Page 281 / 300 Scroll up to view Page 276 - 280
P-663HN-51 User’s Guide
281
A
PPENDIX
E
Common Services
The following table lists some commonly-used services and their associated
protocols and port numbers. For a comprehensive list of port numbers, ICMP type/
code numbers and services, visit the IANA (Internet Assigned Number Authority)
web site.
Name
: This is a short, descriptive name for the service. You can use this one or
create a different one, if you like.
Protocol
: This is the type of IP protocol used by the service. If this is
TCP/
UDP
, then the service uses the same port number with TCP and UDP. If this is
USER-DEFINED
, the
Port(s
) is the IP protocol number, not the port number.
Port(s)
: This value depends on the
Protocol
. Please refer to RFC 1700 for
further information about port numbers.
• If the
Protocol
is
TCP
,
UDP
, or
TCP/UDP
, this is the IP port number.
• If the
Protocol
is
USER
, this is the IP protocol number.
Description
: This is a brief explanation of the applications that use this service
or the situations in which this service is used.
Table 94
Commonly Used Services
NAME
PROTOCOL
PORT(S)
DESCRIPTION
AH
(IPSEC_TUNNEL)
User-Defined
51
The IPSEC AH (Authentication
Header) tunneling protocol uses this
service.
AIM/New-ICQ
TCP
5190
AOL’s Internet Messenger service. It
is also used as a listening port by
ICQ.
AUTH
TCP
113
Authentication protocol used by some
servers.
BGP
TCP
179
Border Gateway Protocol.
BOOTP_CLIENT
UDP
68
DHCP Client.
BOOTP_SERVER
UDP
67
DHCP Server.
CU-SEEME
TCP
UDP
7648
24032
A popular videoconferencing solution
from White Pines Software.
DNS
TCP/UDP
53
Domain Name Server, a service that
matches web names (for example
www.zyxel.com
) to IP numbers.
Page 282 / 300
Appendix E Common Services
P-663HN-51 User’s Guide
282
ESP
(IPSEC_TUNNEL)
User-Defined
50
The IPSEC ESP (Encapsulation
Security Protocol) tunneling protocol
uses this service.
FINGER
TCP
79
Finger is a UNIX or Internet related
command that can be used to find out
if a user is logged on.
FTP
TCP
TCP
20
21
File Transfer Program, a program to
enable fast transfer of files, including
large files that may not be possible by
e-mail.
H.323
TCP
1720
NetMeeting uses this protocol.
HTTP
TCP
80
Hyper Text Transfer Protocol - a
client/server protocol for the world
wide web.
HTTPS
TCP
443
HTTPS is a secured http session often
used in e-commerce.
ICMP
User-Defined
1
Internet Control Message Protocol is
often used for diagnostic or routing
purposes.
ICQ
UDP
4000
This is a popular Internet chat
program.
IGMP
(MULTICAST)
User-Defined
2
Internet Group Management Protocol
is used when sending packets to a
specific group of hosts.
IKE
UDP
500
The Internet Key Exchange algorithm
is used for key distribution and
management.
IRC
TCP/UDP
6667
This is another popular Internet chat
program.
MSN Messenger
TCP
1863
Microsoft Networks’ messenger
service uses this protocol.
NEW-ICQ
TCP
5190
An Internet chat program.
NEWS
TCP
144
A protocol for news groups.
NFS
UDP
2049
Network File System - NFS is a client/
server distributed file service that
provides transparent file sharing for
network environments.
NNTP
TCP
119
Network News Transport Protocol is
the delivery mechanism for the
USENET newsgroup service.
PING
User-Defined
1
Packet INternet Groper is a protocol
that sends out ICMP echo requests to
test whether or not a remote host is
reachable.
POP3
TCP
110
Post Office Protocol version 3 lets a
client computer get e-mail from a
POP3 server through a temporary
connection (TCP/IP or other).
Table 94
Commonly Used Services (continued)
NAME
PROTOCOL
PORT(S)
DESCRIPTION
Page 283 / 300
Appendix E Common Services
P-663HN-51 User’s Guide
283
PPTP
TCP
1723
Point-to-Point Tunneling Protocol
enables secure transfer of data over
public networks. This is the control
channel.
