1 of 5 5/19/05 9:48 AM

Size: px
Start display at page:

Download "1 of 5 5/19/05 9:48 AM"

Transcription

1 1 of 5 5/19/05 9:48 AM

2 "Well Known" TCP and UDP Ports Used By Apple Software Products This document lists TCP and UDP ports used by Apple software products, such as Mac OS 9, Mac OS X, Mac OS X Server, AppleShare IP, Network Assistant, Apple Remote Desktop, Macintosh Manager, and.mac. Many of these are referred to as "well known," industry standard ports. About this table The Service or Protocol Name column lists services registered with the Internet Assigned Numbers Authority ( except where noted as "unregistered use." The names of Apple products that use these services or protocols appear in the Used By/Additional Information column. The RFC column lists the number of the Request For Comment document that defines the particular service or protocol, which may be used for reference. RFC documents are maintained by RFC Editor ( If multiple RFCs define a protocol, there may only be one listed here. This document is updated periodically, and the information listed is that available at time of publication. This document is intended as a quick reference and should not be regarded as comprehensive. Apple products listed in the table are the most commonly used examples, not a comprehensive list. For more information, review the Notes below the table. 7 echo File Transport Protocol (FTP) 21 FTP control Secure Shell (SSH) Telnet Simple Mail Transport Protocol (SMTP) 821 Mail (for sending ) 53 Domain Name System 1034 MacDNS (DNS) 79 Finger Hypertext Transfer Protocol 2068 World Wide Web,.Mac, Sherlock, QuickTime Installer, itunes Music Store and (HTTP) Radio, Software Update, RAID Admin, Backup, ical calendar publishing, Virex eupdate, iphoto HomePage publishing 88 Kerberos Password Server - Mac OS X Server Password Server 110 Post Office Protocol (POP3) 1081 Mail (for receiving ) Authentication Post Office Protocol (APOP) 111 Remote Procedure Call (RPC) 1057 Portmap (sunrpc) 113 Authentication Service Secure File Transfer Program (SFTP) - Note: Some authorities reference a "Simple File Transport Protocol" or "Secured File Transport Protocol" on this port. 119 Network News Transfer Protocol (NNTP) 977 Used by applications that read newsgroups. 123 Network Time Protocol (NTP) 1119 Date & Time preferences. Used for network time server synchronization. 139 Server Message Block (SMB)100 Used by Microsoft Windows file and print services, such as Windows Sharing in Mac OS X. 143 Internet Message Access Protocol (IMAP) 2060 Mail (for receiving ) 311 AppleShare IP WebAdmin - AppleShare IP remote Web administration, Server Monitor, Server Status (servermgrd), Workgroup Manager (DirectoryService), Server Admin (10.3 and later) 389 Lightweight Directory 1777 Used by applications that look up addresses, such as Mail and Address Book. Access Protocol (LDAP) 427 Service Location Protocol (SLP) 2608 Network Browser 443 Secure Sockets Layer (SSL, - Secured websites, itunes Music Store, iphoto HomePage publishing, isync or "HTTPS") 514 shell of 5 5/19/05 9:48 AM

3 515 Line Printer (LPR), Line Printer Daemon (LPD) 1179 Used for printing to a network printer, Printer Sharing in Mac OS X. 532 netnews Apple Filing Protcol (AFP) over TCP - AppleShare, Personal File Sharing, Apple File Service 554 Real Time Streaming Protocol (RTSP) 2326 QuickTime Streaming Server (QTSS), streaming media players Mac OS X RPC-based - Used by NetInfo, for example. services 625 Directory Service Proxy (DSProxy) - DirectoryService, Open Directory Assistant, Workgroup Manager Note: This port is registered to DEC DLM. 631 Internet Printing Protocol (IPP) 2910 Mac OS X Printer Sharing 626 AppleShare Imap Admin - IMAP Administration (Mac OS X Server or earlier, AppleShare IP 6) (ASIA) 660 MacOS Server Admin - Server Admin (both AppleShare IP and Mac OS X Server), Server Settings 687 asipregistry - AppleShare IP Shared Users and Groups, Server Monitor, Server Status (servermgrd) 1220 QT Server Admin - Used for administration of QuickTime Streaming Server PPTP - Mac OS X Server VPN service 2236 Macintosh Manager - Macintosh Manager 3031 Remote AppleEvents - Program Linking, Remote Apple Events 3283 Net Assistant - Apple Remote Desktop 2.0 or later (Reporting feature) 3659 Simple Authentication and - Mac OS X Server Password Server Security Layer (SASL) 3689 Digital Audio Access - itunes Music Sharing Protocol (DAAP) AirPort Admin Utility, AirPort Express Assistant Mac OS X camera and scanner sharing 5190 America Online (AOL) - ichat and AOL Instant Messenger, file transfer ichat (local traffic), Rendezvous ichat (local traffic), Rendezvous 5900 Virtual Network Computing - Apple Remote Desktop 2.0 or later (Observe/Control feature) (VNC) 5988 WBEM HTTP - Apple Remote Desktop 2.0 or later (see RTSP - QuickTime Streaming Server (RTSP) Automatic Router Configuration Protocol (ARCP - Registered Use) Web service, itunes Radio streams Web service with performance cache Web service with performance cache itunes Radio streams 7 echo Domain Name System (DNS) Bootstrap Protocol Server (BootP, - NetBoot via DHCP bootps) 68 Bootstrap Protocol Client (bootpc) 951 NetBoot via DHCP 69 Trivial File Transfer Protocol (TFTP) Remote Procedure Call (RPC) 1057, Network Time Protocol (NTP) Windows Internet Naming Service - - (WINS) 138 NETBIOS Datagram Service - Windows Datagram Service, Windows Network Neighborhood 161 Simple Network Management Protocol (SNMP) AirPort Base Station PPP status or discovery (certain configurations), AirPort Admin Utility, AirPort Express Assistant 427 Service Location Protocol (SLP) of 5 5/19/05 9:48 AM

