Intrusion Defense Firewall 1.2 User's Guide - Trend Micro? Online ...
Intrusion Defense Firewall 1.2 User's Guide - Trend Micro? Online ...
Intrusion Defense Firewall 1.2 User's Guide - Trend Micro? Online ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Required Ports<br />
A number of ports must be accessible for the IDF Server Plug-in and the Client Plug-ins to function as<br />
expected. The following is a list of the ports used, the description of the function for which the port is<br />
used, the related protocols, the application which initializes the connection, the application to which the<br />
connection is made, whether the use of a proxy is possible (and what type of proxy), and whether and<br />
where the port can be configured:<br />
Port: 4118<br />
Use: Server Plug-in to Client Plug-in communication<br />
Protocol: TCP<br />
Initiated By: IDF Server<br />
Connected To: DSA<br />
Proxy: No<br />
Configuration: This port is not configurable (please contact your support provider if this port<br />
assignment is problematic.)<br />
Port: 4119 (default)<br />
Use: Access to IDF Server remotely<br />
Protocol: TCP<br />
Initiated By: Web Browser<br />
Connected To: IDF Server<br />
Proxy: No<br />
Configuration: This port is configured during the IDF Server installation process<br />
Port: 4120 (default)<br />
Use: Client Plug-in to Server Plug-in communication<br />
Protocol: TCP<br />
Initiated By: DSA<br />
Connected To: IDF Server<br />
Proxy: No<br />
Configuration: This port is configured during the IDF Server installation process<br />
Port: 514 (default)<br />
Use: Syslog<br />
Protocol: UDP<br />
Initiated By: DSA<br />
Connected To: Syslog facility<br />
Proxy: No<br />
Configuration: This port can be configured in the IDF Server Settings section<br />
© Copyright 2010 <strong>Trend</strong> <strong>Micro</strong> Inc. www.trendmicro.com<br />
All rights reserved. - 143 -