
E-12
Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide using ASDM
OL-20748-01
Appendix E Addresses, Protocols, and Ports
TCP and UDP Ports
•
To assign a port for DNS access, use the
domain
literal value, not
dns
. If you use
dns
, FWSM
assumes you meant to use the
dnsix
literal value.
Port numbers can be viewed online at the IANA website:
http://www.iana.org/assignments/port-numbers
Table E-5
Port Literal Values
Literal
TCP or UDP? Value
Description
aol
TCP
5190
America Online
bgp
TCP
179
Border Gateway Protocol, RFC 1163
biff
UDP
512
Used by mail system to notify users that new mail is
received
bootpc
UDP
68
Bootstrap Protocol Client
bootps
UDP
67
Bootstrap Protocol Server
chargen
TCP
19
Character Generator
citrix-ica
TCP
1494
Citrix Independent Computing Architecture (ICA)
protocol
cmd
TCP
514
Similar to
exec
except that
cmd
has automatic
authentication
ctiqbe
TCP
2748
Computer Telephony Interface Quick Buffer
Encoding
daytime
TCP
13
Day time, RFC 867
discard
TCP, UDP
9
Discard
domain
TCP, UDP
53
DNS
dnsix
UDP
195
DNSIX Session Management Module Audit
Redirector
echo
TCP, UDP
7
Echo
exec
TCP
512
Remote process execution
finger
TCP
79
Finger
ftp
TCP
21
File Transfer Protocol (control port)
ftp-data
TCP
20
File Transfer Protocol (data port)
gopher
TCP
70
Gopher
https
TCP
443
HTTP over SSL
h323
TCP
1720
H.323 call signalling
hostname
TCP
101
NIC Host Name Server
ident
TCP
113
Ident authentication service
imap4
TCP
143
Internet Message Access Protocol, version 4
irc
TCP
194
Internet Relay Chat protocol
isakmp
UDP
500
Internet Security Association and Key Management
Protocol
kerberos
TCP, UDP
750
Kerberos
Summary of Contents for 6500 - Catalyst Series 10 Gigabit EN Interface Module Expansion
Page 35: ...P A R T 1 Getting Started and General Information ...
Page 36: ......
Page 297: ...P A R T 2 Configuring the Security Policy ...
Page 298: ......
Page 521: ...P A R T 3 System Administration ...
Page 522: ......
Page 613: ...P A R T 4 Reference ...
Page 614: ......