4 497 dantz - Retrospect backup software, by Dantz. 500 ISAKMP/IKE - Mac OS X Server VPN service 513 who Syslog Real Time Streaming Protocol (RTSP) - QuickTime Streaming Server Mac OS X RPC-based services - Used by NetInfo, for example L2TP - Mac OS X Server VPN service 2049 Network File System (NFS) Remote AppleEvents - Program Linking, Remote Apple Events 3283 Net Assistant - Apple Network Assistant, Apple Remote Desktop 1.x, Apple Remote Desktop 2.x (All other services not using TCP Ports 5900, 3283, and 5988) 3659 Simple Authentication and Security - Mac OS X Server Password Server Layer (SASL) 4500 IKE NAT Traversal - Mac OS X Server VPN service 5060 Session Initiation Protocol (SIP) 2543 ichat AV 5190 America Online (AOL) - ichat and AOL Instant Messenger, file transfer ichat (local traffic), Rendezvous 5353 Multicast DNS (MDNS) - Rendezvous (mdnsresponder) 5678 SNATMAP server QuickTime Streaming Server 7070 RTSP alternate - QuickTime Streaming Server Real-Time Transport Protocol (RTP), - ichat AV (Audio RTP, RTCP; Video RTP, RTCP) Real-Time Control Protocol (RTCP) Notes Not all ports and services listed are present in or used by all software products. Some applications, such as Workgroup Manager, require more than one port and are listed accordingly. Network administrators may wish to use port-watching software in addition to this information when making decisions about how to set up firewalls or similar access control schemes. 3. For an explanation of what a TCP or UDP port is, see the "IP Ports" section of technical document , "Mac OS X: What Is a Port?" 4. In Mac OS X Server and later, some services that do not use well-known ports register with portmap. Use the rpcinfo -p command in Terminal to see what is registered with portmap The NetInfo parent-child model has replaced Shared Users and Groups in Mac OS X Server and later. Remote Admin on port 311 has been removed in Mac OS X Server and later. 7. With performance cache enabled in Mac OS X Server and later, Apache is on port and cache is on port This table includes features and ports used by Mac OS X 10.3 Panther. Earlier versions of Mac OS X do not have all the features listed here. 9. For Mac OS X Server 10.3 VPN service: PPTP uses the IP-GRE protocol (IP protocol 47). L2TP/IPsec uses the IP-ESP protocol (IP protocol 50, ESP). Important: Information about products not manufactured by Apple is provided for information purposes only, and does not constitute Apple's recommendation or endorsement. Please contact the vendor for additional information. Document 17159, "Locating Vendor Information" can help you search for a particular vendor's address and phone number. Article ID: Date Created: August 27, 2001 Date Modified: March 16, of 5 5/19/05 9:48 AM

5 Copyright 2005 Apple Computer, Inc. All rights reserved. 5 of 5 5/19/05 9:48 AM

TCP, UDP Ports, and ICMP Message Types1

TCP, UDP Ports, and ICMP Message Types1 Appendix A APPENDIX A TCP, UDP Ports, and ICMP Message Types1 I list useful TCP, UDP ports, and ICMP message types in this appendix. A comprehensive list of registered TCP and UDP services may be found

More information

Addresses, Protocols, and Ports Reference

Addresses, Protocols, and Ports Reference APPENDIXA Addresses, Protocols, and Ports Reference This appendix provides a quick reference for the following topics: IP Addresses and Subnet Masks Protocols and Applications TCP and UDP Ports ICMP Types

