Common Ports Used by ECSs
Common Ports
When adding a security group rule, you must specify ports or port ranges for communications. When a security group detects an access request, it checks whether the IP address and the port of the device that sends the request are allowed by the security group rules. Communications cannot be established unless the security group rules allow the request.
Protocol |
Port |
Description |
---|---|---|
FTP |
21 |
Used by FTP services for uploading and downloading files. For configuration examples, see Remotely Connecting to an ECS from a Local Server to Upload or Download Files over FTP. |
SSH |
22 |
Used to remotely connect to Linux ECSs. For configuration examples, see Remotely Logging In to an ECS from a Local Server. For details about how to log in to a Linux ECS, see Linux ECS Login Overview. |
Telnet |
23 |
Used to remotely log in to ECSs. |
SMTP |
25 |
Used to send emails. For security purposes, TCP port 25 is disabled in the outbound direction by default. For details about how to open the port, see Why Is Outbound Access Through TCP Port 25 Restricted? |
HTTP |
80 |
Used to access websites over HTTP. For configuration examples, see Setting Up a Website on an ECS to Provide Internet-Accessible Services. |
POP3 |
110 |
Used to receive emails using Post Office Protocol version 3 (POP3). |
IMAP |
143 |
Used to receive emails using Internet Message Access Protocol (IMAP). |
HTTPS |
443 |
Used to access websites over HTTPS. For configuration examples, see Setting Up a Website on an ECS to Provide Internet-Accessible Services. |
SQL Server |
1433 |
A TCP port of the SQL Server for providing services. For configuration examples, see ECS Providing Database Access Service. |
SQL Server |
1434 |
A UDP port of the SQL Server for returning the TCP/IP port number used by the SQL Server. For configuration examples, see ECS Providing Database Access Service. |
Oracle |
1521 |
Used for Oracle database communications. This port must be enabled on the ECSs where Oracle SQL Server is deployed. For configuration examples, see ECS Providing Database Access Service. |
MySQL |
3306 |
Used by MySQL databases to provide services. For configuration examples, see ECS Providing Database Access Service. |
Windows Server Remote Desktop Services |
3389 |
Used to connect to Windows ECSs. For configuration examples, see Remotely Logging In to an ECS from a Local Server. For details about how to log in to a Windows ECS, see Windows ECS Login Overview. |
Proxy |
8080 |
Used by the WWW proxy service for web browsing, like port 80. If you use port 8080, you need to add :8080 after the IP address when you visit a website or use a proxy server. After Apache Tomcat is installed, the default service port is 8080. |
NetBIOS |
137, 138, and 139 |
NetBIOS is often used for Windows files, printer sharing, and Samba.
|
High-Risk Ports
When adding a security group rule, you must specify a port or port range for communications. Traffic is then allowed or denied if traffic matches this rule. Suppose a client requests to remotely log in to an ECS using SSH. When the request reaches the security group, the IP address and port of the client will be checked. If the IP address and the port match the allow rules in the security group, the request is allowed.
Table 2 lists some high-risk ports that are blocked by default. Even if you have added a security group rule to allow access over these ports, traffic over these ports in restricted regions is still denied. In this case, do not use these high-risk ports for your services.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot