Solved

Ports

Posted on 2013-05-23
3
304 Views
Last Modified: 2013-06-07
Can someone describe these ports and if they are secure?

2002
4002
6002
0
Comment
Question by:Jack_son_
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 29

Assisted Solution

by:Jan Springer
Jan Springer earned 166 total points
ID: 39191456
It's not the port that is secure/insecure -- it's the app.

What are the apps?
0
 
LVL 83

Assisted Solution

by:Dave Baldwin
Dave Baldwin earned 167 total points
ID: 39191495
'secure' normally means that the communication channel is encrypted.  Web browsers use SSL/TLS in 'https' on port 443 but other ports can be used.  SSH is a different encryption method most commonly used on port 22.  As @_jesper_ said, the applications on both ends have to support the methods for them to work.
0
 
LVL 10

Accepted Solution

by:
tmoore1962 earned 167 total points
ID: 39191596
Ports:
2002 TCP  Secure Access Control Server (ACS) for Windows[citation needed
4002 not specified
6002 not specified

Here is a list of registered ports and their usage:
http://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Suggested Courses

624 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question