More information

Supported services. 21/tcp FTP File transfer. 22/tcp SSH Secure shell. 23/tcp Telnet Terminal access. 37/tcp Time Time. 80/tcp HTTP WWW pages

Supported services. 21/tcp FTP File transfer. 22/tcp SSH Secure shell. 23/tcp Telnet Terminal access. 37/tcp Time Time. 80/tcp HTTP WWW pages Supported services For security reasons stricter rules are applied to networks engaged in the eduroam project. The eduroam network is connected to Internet via Cisco PIX firewall. Everything that is not

More information

Introduction to Networking

Introduction to Networking Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI

More information

Granular Protocol Inspection

Granular Protocol Inspection The feature adds flexibility to the Cisco IOS Firewall by allowing it to perform a higher degree of inspection of TCP and User Data Protocol (UDP) traffic for most RFC 1700 application types. Finding Feature

More information

Addresses, Protocols, and Ports

Addresses, Protocols, and Ports This chapter provides a quick reference for IP addresses, protocols, and applications. IPv4 Addresses and Subnet Masks, page 1 IPv6 Addresses, page 5 Protocols and Applications, page 11 and Ports, page

More information

Download the latest version of the DNS2Go Client from:

Download the latest version of the DNS2Go Client from: Using DNS2Go with your Linksys Cable / DSL Router Many users with Cable and xdsl broadband connections are using hardware routers such as the Linksys Cable/DSL Routers to connect their local area network

More information

Addresses, Protocols, and Ports

Addresses, Protocols, and Ports APPENDIXB This appendix provides a quick reference for IP addresses, protocols, and applications. This appendix includes the following sections: IPv4 Addresses and Subnet Masks, page B-1 IPv6 Addresses,

More information

Network-Based Application Recognition

Network-Based Application Recognition Network-Based Application Recognition Last updated: September 2008 Common questions and answers regarding Cisco Network-Based Application Recognition (NBAR) follow. Q. What is NBAR? A. NBAR, an important

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 8 Networking Essentials Objectives Learn about the protocols and standards Windows uses for networking Learn how to connect

More information

Port Utilization in Unified CVP

Port Utilization in Unified CVP Utilization in Unified CVP Utilization Table Columns, page 1 Unified CVP Utilization, page 2 Utilization Table Columns The columns in the port utilization tables in this document describe the following:

More information

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Properties and characteristics of TCP/IP IPv4 IPv6 Public vs private vs APIPA/link local Static vs dynamic Client-side DNS settings Client-side DHCP Subnet mask vs CIDR Gateway TCP/IP

More information

Microsoft Microsoft TS: MS Internet Security & Acceleration Server 2006, Configuring. Practice Test. Version:

Microsoft Microsoft TS: MS Internet Security & Acceleration Server 2006, Configuring. Practice Test. Version: Microsoft 70-351 Microsoft 70-351 TS: MS Internet Security & Acceleration Server 2006, Configuring Practice Test Version: 2.2 QUESTION NO: 1 Your network consists of a single Active Directory domain named

More information

IxLoad Data Streaming (RTSP, RTP)

IxLoad Data Streaming (RTSP, RTP) IxLoad Data Streaming (RTSP, RTP) IxLoad can be used to: Benchmark the performance of streaming media servers and media caches Measure the impact of network degradation on the quality of media delivered

More information

Legal and notice information

Legal and notice information Legal and notice information Copyright 2017 Trend Micro Incorporated. All rights reserved. TippingPoint, the TippingPoint logo, and Digital Vaccine are trademarks or registered trademarks of Trend Micro

More information

Secure Router 1001,1001S, 1002, 1004, and 3120

Secure Router 1001,1001S, 1002, 1004, and 3120 Secure Router 1001,1001S, 1002, 1004, and 3120 Software Release 9.2.5 Readme Notes 1. Release Summary Release Date: 21-September-2007 Purpose: Software maintenance release to address customer found software

More information

BGP. bgp. Name/CLI Keyword. Border Gateway Protocol. Full Name

BGP. bgp. Name/CLI Keyword. Border Gateway Protocol. Full Name BGP bgp Border Gateway Protocol Border Gateway Protocol (BGP) is a protocol designed to share network information (for example network reachability) between autonomous systems (AS). According to the information,

More information

General Terms Node - File Permissions - file permissions file

General Terms Node - File Permissions - file permissions file CIS 375 General Terms Node - A networked computing device that takes a protocol address andcan initiate and respond to communication from other networked devices that employ similar protocols. File Permissions

More information

Lecture-4. TCP/IP-Overview:

Lecture-4. TCP/IP-Overview: Lecture-4 TCP/IP-Overview: The history goes back to ARPANET a research network sponsored by DoD US Govt. It eventually connected hundreds of universities and govt installations, using leased telephone

