Common Network Ports - CompTIA A+ 220-1101 - 2.1

00:12:24
https://www.youtube.com/watch?v=dh8h-4u7Wak

摘要

TLDRDans cette vidéo, nous abordons l'importance des numéros de port bien connus pour la communication entre appareils. Les services comme FTP, SSH, Telnet, SMTP, DNS, DHCP, HTTP, POP3, IMAP, SMB, SNMP, LDAP et RDP sont détaillés avec leurs ports associés. Chaque protocole joue un rôle essentiel dans les réseaux en permettant le transfert de données, la gestion de fichiers, l'accès à distance et bien plus encore, tout en soulignant les différences entre les protocoles sécurisés et non sécurisés.

心得

  • 📦 FTP utilise TCP port 20 et 21 pour le transfert de fichiers.
  • 🔒 SSH opère sur TCP port 22 pour des connexions sécurisées.
  • ✉️ SMTP fonctionne sur TCP port 25 pour l'envoi d'e-mails.
  • 🌐 DNS utilise UDP port 53 pour la résolution d'adresses IP.
  • 🏠 DHCP se trouve sur UDP port 67 et 68 pour l'attribution d'adresses IP.
  • 🔗 HTTP communique sur TCP port 80, tandis que HTTPS utilise le port 443.
  • 📬 IMAP fonctionne sur TCP port 143 pour la réception des e-mails.
  • 📄 RDP utilise TCP port 3389 pour des sessions de bureau à distance.
  • 🔍 SNMP interroge via UDP port 161 pour la gestion des réseaux.
  • 📁 SMB et CIFS permettent le partage de fichiers sur TCP port 445.

时间轴

  • 00:00:00 - 00:05:00

    Dans la première partie de la vidéo, nous avons discuté de l'importance des numéros de port dans la communication entre dispositifs, en insistant sur le fait que les numéros de port bien connus sont essentiels pour les serveurs, les clients et les pare-feu. Vous avez appris des numéros de port spécifiques pour différents protocoles, tels que FTP avec les ports TCP 20 et 21 pour le transfert de données et le contrôle, respectivement. En outre, nous avons abordé SSH (port 22) pour les connexions sécurisées à distance et Telnet (port 23), qui n'est pas recommandé en raison de l'absence de cryptage. Nous avons également évoqué SMTP (port 25) pour l'envoi d'e-mails, utilisant un protocole distinct pour la réception comme POP3 ou IMAP.

  • 00:05:00 - 00:12:24

    Dans la seconde partie, nous avons vu comment DHCP (ports UDP 67 et 68) attribue dynamiquement des adresses IP sur un réseau, et comment HTTP (port 80) et HTTPS (port 443) fonctionnent pour la communication web. Les protocoles POP3 et IMAP pour la réception d'e-mails utilisent respectivement les ports TCP 110 et 143. Nous avons ensuite exploré SMB pour le partage de fichiers, utilisant TCP 445, et SNMP pour la gestion des réseaux, avec les ports UDP 161 et 162. Enfin, nous avons abordé LDAP (port TCP 389) pour l'accès aux répertoires et RDP (port TCP 3389) pour l'accès à distance aux bureaux, en expliquant leur utilisation dans divers systèmes d'exploitation.

思维导图

视频问答

  • Quel port est utilisé par FTP pour le transfert de données?

    TCP port 20.

  • Quel port est utilisé par SSH?

    TCP port 22.

  • Quel est le port pour SMTP?

    TCP port 25.

  • Quel port utilise DNS?

    UDP port 53.

  • Quels ports sont utilisés par DHCP?

    UDP port 67 et UDP port 68.

  • Quel port utilise HTTP?

    TCP port 80.

  • Quel est le port pour HTTPS?

    TCP port 443.

  • Quel port est utilisé par IMAP?

    TCP port 143.

  • Quel est le port pour RDP?

    TCP port 3389.

  • Quel port utilise SNMP?

    UDP port 161.

