For a service to listen in a particular port in a server, that port should be available in open list of ports or that port will be open only when a service is started?

Posted on 2014-10-09
Medium Priority
Last Modified: 2014-10-09
I am not sure how silly this to you guys but for me, its a really need to know question.

For a service to listen in a particular port in a server, that port should be available in open list of ports or that port will be open only when a service is started?

Let's say the service is configured to listen on port 6061,when we run netsat -a should that be available in open ports for the service be able to LISTEN to that port or the port will start to LISTEN only when the serive is started?

E.g.: Let's say that

telnet localhost 6061 is failing (or) telnet server.hostname.com 6061 is failing

does that mean that port is blocked/not allowed in the firewall or does it mean that the service configured for that particular port should be started for telnet to work?

Hope it makes sense?

Thanks for your time guys!
Question by:VirastaR
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
LVL 56

Accepted Solution

McKnife earned 2000 total points
ID: 40370130
Only when the service has started, the pc will listen on that port.
LVL 84

Expert Comment

by:Dave Baldwin
ID: 40370145
@McKnife is right but the firewall could be blocking access.  The Windows firewall is 'permissive' and usually won't block outgoing connections.  Incoming connections usually have to be allowed thru the firewall either by allowing the port or the program to accept incoming connections.

Author Closing Comment

ID: 40370400
That's exactly it!  :)

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Suggested Courses
Course of the Month11 days, 14 hours left to enroll

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question