More information

TCP/IP Filtering. Main TCP/IP Filtering Dialog Box. Route Filters Button. Packet Filters Button CHAPTER

TCP/IP Filtering. Main TCP/IP Filtering Dialog Box. Route Filters Button. Packet Filters Button CHAPTER CHAPTER 11 Main Dialog Box To access this dialog box (Figure 11-1), select Global/Filtering/ from the Device View. Figure 11-1 Main Configuration Dialog Box Route Filters Button This button brings up a

More information

Windows Compatibility and Mac OS X

Windows Compatibility and Mac OS X Windows Compatibility and Mac OS X From sharing documents to sharing networks, Mac OS X makes it easy to use your Mac in a Windows environment. Features Use more than 12,000 applications, including Microsoft

More information

OER uses the following default value if this command is not configured or if the no form of this command is entered: timer: 300

OER uses the following default value if this command is not configured or if the no form of this command is entered: timer: 300 holddown holddown To configure the Optimized Edge Routing (OER) prefix route dampening timer to set the minimum period of time that a new exit must be used before an alternate exit can be selected, use

More information

Default Application Policies

Default Application Policies APPENDIXA The WAAS software includes more than 150 default application policies that help your WAAS system classify and optimize some of the most common traffic on your network. lists the default applications

More information

Different Layers Lecture 21

Different Layers Lecture 21 Different Layers Lecture 21 10/17/2003 Jian Ren 1 The Transport Layer 10/17/2003 Jian Ren 2 Transport Services and Protocols Provide logical communication between app processes running on different hosts

More information

Global Information Assurance Certification Paper

Global Information Assurance Certification Paper Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without

More information

List of Applications and Protocols

List of Applications and Protocols List of Applications and Protocols On the next pages, you will find a detailed description of all XenaAppMix protocols and applications. For more information about XenaAppMix please visit our webpage.

More information

Service TCP UDP Notes SSH 22 Secure Shell * HTTP 80 HyperText Transfer Protocol * (e.g. for web browsing). Currently ( ) HTTP/1.

Service TCP UDP Notes SSH 22 Secure Shell * HTTP 80 HyperText Transfer Protocol * (e.g. for web browsing). Currently ( ) HTTP/1. Service TCP UDP Notes SSH 22 Secure Shell * HTTP 80 HyperText Transfer Protocol * (e.g. for web browsing). Currently (2003-07-05) HTTP/1.1 is officially described in RFC 2616. HOSTS2 Name Server 81 81

More information

Network+ Week 5: Introduction to TCP/IP

Network+ Week 5: Introduction to TCP/IP Network+ Week 5: Introduction to TCP/IP IP Terminology Bit A bit is one digit, either a 1 or a 0. Byte A byte is 7 or 8 bits, depending on whether parity is used. Assume 8. Also called an Octet. Network

More information

HP ArcSight Port and Protocol Information

HP ArcSight Port and Protocol Information Important Notice HP ArcSight Port and Protocol Information The information (data) contained on all sheets of this document constitutes confidential information of Hewlett- Packard Company or its affiliates

More information

PROGRAMMING Kyriacou E. Frederick University Cyprus. Network communication examples

PROGRAMMING Kyriacou E. Frederick University Cyprus. Network communication examples ACSC424 NETWORK APPLICATION PROGRAMMING Kyriacou E. Frederick University Cyprus communication examples The OSI reference model (proposed by ISO) Application A Application B 2 Application Application Presentation

More information

List of Applications and Protocols

List of Applications and Protocols List of Applications and Protocols Table of Contents OVERVIEW 2 PROTOCOLS 3 APPLICATIONS 10 For more information about XenaAppMix please visit our webpage. 1 Overview Protocols: (Click on protocol name

More information

ACL Rule Configuration on the WAP371

ACL Rule Configuration on the WAP371 Article ID: 5089 ACL Rule Configuration on the WAP371 Objective A network access control list (ACL) is an optional layer of security that acts as a firewall for controlling traffic in and out of a subnet.

More information

Integrate Cisco VPN Concentrator

Integrate Cisco VPN Concentrator Integrate Cisco VPN Concentrator EventTracker v7.x Publication Date: July 24, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides instructions to

More information

Routers use access lists to control incoming or outgoing traffic. You should know the following characteristics of an access list.

Routers use access lists to control incoming or outgoing traffic. You should know the following characteristics of an access list. 8.1. Access List Routers use access lists to control incoming or outgoing traffic. You should know the following characteristics of an access list. Access lists describe the traffic type that will be controlled.

