Skip to main content

Active Directory ports

Communication from clients to Active Directory domain controllers (AD DCs) and between AD DCs can use a variety of TCP and UDP port numbers.

Note

Do not open all these ports in a production environment to determine which one of them is required, other than for testing purpose. Open only the required ports, and if possible only for the binaries of the services required.

The Active Directory connector (agtaddn) uses published Microsoft ADSI and related APIs. According to Microsoft documentation, these APIs may use any of the following port numbers:

Protocol

TCP #

UDP #

DNS

53

53

Kerberos

88

88

NetBIOS

137-139

137-139

LDAP or LDAPS

389 or 636

389

SMB

445

Kerberos password change

464

464

RPC

1025-5000 and/or 49152-65535

Additional services available on AD DCs, which the APIs leveraged by the Bravura Security Fabric connector likely do connect to, include:

Protocol

TCP #

UDP #

Mail

25

Replication

135

File replication

5722

AD web services

9389

Replication 3268-9

DHCP

672,535

GPO

Any port

There is nothing preventing Microsoft from modifying API or protocol behaviour, such that some of the above ports may start getting connections after a patch is applied to clients and servers. Moreover, Microsoft may introduce new services or further expand the port numbers used by the RPC services mentioned above. As a result, the best practice is to avoid firewall restrictions based on TCP or UDP port numbers between Bravura Security Fabric server and AD DCs.