This blog will give the solution and fix for Active Directory and Messaging administrators

Active Directory Ports for client communication

1.2 active directory
Active directory required port communication between forest to forest | domain to domain | clients to domain controllers. Below are the port details which we have to allow for successful communication.

In general, firewall separates the domain controllers communication, ports to be allowed in firewall.

All below listed ports are not required in all scenarios. For example, if the firewall separates members and DCs, you don't have to open the FRS or DFSR ports. Also, if you know that no clients use LDAP with SSL/TLS, you don't have to open ports 636 and 3269.

UDP Port 88 for Kerberos authentication
UDP and TCP Port 135 for domain controllers-to-domain controller and client to domain controller operations.
TCP Port 139 and UDP 138 for File Replication Service between domain controllers.
UDP Port 389 for LDAP to handle normal queries from client computers to the domain controllers.
TCP and UDP Port 445 for File Replication Service
TCP and UDP Port 464 for Kerberos Password Change
TCP Port 3268 and 3269 for Global Catalog from client to domain controller.
TCP and UDP Port 53 for DNS from client to domain controller and domain controller to domain controller.
udp 123 for time service
udp for netlogon and netbios
TCP 139
Client Port(s)
Server Port
Service
49152 -65535/UDP
123/UDP
W32Time
49152 -65535/TCP
135/TCP
RPC Endpoint Mapper
49152 -65535/TCP
464/TCP/UDP
Kerberos password change
49152 -65535/TCP
49152-65535/TCP
RPC for LSA, SAM, Netlogon (*)
49152 -65535/TCP/UDP
389/TCP/UDP
LDAP
49152 -65535/TCP
636/TCP
LDAP SSL
49152 -65535/TCP
3268/TCP
LDAP GC
49152 -65535/TCP
3269/TCP
LDAP GC SSL
53, 49152 -65535/TCP/UDP
53/TCP/UDP
DNS
49152 -65535/TCP
49152 -65535/TCP
FRS RPC (*)
49152 -65535/TCP/UDP
88/TCP/UDP
Kerberos
49152 -65535/TCP/UDP
445/TCP
SMB (**)
49152 -65535/TCP
49152-65535/TCP
DFSR RPC (*)

Protocol

TCP
UDP
ICMP
RDP
Remote Desktop
3389


DNS
DNS Download
53



DNS Queries

53

WINS Replication
WINS
42



WINS

42

ICMP
echo-request


8

info-request


15

mast request


17

timestamp


13
NetBIOS Services
Name Resolution Service 
137
137


Datagram  Services (Browsing)

138


Session Service (net use)
139


SMB
Input
445



Output

445

Remote Storm

1025


NTP
NTP
123



NTP

123

Content Replication
Content_Repl
507


Kerberos
Kerberos-Secure

750


Kerberos_v5
88 + 464



Kerberos_v5

88 + 464

LDAP
LDAP
389



LDAP

389


LDAP over SSL/TLS
636
636


Global Catalog
3268



Global Catalog over SSL/TSL
3269


Replication
Active Directory
RPCSS Dynamic



FRS
RPCSS Dynamic


Microsoft CIFS
Microsoft-CIFS (DS) 
445



Microsoft-CIFS (DS)

445

RPC – Cert Services (+)
RPC
135


SNMP
SNMP Agent

161


SNMP Trap
162


ASP.Net State Service

42424


Link State Algorithm Routing

691


TCP – High Ports  (Cert Services)
> 1023
1024 - 65535



Reference: https://support.microsoft.com/en-us/help/179442/how-to-configure-a-firewall-for-domains-and-trusts
Share:

Related Posts:

No comments:

Post a Comment

Search This Blog

Recent Posts