FG自发的服务端口.doc_第1页
FG自发的服务端口.doc_第2页
FG自发的服务端口.doc_第3页
全文预览已结束

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

Fortigate自身发起的一些服务端口 以下是Fortigate自身发起的一些服务端口,当Fortigate放在其他设备后面时,要注意在上层设备为Fortigate开放这些端口。Traffic Types and TCP/UDP Ports used by Fortinet ProductsDescriptionThis article lists: The types of traffic that originate from FortiGate units and TCP and UDP ports used by each traffic type. FortiGuard Distribution Network (FDN) services and the TCP and UDP ports that FortiGate, FortiClient, and FortiManager use to connect to the FDN. The TCP and UDP ports on which FortiGate units can be listening for traffic (Listening ports) and accept connections.Components All FortiGate units FortiOS v3.0, v2.80, and v2.50 FortiClient FortiManager v3.0 FortiGuard Distribution Network (FDN)Ports for Originating TrafficNetwork traffic originating from FortiGate units (not passing through FortiGate units) is used for sending log messages to remote log servers, sending SNMP traps, resolving network names using DNS, and so on. ServicePortsSyslog. All FortiOS versions use syslog to send log messages to remote syslog servers. FortiOS v2.80 and v3.0 also use syslog to send log messages to FortiAnalyzer.UDP 514Alert email and quarantine auto submit (using encrypted SMTP email)TCP 25SNMP trapsUDP 162DNS lookupUDP 53NTP synchronizationUDP 123FDN Services and PortsFortiGate units communicate with the FortiGuard Distribution Network (FDN) using the following ports. The ports that FortiClient and FortiManager use to communicate with the FDN are also listed below.ServicePortsFortiOS v3.0 FortiGuard Antivirus updatesTCP 443FortiOS v2.80 FortiGuard Antivirus updatesTCP 443FortiOS v2.50 FortiGuard Antivirus updatesTCP 8890FortiClient FortiGuard Antivirus updatesTCP 80FortiOS v3.0 FortiGuard Web Filtering and AntispamUDP 53 (default) or UDP 8888FortiOS v3.0 FortiGuard Web FilteringUDP 1027 or UDP 1031FortiOS v2.80 FortiGuard Web FilteringUDP 8888FortiOS v2.80 FortiGuard Antispam (FortiShield)UDP 8889FortiManager v3.0 FortiGuard Web Filtering and AntispamTCP 443 and TCP 8890Listening PortsWhen operating with the Factory default configuration, FortiGate units do not accept TCP or UDP connections on any port. The one exception is the default internal interface, which accepts HTTPS connections on TCP port 443. The following table lists the TCP and UDP ports that FortiGate units listen on when you enable various configuration options.ServicePortsTelnet Administrative Access to the CLITCP 23SSH Administrative Access to the CLITCP 22HTTP Administrative Access to the Web-based managerTCP 80HTTPS Administrative Access to the Web-based managerTCP 443Default port to use for override authenticationTCP 443Authentication keepalive and logout. Beginning with FortiOS v3.0 MR2, by default the authentication keepalive and logout ports are closed. When you enable authentication keepalive using the auth-keepalive keyword of the config global CLI command, the FortiGate unit listens on the authentication keepalive and logout ports.TCP 1000 and 1003FortiGuard Distribution Network (FDN) Antivirus and IPS push updatesUDP 9443SS

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论