More information

Firewall Simulation COMP620

Firewall Simulation COMP620 Firewall Simulation COMP620 Firewall Simulation The simulation allows participants to configure their own simulated firewalls using Cisco-like syntax. Participants can take benign or malicious actions

More information

access link basic service set (BSS) broadband cable ad hoc wireless network Address Resolution Protocol (ARP) broadcast broadcast domain

access link basic service set (BSS) broadband cable ad hoc wireless network Address Resolution Protocol (ARP) broadcast broadcast domain G l o s s a r y A access link A port on a switch that is used to link to an individual device. Most ports on switches are access links. ad hoc wireless network Offers equal sharing between devices without

More information

NBAR2 Standard Protocol Pack 1.0

NBAR2 Standard Protocol Pack 1.0 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 951341706 USA http://www.cisco.com Tel: 408 5264000 800 553NETS (6387) Fax: 408 5270883 2013 Cisco Systems, Inc. All rights

More information

MTA_98-366_Vindicator930

MTA_98-366_Vindicator930 MTA_98-366_Vindicator930 Number: 98-366 Passing Score: 700 Time Limit: 45 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Technology Associate Networking Fundamentals MTA 98-366 Exam A QUESTION

More information

Extended ACL Configuration Mode Commands

Extended ACL Configuration Mode Commands Extended ACL Configuration Mode Commands To create and modify extended access lists on a WAAS device for controlling access to interfaces or applications, use the ip access-list extended global configuration

More information

ZENworks for Desktops Preboot Services

ZENworks for Desktops Preboot Services 3.2 Novell ZENworks for Desktops Preboot Services DEPLOYMENT www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

File Services. File Services at a Glance

File Services. File Services at a Glance File Services High-performance workgroup and Internet file sharing for Mac, Windows, and Linux clients. Features Native file services for Mac, Windows, and Linux clients Comprehensive file services using

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

General Important Protocols for Examination of IA Examination 2018

General Important Protocols for Examination of IA Examination 2018 Protocol General Important Protocols for Examination of IA Examination 2018 DNS - Domain Name System - translates network address (such as IP addresses) into terms understood by humans (such as Domain

More information

A Division of Cisco Systems, Inc. Broadband Router. with 2 Phone Ports. User Guide WIRED RT41P2-AT. Model No.

A Division of Cisco Systems, Inc. Broadband Router. with 2 Phone Ports. User Guide WIRED RT41P2-AT. Model No. A Division of Cisco Systems, Inc. WIRED Broadband Router with 2 Phone Ports User Guide Model No. RT41P2-AT Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered

More information

Cisco Unified Communications Manager TCP and UDP Port

Cisco Unified Communications Manager TCP and UDP Port Cisco TCP and UDP Port Usage This chapter provides a list of the TCP and UDP ports that Cisco uses for intracluster connections and for communication with external applications or devices. You will also

More information

You will save an Auto Server Setup file and use it in the next exercise.

You will save an Auto Server Setup file and use it in the next exercise. Initial Mac OS X Server Configuration 51 30 You are now at the Review pane. Do not click the Set Up button. Instead, leave your Mac OS X Server at this Review pane. You will save an Auto Server Setup file

More information

CCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 3 Application Layer Functionality and Protocols Application Layer Functionality and Protocols Applications: The Interface Between the Networks Horny/Coufal

More information

Vigor2900 Series Broadband Security Router Highly integrated broadband security router, combining high-speed routing technology with a comprehensive

Vigor2900 Series Broadband Security Router Highly integrated broadband security router, combining high-speed routing technology with a comprehensive Vigor2900 Series Broadband Security Router Highly integrated broadband security router, combining high-speed routing technology with a comprehensive security suite of firewall, VPN, URL content filtering

More information

Cisco Unified Communications Manager TCP and UDP Port

Cisco Unified Communications Manager TCP and UDP Port Cisco TCP and UDP Port Usage This chapter provides a list of the TCP and UDP ports that Cisco uses for intracluster connections and for communication with external applications or devices. You will also

More information

NAT and Firewall ALG Support on Cisco ASR 1000 Series Aggregation Services Routers

NAT and Firewall ALG Support on Cisco ASR 1000 Series Aggregation Services Routers NAT and Firewall ALG Support on Cisco ASR 1000 Series Aggregation Services Routers First Published: February 06, 2009 Last Updated: October 10, 2017 The following tables summarize Network Address Translation

More information

Gigabit SSL VPN Security Router

Gigabit SSL VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the

More information

Mac OS X Server QuickTime Streaming and Broadcasting Administration For Version 10.5 Leopard

Mac OS X Server QuickTime Streaming and Broadcasting Administration For Version 10.5 Leopard Mac OS X Server QuickTime Streaming and Broadcasting Administration For Version 10.5 Leopard K Apple Inc. 2007 Apple Inc. All rights reserved. The owner or authorized user of a valid copy of QuickTime

