Solved

Ports

Posted on 2013-05-23
3
297 Views
Last Modified: 2013-06-07
Can someone describe these ports and if they are secure?

2002
4002
6002
0
Comment
Question by:Jack_son_
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 28

Assisted Solution

by:Jan Springer
Jan Springer earned 166 total points
ID: 39191456
It's not the port that is secure/insecure -- it's the app.

What are the apps?
0
 
LVL 83

Assisted Solution

by:Dave Baldwin
Dave Baldwin earned 167 total points
ID: 39191495
'secure' normally means that the communication channel is encrypted.  Web browsers use SSL/TLS in 'https' on port 443 but other ports can be used.  SSH is a different encryption method most commonly used on port 22.  As @_jesper_ said, the applications on both ends have to support the methods for them to work.
0
 
LVL 10

Accepted Solution

by:
tmoore1962 earned 167 total points
ID: 39191596
Ports:
2002 TCP  Secure Access Control Server (ACS) for Windows[citation needed
4002 not specified
6002 not specified

Here is a list of registered ports and their usage:
http://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question