Windows home server ports




















This service enables the Distributed Link Tracking Client service to track linked documents that are moved to a location in another NTFS file system volume in the same domain. The Distributed Transaction Coordinator DTC system service coordinates transactions that are distributed across multiple computer systems and resource managers, such as databases, message queues, file systems, or other transaction-protected resource managers.

DNS servers are required to locate devices and services that are identified by using DNS names and to locate domain controllers in Active Directory. The Event Log system service logs event messages that are generated by programs and by the Windows operating system. Event log reports contain information that you can use to diagnose problems.

You view reports in Event Viewer. The Event Log service writes events that are sent to log files by programs, by services, and by the operating system. The events contain diagnostic information in addition to errors that are specific to the source program, the service, or the component.

This service has the same firewall requirements as the File and Printer Sharing feature. Fax Service lets users use either a local fax device or a shared network fax device to send and receive faxes from their desktop programs. The File Replication service FRS is a file-based replication engine that automatically copies updates to files and folders between computers that are participating in a common FRS replica set.

FRS is the default replication engine that is used to replicate the contents of the SYSVOL folder between Windows based domain controllers and Windows Server based domain controllers that are located in a common domain.

By default, the FTP control port is The default data that is used for active mode FTP port is automatically set to one port less than the control port. Therefore, if you configure the control port to port , the default data port is port This means that the client first connects to the FTP server by using the control port. Then, the client opens a second connection to the FTP server for transferring data.

You can configure the range of high ports by using the IIS metabase. If any one of these protocols is unavailable or blocked between the client and a relevant domain controller, Group Policy will not apply or update.

For a cross-domain logon, where a computer is in one domain and the user account is in another domain, these protocols may be required for the client, the resource domain, and the account domain to communicate.

ICMP is used for slow link detection. When you initiate remote group policy results reporting from a Windows Server computer, access to the destination computer's event log is required.

See the Event Log section in this article for port requirements. Windows Server support the initiation of remote group policy update against Windows Server computers.

SSL is an open standard for establishing an encrypted communications channel to help prevent the interception of extremely important information, such as credit card numbers. Although this service works on other Internet services, it is primarily used to enable encrypted electronic financial transactions on the World Wide Web WWW.

Internet Authentication Service IAS performs centralized authentication, authorization, auditing, and accounting of users who are connecting to a network. These users can be on a LAN connection or on a remote connection. This system service provides NAT, addressing, and name resolution services for all computers on your home network or your small-office network. When the Internet Connection Sharing feature is enabled, your computer becomes an Internet gateway on the network.

Other client computers can then share one connection to the Internet, such as a dial-up connection or a broadband connection. They do not provide these services on the external network interface.

When you use the Kerberos Key Distribution Center KDC system service, users can sign in to the network by using the Kerberos version 5 authentication protocol.

As in other implementations of the Kerberos protocol, the KDC is a single process that provides two services: the Authentication Service and the Ticket-Granting Service.

The Authentication Service issues ticket granting tickets, and the Ticket-Granting Service issues tickets for connection to computers in its own domain. The License Logging system service is a tool that was originally designed to help customers manage licenses for Microsoft server products that are licensed in the server client access license CAL model. By default, the License Logging service is disabled in Windows Server Because of legacy design constraints and evolving license terms and conditions, License Logging may not provide an accurate view of the total number of CALs that are purchased compared to the total number of CALs that are used on a particular server or across the enterprise.

License Logging is not included in Windows Server and later operating systems. We recommend that only users of the Microsoft Small Business Server family of operating systems enable this service on their servers. The Message Queuing system service is a messaging infrastructure and development tool for creating distributed messaging programs for Windows.

These programs can communicate across heterogeneous networks and can send messages between computers that may be temporarily unable to connect to one another. Message Queuing helps provide security, efficient routing, support for sending messages within transactions, priority-based messaging, and guaranteed message delivery.

The Microsoft POP3 service provides email transfer and retrieval services. Administrators can use this service to store and manage email accounts on the mail server. When you install POP3 service on the mail server, users can connect to the mail server and can retrieve email messages by using an email client that supports the POP3 protocol, such as Microsoft Outlook. The Net Logon system service maintains a security channel between your computer and the domain controller to authenticate users and services.

It passes the user's credentials to a domain controller and returns the domain security identifiers and the user rights for the user. This is typically known as pass-through authentication. Net Logon is configured to start automatically only when a member computer or domain controller is joined to a domain. The NetMeeting Remote Desktop Sharing system service allows authorized users to use Windows NetMeeting to remotely access your Windows desktop from another personal computer over a corporate intranet.

