Solved

For a service to listen in a particular port in a server, that port should be available in open list of ports or that port will be open only when a service is started?

Posted on 2014-10-09
3
279 Views
Last Modified: 2014-10-09
I am not sure how silly this to you guys but for me, its a really need to know question.

For a service to listen in a particular port in a server, that port should be available in open list of ports or that port will be open only when a service is started?

Let's say the service is configured to listen on port 6061,when we run netsat -a should that be available in open ports for the service be able to LISTEN to that port or the port will start to LISTEN only when the serive is started?

E.g.: Let's say that

telnet localhost 6061 is failing (or) telnet server.hostname.com 6061 is failing

does that mean that port is blocked/not allowed in the firewall or does it mean that the service configured for that particular port should be started for telnet to work?

Hope it makes sense?

Thanks for your time guys!
0
Comment
Question by:VirastaR
3 Comments
 
LVL 54

Accepted Solution

by:
McKnife earned 500 total points
ID: 40370130
Only when the service has started, the pc will listen on that port.
0
 
LVL 83

Expert Comment

by:Dave Baldwin
ID: 40370145
@McKnife is right but the firewall could be blocking access.  The Windows firewall is 'permissive' and usually won't block outgoing connections.  Incoming connections usually have to be allowed thru the firewall either by allowing the port or the program to accept incoming connections.
0
 
LVL 9

Author Closing Comment

by:VirastaR
ID: 40370400
That's exactly it!  :)
0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

713 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question