PPTP_TUNNEL
(GRE)
User-Defined
47
PPTP (Point-to-Point Tunneling
Protocol) enables secure transfer of
data over public networks. This is the
data channel.
RCMD
TCP
512
Remote Command Service.
REAL_AUDIO
TCP
7070
A streaming audio service that
enables real time sound over the
web.
REXEC
TCP
514
Remote Execution Daemon.
RLOGIN
TCP
513
Remote Login.
RTELNET
TCP
107
Remote Telnet.
RTSP
TCP/UDP
554
The Real Time Streaming (media
control) Protocol (RTSP) is a remote
control for multimedia on the
Internet.
SFTP
TCP
115
Simple File Transfer Protocol.
SMTP
TCP
25
Simple Mail Transfer Protocol is the
message-exchange standard for the
Internet. SMTP enables you to move
messages from one e-mail server to
another.
SNMP
TCP/UDP
161
Simple Network Management
Program.
SNMP-TRAPS
TCP/UDP
162
Traps for use with the SNMP
(RFC:1215).
SQL-NET
TCP
1521
Structured Query Language is an
interface to access data on many
different types of database systems,
including mainframes, midrange
systems, UNIX systems and network
servers.
SSH
TCP/UDP
22
Secure Shell Remote Login Program.
STRM WORKS
UDP
1558
Stream Works Protocol.
SYSLOG
UDP
514
Syslog allows you to send system logs
to a UNIX server.
TACACS
UDP
49
Login Host Protocol used for
(Terminal Access Controller Access
Control System).
TELNET
TCP
23
Telnet is the login and terminal
emulation protocol common on the
Internet and in UNIX environments. It
operates over TCP/IP networks. Its
primary function is to allow users to
log into remote host systems.
Table 94
Commonly Used Services (continued)
NAME
PROTOCOL
PORT(S)
DESCRIPTION
Page 284 / 300
Appendix E Common Services
P-663HN-51 User’s Guide
284
TFTP
UDP
69
Trivial File Transfer Protocol is an
Internet file transfer protocol similar
to FTP, but uses the UDP (User
Datagram Protocol) rather than TCP
(Transmission Control Protocol).
VDOLIVE
TCP
7000
Another videoconferencing solution.
Table 94
Commonly Used Services (continued)
NAME
PROTOCOL
PORT(S)
DESCRIPTION
Page 285 / 300
P-663HN-51 User’s Guide
285
A
PPENDIX
F
Open Software Announcements
End-User License Agreement for "P-663HN-51"
Note: WARNING:
ZyXEL Communications Corp. IS WILLING TO LICENSE THE
ENCLOSED SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU
ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT.
PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE
INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL
INDICATE YOUR ASSENT TO THEM.
IF YOU DO NOT AGREE TO THESE
TERMS, THEN ZyXEL, INC. IS UNWILLING TO LICENSE THE SOFTWARE
TO YOU, IN WHICH EVENT YOU SHOULD RETURN THE UNINSTALLED
SOFTWARE AND PACKAGING TO THE PLACE FROM WHICH IT WAS
ACQUIRED, AND YOUR MONEY WILL BE REFUNDED.
1.Grant of License for Personal Use
ZyXEL Communications Corp. ("ZyXEL") grants you a non-exclusive, non-
sublicense, non-transferable license to use the program with which this license is
distributed (the "Software"), including any documentation files accompanying the
Software ("Documentation"), for internal business use only, for up to the number
of users specified in sales order and invoice. You have the right to make one
backup copy of the Software and Documentation solely for archival, back-up or
disaster recovery purposes.
You shall not exceed the scope of the license granted
hereunder. Any rights not expressly granted by ZyXEL to you are reserved by
ZyXEL, and all implied licenses are disclaimed.
2.Ownership
You have no ownership rights in the Software.
Rather, you have a license to use
the Software as long as this License Agreement remains in full force and effect.
Ownership of the Software, Documentation and all intellectual property rights
therein shall remain at all times with ZyXEL.
Any other use of the Software by any
other entity is strictly forbidden and is a violation of this License Agreement.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top