Page 251 / 268 Scroll up to view Page 246 - 250
NBG4604 User’s Guide
251
A
PPENDIX
E
Services
The following table lists some commonly-used services and their associated
protocols and port numbers.
Name
: This is a short, descriptive name for the service. You can use this one or
create a different one, if you like.
Protocol
: This is the type of IP protocol used by the service. If this is
TCP/
UDP
, then the service uses the same port number with TCP and UDP. If this is
User-Defined
, the
Port(s
) is the IP protocol number, not the port number.
Port(s)
: This value depends on the
Protocol
.
• If the
Protocol
is
TCP
,
UDP
, or
TCP/UDP
, this is the IP port number.
• If the
Protocol
is
USER
, this is the IP protocol number.
Description
: This is a brief explanation of the applications that use this service
or the situations in which this service is used.
Table 89
Examples of Services
NAME
PROTOCOL
PORT(S)
DESCRIPTION
AH
(IPSEC_TUNNEL)
User-Defined
51
The IPSEC AH (Authentication Header)
tunneling protocol uses this service.
AIM
TCP
5190
AOL’s Internet Messenger service.
AUTH
TCP
113
Authentication protocol used by some
servers.
BGP
TCP
179
Border Gateway Protocol.
BOOTP_CLIENT
UDP
68
DHCP Client.
BOOTP_SERVER
UDP
67
DHCP Server.
CU-SEEME
TCP/UDP
TCP/UDP
7648
24032
A popular videoconferencing solution
from White Pines Software.
DNS
TCP/UDP
53
Domain Name Server, a service that
matches web names (e.g.
www.zyxel.com
) to IP numbers.
ESP
(IPSEC_TUNNEL)
User-Defined
50
The IPSEC ESP (Encapsulation
Security Protocol) tunneling protocol
uses this service.
FINGER
TCP
79
Finger is a UNIX or Internet related
command that can be used to find out
if a user is logged on.
Page 252 / 268
Appendix E Services
NBG4604 User’s Guide
252
FTP
TCP
TCP
20
21
File Transfer Program, a program to
enable fast transfer of files, including
large files that may not be possible by
e-mail.
H.323
TCP
1720
NetMeeting uses this protocol.
HTTP
TCP
80
Hyper Text Transfer Protocol - a client/
server protocol for the world wide
web.
HTTPS
TCP
443
HTTPS is a secured http session often
used in e-commerce.
ICMP
User-Defined
1
Internet Control Message Protocol is
often used for diagnostic purposes.
ICQ
UDP
4000
This is a popular Internet chat
program.
IGMP
(MULTICAST)
User-Defined
2
Internet Group Multicast Protocol is
used when sending packets to a
specific group of hosts.
IKE
UDP
500
The Internet Key Exchange algorithm
is used for key distribution and
management.
IMAP4
TCP
143
The Internet Message Access Protocol
is used for e-mail.
IMAP4S
TCP
993
This is a more secure version of IMAP4
that runs over SSL.
IRC
TCP/UDP
6667
This is another popular Internet chat
program.
MSN Messenger
TCP
1863
Microsoft Networks’ messenger
service uses this protocol.
NetBIOS
TCP/UDP
TCP/UDP
TCP/UDP
TCP/UDP
137
138
139
445
The Network Basic Input/Output
System is used for communication
between computers in a LAN.
NEW-ICQ
TCP
5190
An Internet chat program.
NEWS
TCP
144
A protocol for news groups.
NFS
UDP
2049
Network File System - NFS is a client/
server distributed file service that
provides transparent file sharing for
network environments.
NNTP
TCP
119
Network News Transport Protocol is
the delivery mechanism for the
USENET newsgroup service.
PING
User-Defined
1
Packet INternet Groper is a protocol
that sends out ICMP echo requests to
test whether or not a remote host is
reachable.
Table 89
Examples of Services (continued)
NAME
PROTOCOL
PORT(S)
DESCRIPTION
Page 253 / 268
Appendix E Services
NBG4604 User’s Guide
253
POP3
TCP
110
Post Office Protocol version 3 lets a
client computer get e-mail from a
POP3 server through a temporary
connection (TCP/IP or other).
POP3S
TCP
995
This is a more secure version of POP3
that runs over SSL.
PPTP
TCP
1723
Point-to-Point Tunneling Protocol
enables secure transfer of data over
public networks. This is the control
channel.