More information

Appendix B Policies and Filters

Appendix B Policies and Filters Appendix B Policies and Filters NOTE: This appendix does not describe Access Control Lists (ACLs) or IPX SAP ACLs, which are additional methods for filtering packets. See Software-Based IP Access Control

More information

Guide to TCP/IP, Third. Chapter 6: Basic TCP/IP Services

Guide to TCP/IP, Third. Chapter 6: Basic TCP/IP Services Guide to TCP/IP, Third Edition Chapter 6: Basic TCP/IP Services Objectives Understand how TCP/IP Application layer protocols and services work Explain the capabilities, message types, and request/reply

More information

5.4 Release README January 2005

5.4 Release README January 2005 5.4 Release README January 2005 Known Issues with this Release In rare situations, the NSE may fail to send LCP Echo-Requests to the PPPoE server, even though configured to do so. When this occurs, a physical

More information

Question No: 1 HOTSPOT In the screenshot, click the Icon of the preference pane where you turn on the OS X personal firewall.

Question No: 1 HOTSPOT In the screenshot, click the Icon of the preference pane where you turn on the OS X personal firewall. Volume: 49 Questions Question No: 1 HOTSPOT In the screenshot, click the Icon of the preference pane where you turn on the OS X personal firewall. Question No: 2 What Windows Server technology provides

More information

Manually Open Ports Internet Connection Firewall Windows 7

Manually Open Ports Internet Connection Firewall Windows 7 Manually Open Ports Internet Connection Firewall Windows 7 and equivalent editions of later Windows OS such as Windows 7, Windows 8, By default, Remote Desktop is using port 3389 TCP (UDP to stream audio

More information

NBAR Protocol Pack. Finding Feature Information. Prerequisites for the NBAR Protocol Pack

NBAR Protocol Pack. Finding Feature Information. Prerequisites for the NBAR Protocol Pack The NBAR protocol pack provides an easy way to update protocols supported by NBAR without replacing the base IOS image that is already present in the device. A protocol pack is a set of protocols developed

More information

4. The transport layer

4. The transport layer 4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application

More information

Application Layer: OSI and TCP/IP Models

Application Layer: OSI and TCP/IP Models Application Layer Application Layer: OSI and TCP/IP Models The communication process between two communicating nodes is actually a communication process between two applications on these devices. Service

More information

Technical Brief. Network Port & Routing Requirements Active Circle 4.5 May Page 1 sur 15

Technical Brief. Network Port & Routing Requirements Active Circle 4.5 May Page 1 sur 15 Technical Brief Network Port & Routing Requirements Active Circle 4.5 May 2017 Page 1 sur 15 INDEX 1. INTRODUCTION... 3 1.1. SCOPE OF THE DOCUMENT... 3 1.2. AUDIENCE... 3 1.3. ORGANIZATION OF THE INFORMATION...

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!  We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 1T6-323 Title : Microsoft Windows 2000 Network Analysis and Troubleshooting

More information

Barracuda Firewall Release Notes 6.6.X

Barracuda Firewall Release Notes 6.6.X Please Read Before Upgrading Before installing the new firmware version, back up your configuration and read all of the release notes that apply to the versions that are more current than the version that

More information

Protocol & Port Information for the deployment of. and. within IP Networks

Protocol & Port Information for the deployment of. and. within IP Networks Protocol & Port Information for the deployment of and within IP Networks SpliceCom Ltd The Hall Business Centre Berry Lane Chorleywood Herts WD3 5EX Phone: 01923-287700 Fax: 01923-287722 E-mail: info@splicecom.com

More information

TCP/IP Protocol Suite and IP Addressing

TCP/IP Protocol Suite and IP Addressing TCP/IP Protocol Suite and IP Addressing CCNA 1 v3 Module 9 10/11/2005 NESCOT CATC 1 Introduction to TCP/IP U.S. DoD created the TCP/IP model. Provides reliable data transmission to any destination under

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Contents Administrator's Guide... 7 Using Web Config Network Configuration Software... 8 About Web Config... 8 Accessing Web Config... 8 Changing the Administrator Password in Web

More information

Internet Applications. Dr Steve Gordon ICT, SIIT

Internet Applications. Dr Steve Gordon ICT, SIIT Internet Applications Dr Steve Gordon ICT, SIIT Contents Network Application Models Transport Layer Interface Selected Applications and Services Naming Resources Web Access Email Network Management Other

More information

COPYRIGHTED MATERIAL. Con t e n t s. Chapter 1 Introduction to Networking 1. Chapter 2 Overview of Networking Components 21.

