TCP vs UDP — Know the Difference
DNS uses UDP port 53 for standard queries — fast, low overhead, fits in one packet. DNS uses TCP port 53 for zone transfers (replicating the full DNS database between servers) and responses larger than 512 bytes. The exam may ask which protocol DNS uses — answer UDP for lookups, TCP for zone transfers.
Quick Reference — Most Tested Ports
Full Port Reference Table
| Port | Protocol | TCP/UDP | Description | Exams |
|---|---|---|---|---|
| 📁 File Transfer | ||||
| 20 | FTP Data | TCP | FTP active mode data transfer. The server initiates the data connection back to the client on port 20. Passive mode FTP uses a negotiated high port instead. | A+N+ |
| 21 | FTP Control | TCP | FTP command/control channel — login, directory listing, file commands. Unencrypted — credentials sent in cleartext. Use SFTP (port 22) or FTPS (port 990) instead. | A+N+S+ |
| 22 | SSH / SFTP / SCP | TCP | Secure Shell — encrypted remote terminal access, replacing Telnet. Also used by SFTP (Secure FTP over SSH) and SCP (Secure Copy). The most important "secure replacement" port to know. | A+N+S+ |
| 69 | TFTP | UDP | Trivial FTP — simple, no authentication, no directory listing. Used to transfer OS images to network devices (Cisco IOS), PXE boot, and firmware updates. Never used for sensitive files. | N+ |
| 445 | SMB | TCP | Server Message Block — Windows file and printer sharing. Used by Windows mapped drives, Active Directory, and network printing. WannaCry ransomware exploited SMBv1 vulnerability. EternalBlue exploit targets this port. | A+N+S+ |
| 25 | SMTP | TCP | Simple Mail Transfer Protocol — sends email between mail servers (server to server). Also used by email clients to send outgoing mail. Unencrypted — credentials visible in transit. | A+N+S+ |
| 110 | POP3 | TCP | Post Office Protocol v3 — downloads email from server to client and typically deletes it from the server. Unencrypted. Use POP3S (port 995) for encrypted version. Key difference from IMAP: email is removed from server. | A+N+ |
| 143 | IMAP | TCP | Internet Message Access Protocol — syncs email with server, leaving messages on the server. Multiple devices see the same inbox. Unencrypted. Use IMAPS (port 993) for encrypted version. Key difference from POP3: email stays on server. | A+N+ |
| 465 / 587 | SMTPS | TCP | Encrypted SMTP. Port 465 uses implicit TLS (SSL). Port 587 uses STARTTLS (upgrades plaintext connection to encrypted). Modern email clients typically use 587. Both replace unencrypted SMTP (25) for client-to-server submission. | A+N+ |
| 993 | IMAPS | TCP | IMAP over SSL/TLS — encrypted version of IMAP. Mail stays on server, synced across devices, connection is encrypted. The recommended replacement for plaintext IMAP (143). | A+N+ |
| 995 | POP3S | TCP | POP3 over SSL/TLS — encrypted version of POP3. Downloads and typically deletes from server, connection is encrypted. Replacement for plaintext POP3 (110). | A+N+ |
| 🌐 Web & Remote Access | ||||
| 23 | Telnet | TCP | Remote terminal access — unencrypted. Everything including passwords is sent in cleartext. Replaced by SSH (port 22). Still tested because it's a classic example of an insecure protocol that should be disabled. | A+N+S+ |
| 80 | HTTP | TCP | Hypertext Transfer Protocol — unencrypted web traffic. Traffic is visible in transit. Should be replaced by HTTPS (443) for any site handling sensitive data. Still used for initial redirect to HTTPS. | A+N+S+ |
| 443 | HTTPS | TCP | HTTP over TLS/SSL — encrypted web traffic. The "S" means encrypted with a TLS certificate. URL shows https:// and browser shows padlock. The standard for all modern web traffic. | A+N+S+ |
| 3389 | RDP | TCP | Remote Desktop Protocol — graphical remote access to Windows desktops. Requires Windows Pro or higher on the host. Commonly targeted by attackers — brute-force and credential stuffing attacks on exposed RDP are extremely common. Should not be exposed directly to the internet. | A+N+S+ |
| 🗂️ Directory & Authentication | ||||
| 389 | LDAP | TCP/UDP | Lightweight Directory Access Protocol — queries Active Directory and other directory services. Unencrypted. Used for authentication lookups, user searches, group membership queries. | N+S+ |
| 636 | LDAPS | TCP | LDAP over SSL/TLS — encrypted version of LDAP. Same function as LDAP but traffic is encrypted. Required when LDAP is used for authentication in security-sensitive environments. | N+S+ |
| 88 | Kerberos | TCP/UDP | Authentication protocol used by Active Directory for SSO (Single Sign-On). Issues tickets (TGT, service tickets) that prove identity without sending passwords over the network. | N+S+ |
| 1812 / 1813 | RADIUS | UDP | Remote Authentication Dial-In User Service — centralised authentication for network access (VPN, Wi-Fi 802.1X). Port 1812 for authentication/authorisation, 1813 for accounting. Used with WPA2/WPA3 Enterprise wireless. | N+S+ |
| 🔧 Network Services | ||||
| 53 | DNS | TCP/UDP | Domain Name System — resolves hostnames to IP addresses. UDP for standard queries (fast, small responses). TCP for zone transfers and large responses. Port 53 is one of the most critical ports — blocking it breaks internet connectivity. | A+N+S+ |
