Skip to main content

Windows server ports

Communication from clients to Windows NT systems and between various services can use a variety of TCP and UDP port numbers.

Caution

Do not open all these ports in a production environment to determine which one of them is required, other than for testing purposes. Open only the required ports, and if possible, only for the binaries of the services required. The Windows NT system uses various protocols and services.

These services may use any of the following port numbers:

Table 1. Windows NT ports

Protocol

TCP#

UDP#

HTTP

80,443,593

-

Named Pipes

445

-

RPC Endpoint Mapper

135

-

RPC Server Programs

1025-5000 nd/or 49152-65535

-

NetBIOS

137-139

137-139

LDAP or LDAPS

389 or 636

389

DNS 53

53

53

Kerberos

88

88



Additional services available on Windows NT systems, which may require specific ports, include:

Table 2. Windows NT additional service ports

Protocol

TCP#

UDP#

Kerberos password change

464

464

Mail

25

-

Replication

135

-

File replication

5722

-

AD web services

9389

-

Replication

3268-3269

-

DHCP

-

67,68

GPO

135, 137-139, 445

137-138



Best practice

Microsoft may modify the API or protocol behavior, such that some of the above ports may start getting connections after a patch is applied to clients and servers. Moreover, Microsoft may introduce new services or further expand the port numbers used by the RPC services mentioned above. As a result, the best practice is to avoid firewall restrictions based on TCP or UDP port numbers between Bravura Security Fabric server and Windows Server systems.

For more information, see Microsoft documentation: Service overview and network port requirements - Windows Server