COPYRIGHTED MATERIAL. Con t e n t s. Chapter 1 Introduction to Networking 1. Chapter 2 Overview of Networking Components 21. Con t e n t s Introduction xix Chapter 1 Introduction to Networking 1 Comparing Logical and Physical Networks.... 1 Networking Home Computers........................................... 2 Networking Small

More information

Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0

Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0 Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0 CCNET v6 10 Chapter 10 - Sections & Objectives 10.1 Application Layer Protocols Explain the operation of the application

More information

OER Commands. November Cisco IOS Optimized Edge Routing Command Reference OER-3

OER Commands. November Cisco IOS Optimized Edge Routing Command Reference OER-3 OER-3 active-probe active-probe To configure an Optimized Edge Routing (OER) active probe for a target prefix, use the active-probe command in OER master controller configuration mode. To disable the active

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Contents Administrator's Guide... 7 Using Web Config Network Configuration Software... 8 About Web Config... 8 Accessing Web Config... 8 Restricting Features Available for Users...

More information

Configuring Port to Application Mapping

Configuring Port to Application Mapping Configuring Port to Application Mapping Last Updated: January 19, 2012 This chapter describes the Cisco IOS Firewall Port to Application Mapping (PAM) feature. PAM enables CBAC-supported applications to

More information

Hands-On TCP/IP Networking

Hands-On TCP/IP Networking Hands-On Course Description In this Hands-On TCP/IP course, the student will work on a live TCP/IP network, reinforcing the discussed subject material. TCP/IP is the communications protocol suite on which

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Contents Administrator's Guide... 7 Using Web Config Network Configuration Software... 8 About Web Config... 8 Accessing Web Config... 8 Restricting Features Available for Users...

More information

SUPERSTACK 3 FIREWALL FIRMWARE VERSION RELEASE NOTES

SUPERSTACK 3 FIREWALL FIRMWARE VERSION RELEASE NOTES SUPERSTACK 3 FIREWALL FIRMWARE VERSION 6.0.2 RELEASE NOTES Please use these notes in conjunction with the following documents: SuperStack 3 Firewall User Guide Part number: DUA1611-0AAA02 SuperStack 3

More information

Adding Groups to Groups

Adding Groups to Groups 108 Authenticating and Authorizing Accounts 4 Select the Project X group, and drag it from the Groups drawer to the Other Groups list. Notice that as you drag the group, the pointer changes from an arrow

More information

MAC OS X 10 6 SERVER REPAIR MANUAL

MAC OS X 10 6 SERVER REPAIR MANUAL 31 December, 2017 MAC OS X 10 6 SERVER REPAIR MANUAL Document Filetype: PDF 464.81 KB 0 MAC OS X 10 6 SERVER REPAIR MANUAL Mono supports Mac OS X version 10.7 (Lion) and later. Erase and Install Method

More information

Solved MCQ of Computer networking. Set-1

Solved MCQ of Computer networking. Set-1 Solved MCQ of Computer networking Set-1 1. The computer network is A) Network computer with cable B) Network computer without cable C) Both of the above D) None of the above 2. FDDI used which type of

More information

Table A-1 defines the acronyms and abbreviations that are used in this publication.

Table A-1 defines the acronyms and abbreviations that are used in this publication. APPENDIXA defines the acronyms and abbreviations that are used in this publication. AAA ACL ACPI API ARP AS AUP BA BGP BIOS CAR CD CDNFS CDS CDSM CIFS CLF CLI CLNS CMS CoS CSNP CSS CTE DC List of authentication,

More information

I N D E X. Numerics. 3DES (triple Data Encryption Standard), 199

I N D E X. Numerics. 3DES (triple Data Encryption Standard), 199 I N D E X Numerics A 3DES (triple Data Encryption Standard), 199 AAA (Authentication, Authorization, and Accounting), 111 114, 236 configuring, 114, 144 145 CSACS, 116 122 floodguard, 168 169 servers,

More information

IP Communications Required by Cisco Unity Connection

IP Communications Required by Cisco Unity Connection IP Communications Required by Cisco Unity IP Communications Required by Cisco Unity, page 1 IP Communications Required by Cisco Unity Ports Table 1: TCP and UDP Ports Used for Inbound s to Cisco Unity

More information

Ethernet / TCP-IP - Training Suite Application level protocols

Ethernet / TCP-IP - Training Suite Application level protocols Ethernet / TCP-IP - Training Suite 05 - Application level protocols Application layer protocols 2 World Wide Web HTTP I want HTTP this resource. Hypertext Transfer Protocol (HTTP) Used by the World Wide

More information

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2 Chapter 2 Communicating Over The Network CCNA1-1 Chapter 2 Communicating Over the Network The Platform for Communications CCNA1-2 Chapter 2 Elements of Communication People communicate in many different

More information

Software User Manual. Omnitech Innovation, Inc.

Software User Manual. Omnitech Innovation, Inc. Software User Manual Omnitech Innovation, Inc. MCS7 2 Bay My Cloud Storage Private Cloud Server Index: 1. Method of Search IP address... 2 2. Disk Setup Utility... 4 3. Explanation of Disk Raid Modes...