PPTP_TUNNEL
(GRE)
User-Defined
47
PPTP (Point-to-Point Tunneling
Protocol) enables secure transfer of
data over public networks. This is the
data channel.
RCMD
TCP
512
Remote Command Service.
REAL_AUDIO
TCP
7070
A streaming audio service that
enables real time sound over the web.
REXEC
TCP
514
Remote Execution Daemon.
RLOGIN
TCP
513
Remote Login.
ROADRUNNER
TCP/UDP
1026
This is an ISP that provides services
mainly for cable modems.
RTELNET
TCP
107
Remote Telnet.
RTSP
TCP/UDP
554
The Real Time Streaming (media
control) Protocol (RTSP) is a remote
control for multimedia on the
Internet.
SFTP
TCP
115
The Simple File Transfer Protocol is an
old way of transferring files between
computers.
SMTP
TCP
25
Simple Mail Transfer Protocol is the
message-exchange standard for the
Internet. SMTP enables you to move
messages from one e-mail server to
another.
SMTPS
TCP
465
This is a more secure version of SMTP
that runs over SSL.
SNMP
TCP/UDP
161
Simple Network Management
Program.
SNMP-TRAPS
TCP/UDP
162
Traps for use with the SNMP
(RFC:1215).
SQL-NET
TCP
1521
Structured Query Language is an
interface to access data on many
different types of database systems,
including mainframes, midrange
systems, UNIX systems and network
servers.
Table 89
Examples of Services (continued)
NAME
PROTOCOL
PORT(S)
DESCRIPTION
Page 254 / 268
Appendix E Services
NBG4604 User’s Guide
254
SSDP
UDP
1900
The Simple Service Discovery Protocol
supports Universal Plug-and-Play
(UPnP).
SSH
TCP/UDP
22
Secure Shell Remote Login Program.
STRM WORKS
UDP
1558
Stream Works Protocol.
SYSLOG
UDP
514
Syslog allows you to send system logs
to a UNIX server.
TACACS
UDP
49
Login Host Protocol used for (Terminal
Access Controller Access Control
System).
TELNET
TCP
23
Telnet is the login and terminal
emulation protocol common on the
Internet and in UNIX environments. It
operates over TCP/IP networks. Its
primary function is to allow users to
log into remote host systems.
TFTP
UDP
69
Trivial File Transfer Protocol is an
Internet file transfer protocol similar
to FTP, but uses the UDP (User
Datagram Protocol) rather than TCP
(Transmission Control Protocol).
VDOLIVE
TCP
UDP
7000
user-
defined
A videoconferencing solution. The UDP
port number is specified in the
application.
Table 89
Examples of Services (continued)
NAME
PROTOCOL
PORT(S)
DESCRIPTION
Page 255 / 268
NBG4604 User’s GuideNBG4604 User’s Guide
255
A
PPENDIX
F
Legal Information
Copyright
Copyright © 2012 by ZyXEL Communications Corporation.
The contents of this publication may not be reproduced in any part or as a whole,
transcribed, stored in a retrieval system, translated into any language, or transmitted in
any form or by any means, electronic, mechanical, magnetic, optical, chemical,
photocopying, manual, or otherwise, without the prior written permission of ZyXEL
Communications Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or
software described herein. Neither does it convey any license under its patent rights nor the
patent rights of others. ZyXEL further reserves the right to make changes in any products
described herein without notice. This publication is subject to change without notice.
Certifications
Notices
Changes or modifications not expressly approved by the party responsible for compliance
could void the user's authority to operate the equipment.
This device has been designed for the WLAN 2.4 GHz network throughout the EC region and
Switzerland, with restrictions in France.
Ce produit est conçu pour les bandes de fréquences 2,4 GHz conformément à la législation
Européenne. En France métropolitaine, suivant les décisions n°03-908 et 03-909 de
l'ARCEP, la puissance d'émission ne devra pas dépasser 10 mW (10 dB) dans le cadre d'une
installation WiFi en extérieur pour les fréquences comprises entre 2454 MHz et 2483,5 MHz.
Viewing Certifications
Go to
to view this product’s documentation and certifications.
Federal Communications Commission (FCC) Interference Statement
The device complies with Part 15 of FCC rules. Operation is subject to the following two
conditions:
This device may not cause harmful interference.
This device must accept any interference received, including interference that may cause
undesired operations.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top