NETWORK SECURITY
FIREWALLS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
389
|
|
3389
|
|
1433
|
|
220
|
Detailed explanation-1: -LDAP TCP and UDP port 389 is used for Directory, Replication, User and Computer Authentication, Group Policy, Trusts. As you mentioned, we could not block port 389 on AD. For LDAPs (LDAP SSL), TCP 636 is used for Directory, Replication, User and Computer Authentication, Group Policy, Trusts.
Detailed explanation-2: -Port 389 has historically been used for unencrypted connections into an LDAP server. Port 636 is used for legacy SSL connections. Port 389 is used for TLS connections; TLS establishes a non encrypted connection on port 389 that it ‘upgrades’ to an encrypted TLS connection as the initial connection proceeds.
Detailed explanation-3: -The standard port for LDAP communication is 389, although other ports can be used.
Detailed explanation-4: -To change the Remote-LDAP config from standard LDAP (Port 389) to LDAPS (Port 636): 1) Set the SSL parameter to Enabled. The Port value will change from 389 to 636. This will also expose several additional SSL related configuration options.
Detailed explanation-5: -Select Start > Run, type ldp.exe, and then select OK. Select Connection > Connect. In Server and in Port, type the server name and the non-SSL/TLS port of your directory server, and then select OK. For an Active Directory Domain Controller, the applicable port is 389.