More information

Cisco ISE Ports Reference

Cisco ISE Ports Reference Cisco ISE Infrastructure, page 1 Cisco ISE Administration Node Ports, page 2 Cisco ISE Monitoring Node Ports, page 3 Cisco ISE Policy Service Node Ports, page 4 Cisco ISE pxgrid Service Ports, page 8 OCSP

More information

Aqua Connect Terminal Server 3.5 Advanced User Manual

Aqua Connect Terminal Server 3.5 Advanced User Manual Advanced User Manual Table of Contents Chapter 1: Getting Ready for Aqua Connect Terminal Server... 3 Preparing our Mac OS X Server...3 Preparing our Network and Internet Connection...5 Chapter 2: Deciding

More information

IPSec. Dr.Talal Alkharobi. IPsec (IP security)

IPSec. Dr.Talal Alkharobi. IPsec (IP security) IPSec IPsec (IP security) 2 A suite of protocols for securing Internet Protocol (IP) communications by authenticating and/or encrypting each IP packet in a data stream. IPsec also includes protocols for

More information

Protocol Filters APPENDIX

Protocol Filters APPENDIX APPENDIX B The tables in this appendix list some of the protocols that you can filter on the access point. The tables include: Table A-1, Ethertype s Table A-2, IP s Table A-3, IP Port s In each table,

More information

KillTest. 半年免费更新服务

KillTest.   半年免费更新服务 KillTest 质量更高 服务更好 学习资料 http://www.killtest.cn 半年免费更新服务 Exam : 9L0-506 Title : Apple Certified Technical Coordinator Version : Demo 1 / 4 1.How did you prepare for this exam? A. none of the above B. Apple

More information

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12 TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group

More information

Key Features DATA SHEETS. Application centric analysis software delivering answers for application performance problems.

Key Features DATA SHEETS. Application centric analysis software delivering answers for application performance problems. DATA SHEETS Unpublished ClearSight Analyzer The award winning ClearSight Analyzer (CSA) offers advanced application centric monitoring and performance analysis, enabling enterprise Network Administrators

More information

13. Internet Applications 최양희서울대학교컴퓨터공학부

13. Internet Applications 최양희서울대학교컴퓨터공학부 13. Internet Applications 최양희서울대학교컴퓨터공학부 Internet Applications Telnet File Transfer (FTP) E-mail (SMTP) Web (HTTP) Internet Telephony (SIP/SDP) Presence Multimedia (Audio/Video Broadcasting, AoD/VoD) Network

More information

Release Notes for DrayTek Vigor 2955 (UK/Ireland)

Release Notes for DrayTek Vigor 2955 (UK/Ireland) Release Notes for DrayTek Vigor 2955 (UK/Ireland) Firmware Version Release Type Build Date 22nd December 2016 Release Date 17th January 2017 Revision 61450 Applicable Models Vigor 2955 UK & Ireland Only

More information

Transport Layer (TCP/UDP)

Transport Layer (TCP/UDP) Transport Layer (TCP/UDP) Where we are in the Course Moving on up to the Transport Layer! Application Transport Network Link Physical CSE 461 University of Washington 2 Recall Transport layer provides

More information

IC Port Maps and Data Flow Diagrams

IC Port Maps and Data Flow Diagrams IC Port Maps and Data Flow Diagrams Technical Reference Interactive Intelligence Customer Center (CIC ) Version 4.0 Last updated April 2, 2014 Abstract The port map and data flow diagrams illustrate the

More information

Scanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE

Scanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE UNIT III STUDY GUIDE Course Learning Outcomes for Unit III Upon completion of this unit, students should be able to: 1. Recall the terms port scanning, network scanning, and vulnerability scanning. 2.

More information

Configuring and Managing the IP Camera

Configuring and Managing the IP Camera CHAPTER 3 The Cisco Video Surveillance IP Camera provides configuration windows that you use to configure and manage the IP camera. This chapter explains how to access the configuration windows, describes

More information

The Halcyon Guide to IBM Services Monitoring Templates

The Halcyon Guide to IBM Services Monitoring Templates The Halcyon Guide to IBM Services Monitoring Templates Contents Foreword... 8 About Ash Giddings... 9 Overview... 10 Actions... 10 Installation of Customized Environment... 10 TCP/IP Rules... 12 SERVICES

More information

Cisco ISE Ports Reference

Cisco ISE Ports Reference Cisco ISE Infrastructure Cisco ISE Infrastructure, on page 1 Cisco ISE Administration Node Ports, on page 2 Cisco ISE Monitoring Node Ports, on page 4 Cisco ISE Policy Service Node Ports, on page 5 Inline

More information