Skip to main content

Command Palette

Search for a command to run...

Ports, Protocols, Purpose, and Encrypted Alternatives

Updated
5 min read
Ports, Protocols, Purpose, and Encrypted Alternatives
C

My name is Valentina. but hey, just call me Vally, which means strength. I am the Powerhouse behind Cyvally. Vally is a rising cybersecurity professional and a content creator, I write to make cybersecurity and cloud topics understandable and interesting to you (after all, who likes boring?).

My first time boarding the yellow buses in Lagos State wasn't a funny one. I took a bus from Lekki Phase 1 to Ajah. As a Yoruba girl who had stayed in Port Harcourt and was just arriving in Lagos, my first instinct wasn't to use the popular "owa" to indicate that I wanted to get off. Using the word "highlight" wasn't an option either, as Twitter stories had taught me that people might look at me strangely. So, I used the usual "dropping" word, as I was used to in Port Harcourt, and the drivers there clearly understood. Ladies and gentlemen, the driver carried me past my destination. The other passengers told me I should have used "owa" and mentioned the exact destination. Trust me, I have learned my lesson.

In this story, "ports" are like bus stops, specific locations where you need to signal your intention to stop. Just as different bus stops have specific names ("Lekki Phase 1," "Ajah"), ports have specific numbers (like 80, and 21). The "protocols" are the methods of communication, how you signal to the driver. In Port Harcourt, I used "dropping," similar to how protocols like HTTP or FTP have specific ways to communicate. In Lagos, the expected protocol was "owa + exact destination," just as HTTP and FTP, respectively.

What's your own way of communicating with conductors or drivers to stop you at your destination?

In this post, we will look into what Ports and Protocols are, the Purposes of common ports and their Encrypted Alternatives

Let's Get Right Into It!!!

What are Ports/ Port Numbers?

A port, often known as a port number, is a number allocated to identify a connection endpoint and route data to a service. Ports guarantee that when data arrives on a device, it is sent to the right service/protocol.

Port numbers range from 0 to 65535, with 0-1023 being well-known.

What are Protocols?

A protocol is a way for computers or devices connected to a network to communicate with one another. It outlines the rules or procedures for transmitting data.

Simply put, they are the common language that computers speak.

Now, let's go through common port numbers, protocols, and their encrypted/ secure alternatives.

Port NumberProtocolProtocol TypePurposeSecure Alternative Port NumberSecure Alternative Protocol
Port 20/21FTP (File Transfer Protocol)TCPTransfer files between client and server(where port 20 is for data connection, and port 21 is used for control connection)Port 989/990FTPS(FileFile Transfer Protocol Secure) 
Port 23TelnetTCPRemote login and command executionPort 22SSH(Secure Shell)
Port 25SMTP (Simple Mail Transfer Protocol)TCPSending emailsPort 465SMTPS (Simple Mail Transfer Protocol Secure)
Port 53DNS (Domain Name System)TCP/UDPResolve domain names to IP addressesDoH- Port 443
DoT- Port 853
DNS over HTTPS (DoH) or DNS over TLS (DoT)
Port 67/68DHCP (Dynamic Host Configuration Protocol)UDPAssign IP addresses to devices on a networkN/AN/A
Port 69TFTP (Trivial File Transfer Protocol)UDPSimple, unsecure file transfersN/A
N/A
Port 80HTTP (Hypertext Transfer Protocol)TCPTransmitting web pages on the internetPort 443HTTPS(Hypertext transfer protocol secure) 
Port 110POP3 (Post Office Protocol)TCPRetrieve and manage emails from a mail serverPort 995POP3S(Post Office Protocol version 3)/ POP3 over TLS
Port 123NTP (Network Time Protocol)UDPSynchronize clocks over a networkN/AN/A
Port 137NetBIOS Name ServiceUDPName resolution in a LANN/AN/A
Port 143IMAP (Internet Message Access Protocol)TCPRetrieve and manage emails from a mail serverPort 993IMAPS 
Port 161/162SNMP (Simple Network Management Protocol)UDPNetwork management and monitoringPort 161/162SNMPv3 (it uses its encryption methods)
Port 389LDAP (Lightweight Directory Access Protocol)TCP/UDPDirectory servicesPort 636LDAPS
Port 445SMB (Server Message Block)TCPFile and printer sharingVariesSMB over SSL/TLS
Port 514SyslogUDPSystem loggingPort 6514Syslog over TLS 
Port 3306MySQLTCPDatabase servicesUses the same portMySQL over SSL/TLS
Port 3389RDP (Remote Desktop Protocol)TCPRemote desktop access,  where it provides a user with a graphical interface to connect to another computer over a network.Uses the same portRDP over SSL/TLS 
Port 5060SIP (Session Initiation Protocol)TCP/UDPVoice over IP (VoIP)Port 5061SIPS 
Common port numbers, protocols, and their encrypted/ secure alternatives

Conclusions

Knowing the ports and protocols in your networks is one of the first steps in identifying potential vulnerabilities and understanding how to secure your systems.

If one does not know to which port one is sailing, no wind is favourable.

~Seneca the Younger

To reach a port, we must sail - sail, not tie at anchor - sail, not drift.

~Franklin D. Roosevelt

Review Questions

Network Shell

Part 1 of 3

Welcome to Network Shell! Explore resources on networking, from basic concepts to advanced skills. Access courses and certifications to enhance your expertise and stay updated in the ever-evolving networking field. Thanks for visiting!

Up next

Sec+ 004: Network Attacks Indicators

My mum once told me that in the olden days, it was a common practice for people to communicate with their potential spouses through intermediaries (called "Alarina" in the Yoruba Language) before getting married.The role of the Alarina, or intermedia...