Default Network Ports for EFT and DMZ Gateway
The table below provides information about the default network ports used for clients (that is, browsers and web clients) and services such as AS2 and web services.
Ports |
Purpose |
---|---|
EFT File Transfers protocols |
|
Inbound: Encrypted web connections for transferring files with EFT used by clients (browsers, web clients) and the services such: AS2, Mobile Transfer Client Invoke event rules via Web Services EFT account management (password changed) Outbound: Encrypted web connections used by EFT to transfer files via HTTPS with other application servers. |
|
TCP: 80 (HTTP) |
Inbound: Unencrypted web connections
to transferring files with EFT used by clients (browsers, web
clients) and other application servers. |
TCP: 22 (SFTP) |
Inbound: Encrypted TCP connections for transferring files with EFT via SFTP protocol used by SFTP clients. Outbound: Encrypted TCP connections used by EFT to transfer files via SFTP protocol with other SFTP servers. |
TCP: 21 (FTP) |
Inbound: Unencrypted or Encrypted (Explicit SSL) TCP connections for transferring files with EFT via FTP protocol used by FTP clients. Outbound: Unencrypted or Encrypted (Explicit SSL) TCP connections used by EFT to transfer files via FTP protocol with other FTP servers. |
TCP: 990/ (FTP Implicit SSL) TCP: 989 (outbound) |
Inbound: Encrypted TCP connections for transferring files with EFT via FTP protocol used by FTP clients. Outbound: Encrypted TCP connections used by EFT to transfer files via FTP protocol with other FTP servers. |
TCP: 29000-30000 |
Inbound: Unencrypted or Encrypted TCP connections for transferring files with EFT via FTP when using PASV mode by FTP clients. |
TCP: 1100 (administration Port) |
TCP Unencrypted or Encrypted (SSL/TLS) connection used by EFT to manage its configuration via EFT administrator console or SFTPCOMInterface API |
TCP: 4450 (HTTPS) |
|
TCP: 1433 (SQL Server) |
TCP Unencrypted or encrypted (SSL/TLS) connection used to save and retrieve ARM logs into SQL Server |
TCP: 1521 (Oracle) TCP: 2484 (Oracle SSL) |
TCP Unencrypted or encrypted (SSL/TLS) connection used to save and retrieve ARM logs into SQL Server |
TCP: 25,465, 587 (SMTP) |
TCP unencrypted connections used by EFT protocol for sending email notifications via SMTP. |
TCP: 143 (IMAP) TCP: 993 (IMAP SSL) |
TCP unencrypted or encrypted (SSL) connections used by EFT for sending email notifications via IMAP. |
EFT Content Integrity Control |
|
Unencrypted or encrypted (SSL/TLS) HTTP connection used by EFT to communicate with an ICAP server protocol for DLP (e.g. virus scanning, content filtering). |
|
DMZ Gateway |
|
UDP: 8443 |
Port used by DMZ gateway to connect to another DMZ using FAST protocol for file transfers using the accelerate transfer module. |
TCP: 44500 |
TCP Unencrypted or encrypted (SSL/TLS) connections used by EFT to connect to, control DMZ and transfer files from DMZ gateway. |
Storage |
|
Direct TCP: 445 NetBIOS UDP: 137,138 |
SMB/CIFS protocol used by EFT to connect to a file shares (NAS) as a backend data storage |
TCP: 860, 3260 |
iSCSI ports typically used by SAN storage, and consumed by EFT as storage presented as a NTFS local drive or file shares. |
UDP: 138 |
DFS, Group Policy and NetBIOS used for Storage replication if used by EFT Server |
EFT High Availability |
|
TCP: 1801 RPC: 135, 2101*, 2103*, 2105* UDP: 3527, 1801 |
Message Queuing default ports used by EFT to operate when deployed in High Availability mode and maintain its configuration synchronized and load balance processing of event rules. UDP ports used when EFT is configured as multicast. |
Active Directory |
|
Active Directory TCP: 135 |
RPC protocol used by Microsoft for Active Directory replication |
UDP: 67 |
DHCP Server |
TCP 139 |
User and Computer Authentication, Replication, DFSN, NetBIOS Session Service, NetLogon |
TCP and UDP: 53 |
User and Computer Authentication, Name Resolution, Trusts |
TCP and UDP: 389 |
LDAP Directory, Replication, User and Computer Authentication, Group Policy, Trusts |
TCP: 636 |
LDAP SSL Directory, Replication, User and Computer Authentication, Group Policy, Trusts |
TCP: 3268 |
LDAP Global catalog for Directory, Replication, User and Computer Authentication, Group Policy, Trusts |
TCP:3269 |
LDAP Global catalog for Directory, Replication, User and Computer Authentication, Group Policy, Trusts |
Advanced Authentication |
|
TCP: 1812 |
RADIUS server default port used by EFT for multifactor authentication |
TCP: 4400 (HTTPS) |
Encrypted HTTPS connections used by EFT to authenticate users with the Identity Provider Server using SAML protocol |