Directory, Replication, User and Computer Authentication, Group Policy, Trusts

TCP: 636

LDAP SSL Directory, Replication, User and Computer Authentication, Group Policy, Trusts

TCP: 3268

LDAP Global catalog for Directory, Replication, User and Computer Authentication, Group Policy, Trusts

TCP:3269

LDAP Global catalog for Directory, Replication, User and Computer Authentication, Group Policy, Trusts

Advanced Authentication

TCP: 1812

RADIUS server default port used by EFT for multifactor authentication

TCP: 4400 (HTTPS)

Encrypted HTTPS connections used by EFT to authenticate users with the Identity Provider Server using SAML protocol