You must explicitly enable this service in NetMeeting. You can disable or shut down this feature by using an icon that is displayed in the Windows notification area. Clients can use a news client, such as Microsoft Outlook Express, to retrieve newsgroups from the server and to read the headers or the bodies of the articles in each newsgroup. Offline Files and Roaming User Profiles cache user data to computers for offline use. These capabilities exist in all supported Microsoft operating systems.

All of these systems use SMB. Folder Redirection redirects user data from the local computer to a remote file share, using SMB. Primary Computer provides a capability to prevent data caching to computers that are not authorized by administrators for specific users. This system was added in Windows Server The Performance Logs and Alerts system service collects performance data from local or remote computers based on preconfigured schedule parameters and then writes that data to a log or triggers a message.

There is literally no support. Can you tell me which routers are compatable with this machine and MS Vista? A more accurate statement would be that including UDP will cause a failed connection. I got connection time outs until I saw this. Once I changed the protocol to TCP only, it started working beautifully. I have forwarded all 4 ports to my local sercer ip address using tcp only.

I am trying to rdc into my server using xxx. I am getting a error Unable to establish a vpn connection. I thought WHS was supposed to be easy… just try and configure a Dlink gt with firmware upgrade for the task. I can access my files shares thru my xxx. I figured I could not access my computers since they are win 7 home and not professional but what about the WHS console?

Hi DCMackie… Are you trying to connect to the console or computers at home from your work? After spending a few weeks trying to figure out how, I finally found the answer. UPnP was disabled on my router. I enabled UPnP and all is well. Any ideas? Name required. Email required will not be published. If you want a picture to show with your comment, go get a Gravatar. Join , subscribers and get a daily digest of news, geek trivia, and our feature articles.

By submitting your email, you agree to the Terms of Use and Privacy Policy. So how do you check open ports to see what application is already using it?

An IP address specifies a computer—or other network device—on a network. When one device sends traffic to another, the IP address is used to route that traffic to the appropriate place. Once the traffic reaches the right place, the device needs to know which app or service to send the traffic on to. If the IP address is akin to a street address on a piece of mail, the port is something like the name of the person at that residence who gets the mail.

All these methods should work no matter which version of Windows you use. Most of the time, that command will work fine. After you hit Enter, the results may take a minute or two to fully display, so be patient.

Here, for example, you can see that port is tied up by a process named picpick. PicPick is an image editor on our system, so we can assume the port is actually tied up by the process that regularly checks for updates to the app.

Type the following text at the Command Prompt, and then hit Enter:. Go ahead and download the tool. Just make sure you get the right version the regular version is for bit Windows and the x64 version is for bit Windows.

Just unzip the download folder and run executable. If you support internet-based clients by using SSL bridging, in addition to port requirements, you might also have to allow some HTTP verbs and headers to traverse your firewall. Configuration Manager enables you to configure the ports for the following types of communication:.

Configuration Manager then uses these ports during communications to the reporting services point. Be sure to review these ports that define the IP filter information for IPsec policies or for configuring firewalls.

You can change these ports during setup or in the site properties. Configuration Manager doesn't allow you to configure ports for the following types of communication:. The following sections detail the ports that are used for communication in Configuration Manager. The arrows in the section title show the direction of the communication:.

Wake-up proxy also uses ICMP echo request messages from one client to another client. Clients use this communication to confirm whether the other client is awake on the network. ICMP is sometimes referred to as ping commands. However, any host-based firewalls on these client computers or intervening network devices within the subnet must permit ICMP traffic for wake-up proxy communication to succeed.

For more information, see Ports and data flow. For more information, see CMG data flow. Use client settings to configure the alternate port for express updates. For more information, see Port that clients use to receive requests for delta content. If you enable a host-based firewall, make sure that the rules allow the server to send and receive on these ports.

It doesn't configure the outbound send rules. A Configuration Manager client doesn't contact a global catalog server when it's a workgroup computer or when it's configured for internet-only communication. Configuration Manager uses these connections to build the CMG channel. The specific port required depends upon the management point configuration.

For more information, see What is the administration service? For more information, see External notifications. This communication is used when you deploy certificate profiles by using the certificate registration point.

The communication isn't used for every site server in the hierarchy.



0コメント

  • 1000 / 1000