Showing posts with label DNS. Show all posts
Showing posts with label DNS. Show all posts

Friday, March 15, 2013

Ports for Commonly Used Windows Services

Service Name

UDP

TCP

Browsing datagram responses of NetBIOS over TCP/IP

138

Browsing requests of NetBIOS over TCP/IP

137

Client/Server Communication

135

Common Internet File System (CIFS)

445

139, 445

Content Replication Service

560

Cybercash Administration

8001

Cybercash Coin Gateway

8002

Cybercash Credit Gateway

8000

DCOM (SCM uses udp/tcp to dynamically assign ports for DCOM)

135

135

DHCP client

67

DHCP server

68

DHCP Manager

135

DNS Administration

139

DNS client to server lookup (varies)

53

53

Exchange Server 5.0

   Client Server Communication

   135

   Exchange Administrator

   135

   IMAP

   143

   IMAP (SSL)

   993

   LDAP

   389

   LDAP (SSL)

   636

   MTA - X.400 over TCP/IP

   102

   POP3

   110

   POP3 (SSL)

   995

   RPC

   135

   SMTP

   25

   NNTP

   119

   NNTP (SSL)

   563

File shares name lookup

137

File shares session

139

FTP

21

FTP-data

20

HTTP

80

HTTP-Secure Sockets Layer (SSL)

443

Internet Information Services (IIS)

80

IMAP

143

IMAP (SSL)

993

IKE (For more information, see Table C.4)

500

IPSec Authentication Header (AH) (For more information, see Table C.4)

IPSec Encapsulation Security Payload (ESP) (For more information, see Table C.4)

IRC

531

ISPMOD (SBS 2nd tier DNS registration wizard)

1234

Kerberos de-multiplexer

2053

Kerberos klogin

543

Kerberos kpasswd (v5)

464

464

Kerberos krb5

88

88

Kerberos kshell

544

L2TP

1701

LDAP

389

LDAP (SSL)

636

Login Sequence

137, 138

139

Macintosh, File Services (AFP/IP)

548

Membership DPA

568

Membership MSN

569

Microsoft Chat client to server

6667

Microsoft Chat server to server

6665

Microsoft Message Queue Server

1801

1801

Microsoft Message Queue Server

3527

135, 2101

Microsoft Message Queue Server

2103, 2105

MTA - X.400 over TCP/IP

102

NetBT datagrams

138

NetBT name lookups

137

NetBT service sessions

139

NetLogon

138

NetMeeting Audio Call Control

1731

NetMeeting H.323 call setup

1720

NetMeeting H.323 streaming RTP over UDP

Dynamic

NetMeeting Internet Locator Server ILS

389

NetMeeting RTP audio stream

Dynamic

NetMeeting T.120

1503

NetMeeting User Location Service

522

NetMeeting user location service ULS

522

Network Load Balancing

2504

NNTP

119

NNTP (SSL)

563

Outlook (see for ports)

Pass Through Verification

137, 138

139

POP3

110

POP3 (SSL)

995

PPTP control

1723

PPTP data (see Table C.4)

Printer sharing name lookup

137

Printer sharing session

139

Radius accounting (Routing and Remote Access)

1646 or 1813

Radius authentication (Routing and Remote Access)

1645 or 1812

Remote Install TFTP

69

RPC client fixed port session queries

1500

RPC client using a fixed port session replication

2500

RPC session ports

Dynamic

RPC user manager, service manager, port mapper

135

SCM used by DCOM

135

135

SMTP

25

SNMP

161

SNMP Trap

162

SQL Named Pipes encryption over other protocols name lookup

137

SQL RPC encryption over other protocols name lookup

137

SQL session

139

SQL session

1433

SQL session

1024 - 5000

SQL session mapper

135

SQL TCP client name lookup

53

53

Telnet

23

Terminal Server

3389

UNIX Printing

515

WINS Manager

135

WINS NetBios over TCP/IP name service

137

WINS Proxy

137

WINS Registration

137

WINS Replication

42

X400

102

Saturday, December 29, 2012

Setup AutoDiscover DNS Record

 
By Joseph Piggee Sr.
Create the AutoDiscover DNS Record
  1. Open the DNS Manager.
  2. Expand Forward Lookup Zones then expand domain.com
  3. Now right-click domain.com then select New Host(A).
  4. Type autodiscover and the IP Address of theExchange 2010 server, then click Add.
  5. Click OK to close the dialog box then click Done.
  6. Close the DNS Manager. 


Tuesday, June 19, 2012

Disable IPv6

 

By Joseph Piggee Sr.

http://support.microsoft.com/kb/929852

IPv6 can be disabled either through the DisabledComponents registry value or through the check box for the Internet Protocol Version 6 (TCP/IPv6) component in the list of items on the Networking tab for the properties of connections in the Network Connections folder. The following figure shows an example.

The DisabledComponents registry key affects all interfaces on the host. However, the check box on the Networking tab affects only the specific interface. The DisabledComponents registry value does not affect the state of the check box. Therefore, even if the DisabledComponents registry key is set to disable IPv6, the check box in the Networking tab for each interface can still be checked. This is expected behavior.

Note Unchecking the checkbox on a network adapter will not disable IPv6 on the host. It will unbind IPv6 from this adapter. To disable IPv6 on the host, follow the steps below.

To use the DisabledComponents registry value to check whether IPv6 was disabled, run the following command at a Windows command prompt:
reg query HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip6\Parameters /v DisabledComponents

You may receive the following error message:
ERROR: The system was unable to find the specified registry key or value.
If you receive this error message, the DisabledComponents registry value is not set. If the DisabledComponents value is set, it overrides the settings in the connection properties.

To enable or to disable IPv6 or to selectively enable or disable components of IPv6 automatically, click the Fix this problem link. Then, click Run in the File Download dialog box, and follow the steps in this wizard.