| 67 | DHCP Server | UDP | DHCP server listens on UDP 67 for DISCOVER messages from clients. The DORA process: Discover (client, broadcast) → Offer (server) → Request (client) → Acknowledge (server). | A+N+ |
| 68 | DHCP Client | UDP | DHCP client port — receives DHCP offers and acknowledgements from the server. A client without a DHCP address broadcasts on port 68 to port 67 to find a server. | A+N+ |
| 123 | NTP | UDP | Network Time Protocol — synchronises clocks across network devices. Critical for Kerberos authentication (tickets have timestamps — clock skew of more than 5 minutes breaks AD auth) and log correlation in SIEM. | N+S+ |
| 161 | SNMP | UDP | Simple Network Management Protocol — polls network devices for status, performance counters, and configuration data. SNMPv1 and v2c use community strings (no encryption). SNMPv3 adds authentication and encryption. | N+S+ |
| 162 | SNMP Trap | UDP | Devices send unsolicited SNMP Trap messages to the management station (NMS) when an alert condition occurs — instead of waiting to be polled. Used for real-time alerts like link down, high CPU, or threshold exceeded. | N+ |
| 514 | Syslog | UDP | Sends log messages from network devices (routers, switches, firewalls) to a central syslog server. UDP means logs can be lost if the network is congested — use TCP syslog (port 6514 with TLS) for critical logs. | N+S+ |
| 🔒 VPN & Tunneling | ||||
| 500 | IKE / IPSec | UDP | Internet Key Exchange — negotiates IPSec VPN sessions. Used for site-to-site and client VPN tunnels. IKEv2 is the modern standard. IPSec also uses IP protocol 50 (ESP) and 51 (AH) — not port-based. | N+S+ |
| 1194 | OpenVPN | TCP/UDP | Open-source VPN protocol. Typically uses UDP 1194 for performance, can also use TCP 443 to bypass firewalls that block VPN traffic. | N+ |
| 1723 | PPTP | TCP | Point-to-Point Tunneling Protocol — legacy VPN. Considered insecure — known vulnerabilities in MS-CHAPv2 authentication. Should not be used. Still tested as an example of a deprecated/insecure protocol. | N+S+ |
| 🖨️ Printing & Windows | ||||
| 137–139 | NetBIOS | TCP/UDP | Legacy Windows name resolution and session services. Largely replaced by DNS and SMB direct (445). Port 137: NetBIOS Name Service. 138: Datagram. 139: Session. Often disabled in modern environments. | N+ |
| 9100 | RAW Print / JetDirect | TCP | HP JetDirect / raw printing — sends print jobs directly to a network printer without a print server. Common in enterprise environments with networked printers. | A+ |
| 📡 VoIP | ||||
| 5060 / 5061 | SIP | TCP/UDP | Session Initiation Protocol — sets up, manages, and tears down VoIP calls. Port 5060: unencrypted SIP. Port 5061: SIP over TLS (encrypted). The actual voice data travels over RTP (dynamic ports). | N+ |
| 🗄️ Database | ||||
| 1433 | Microsoft SQL Server | TCP | Default port for Microsoft SQL Server database connections. Should not be exposed to the internet — commonly targeted by automated scanners. Firewall rules should limit access to application servers only. | S+ |
| 3306 | MySQL / MariaDB | TCP | Default port for MySQL and MariaDB database connections. Common in LAMP/LEMP web stacks. Like MSSQL, should be firewalled to allow access only from application servers. | S+ |
Encrypted vs Unencrypted — The Upgrade Pairs
The Security+ exam frequently tests whether you can identify which protocols are insecure and what their encrypted replacements are. These pairs are the most tested:
Telnet (23) → SSH (22) — Remote terminal access. Telnet sends everything in cleartext. SSH encrypts the session.
FTP (20/21) → SFTP or FTPS — SFTP runs over SSH (port 22). FTPS is FTP with TLS (port 990/21). Both encrypt credentials and data.
HTTP (80) → HTTPS (443) — Web traffic. HTTPS uses TLS to encrypt the connection.
SMTP (25) → SMTPS (465/587) — Email sending. Port 587 with STARTTLS is the modern standard.
IMAP (143) → IMAPS (993) — Email retrieval (leaves on server). Encrypted with TLS.
POP3 (110) → POP3S (995) — Email retrieval (downloads to client). Encrypted with TLS.
LDAP (389) → LDAPS (636) — Directory queries. LDAPS encrypts the connection.
SNMP v1/v2c → SNMPv3 — Not a port change — same port 161, but v3 adds authentication and encryption.
FTP uses two ports — 20 for data, 21 for control. A firewall rule blocking port 21 blocks the login/commands. A rule blocking port 20 blocks the actual file transfer. Both need to be open for active mode FTP to work.
RDP (3389) is TCP, not UDP — Many candidates assume it's UDP because it streams a graphical display. It's TCP. Exposing RDP directly to the internet is a major security risk — attackers constantly scan for open port 3389.
DHCP uses UDP, not TCP — DHCP discovery is a broadcast — the client doesn't have an IP yet so it can't establish a TCP connection. DHCP uses UDP 67 (server) and 68 (client) specifically because it doesn't require a prior connection.
Ready to put this into practice?
See the best practice exams and study resources for Network+ and Security+.