查看更多视频摘要

即时访问由人工智能支持的免费 YouTube 视频摘要!
字幕
en
自动滚动:
  • 00:00:02
    in our previous video we talked about
  • 00:00:03
    how services have port numbers that they
  • 00:00:06
    use so that other devices can
  • 00:00:08
    communicate and use those services we
  • 00:00:10
    refer to these as well-known port
  • 00:00:12
    numbers because both the server and the
  • 00:00:15
    client need to know exactly what port
  • 00:00:17
    number they'll use to communicate this
  • 00:00:19
    is not only important for the server and
  • 00:00:21
    the client but it's also important for
  • 00:00:23
    any firewalls that may be in the middle
  • 00:00:25
    of that communication firewalls have to
  • 00:00:27
    decide whether to allow or disallow this
  • 00:00:29
    traffic and they often make that
  • 00:00:31
    decision based on the port number as we
  • 00:00:33
    go through this video you'll see that
  • 00:00:35
    there are a lot of different port
  • 00:00:36
    numbers that you should use and if
  • 00:00:38
    you've never worked with port numbers
  • 00:00:39
    before this will seem like rote
  • 00:00:41
    memorization but the port numbers
  • 00:00:43
    themselves become easier and easier to
  • 00:00:45
    remember as you continue to use them
  • 00:00:48
    it's important to know these port
  • 00:00:49
    numbers and what protocols are often
  • 00:00:51
    used by a particular port number but
  • 00:00:53
    it's also important to know when you
  • 00:00:55
    would use these protocols for example
  • 00:00:57
    your exam might ask you what port number
  • 00:00:59
    is used by an application that transfers
  • 00:01:02
    data in a particular way across the
  • 00:01:04
    network
  • 00:01:05
    let's start our conversation of port
  • 00:01:07
    numbers with ftp or the file transfer
  • 00:01:09
    protocol as the name implies this is a
  • 00:01:12
    protocol that transfers files from one
  • 00:01:14
    device to another there are two port
  • 00:01:16
    numbers used by ftp one is tcp port 20
  • 00:01:20
    this is for data transfers and tcp port
  • 00:01:23
    21 which is used to control the data
  • 00:01:26
    transfer ftp is a generic way to
  • 00:01:28
    transfer data between devices but it
  • 00:01:31
    commonly requires some type of
  • 00:01:33
    authentication to log into that remote
  • 00:01:35
    device so you might use a username and
  • 00:01:37
    password although some systems will
  • 00:01:39
    allow you to log in as anonymous and use
  • 00:01:42
    any password to gain access the ftp
  • 00:01:44
    protocol also includes a number of file
  • 00:01:46
    management functions so when you connect
  • 00:01:48
    to an ftp server you can list all of the
  • 00:01:50
    files on that server you can add delete
  • 00:01:53
    rename and perform other file management
  • 00:01:55
    functions all by using ftp
  • 00:01:58
    there may be times when you need to
  • 00:02:00
    connect to a remote device through a
  • 00:02:02
    terminal or command line front end it's
  • 00:02:04
    common to use secure shell or ssh to
  • 00:02:07
    provide this terminal connection to a
  • 00:02:09
    remote device ssh commonly communicates
  • 00:02:12
    over tcp using port 22 and it has this
  • 00:02:15
    text-based front-end to be able to
  • 00:02:17
    access that remote device although we
  • 00:02:19
    see plain text on our screen any
  • 00:02:22
    communication sent over the network is
  • 00:02:23
    sent as encrypted data that's where the
  • 00:02:26
    secure comes from in the name secure
  • 00:02:28
    shell
  • 00:02:29
    there's another way to connect to a
  • 00:02:31
    remote device using this text-based or
  • 00:02:33
    console front-end and it's using telnet
  • 00:02:36
    or the telecommunication network
  • 00:02:38
    protocol telnet commonly uses tcp port
  • 00:02:41
    23 to provide this connection just like
  • 00:02:44
    ssh telnet provides this text-based
  • 00:02:46
    front-end that allows us to connect to
  • 00:02:48
    the remote console of another device
  • 00:02:50
    but unlike ssh all of the communication
  • 00:02:53
    between this telnet front-end and the
  • 00:02:55
    telnet server is all sent in the clear
  • 00:02:58
    or non-encrypted this means that anyone
  • 00:03:00
    who might be capturing packets between
  • 00:03:02
    these two devices will see everything
  • 00:03:04
    that you're sending over this link
  • 00:03:06
    including usernames passwords and
  • 00:03:08
    everything else this is why we often say
  • 00:03:11
    that you shouldn't use telnet on your
  • 00:03:13
    production networks and instead you
  • 00:03:15
    should always use ssh for terminal
  • 00:03:17
    communication
  • 00:03:19
    there are probably millions of email
  • 00:03:21
    servers that are located on the internet
  • 00:03:24
    and the protocol that those email server
  • 00:03:26
    use to communicate with each other is
  • 00:03:27
    the simple mail transfer protocol or
  • 00:03:30
    smtp smtp commonly uses tcp using port
  • 00:03:34
    25. not only is smtp used to communicate
  • 00:03:38
    between mail servers but it's also used
  • 00:03:40
    for our mail clients to send mail to a
  • 00:03:43
    mail server so if you're using a mail
  • 00:03:45
    client on your mobile device or your
  • 00:03:46
    desktop computer and you're sending an
  • 00:03:48
    email message you could be using smtp
  • 00:03:52
    although it's common to use smtp to send
  • 00:03:55
    mail receiving mail is done using a
  • 00:03:57
    completely different set of protocols so
  • 00:03:59
    if you were to look at your email client
  • 00:04:01
    you're probably using imap or pop3 to be
  • 00:04:04
    able to receive mail and smtp to be able
  • 00:04:07
    to send mail
  • 00:04:09
    if you need to connect to a remote
  • 00:04:11
    website you would probably type into
  • 00:04:13
    your browser
  • 00:04:15
    www.professormesser.com and hit enter
  • 00:04:17
    behind the scenes your system needs to
  • 00:04:19
    be able to communicate with the
  • 00:04:20
    professor messer web server but it has
  • 00:04:23
    no idea what the ip address is for that
  • 00:04:25
    server to be able to resolve an ip
  • 00:04:28
    address from that fully qualified domain
  • 00:04:30
    name your system will use dns or the
  • 00:04:33
    domain name system dns commonly uses udp
  • 00:04:36
    port 53 to be able to make this
  • 00:04:38
    connection between you and the dns
  • 00:04:41
    server these are obviously very critical
  • 00:04:43
    resources because we don't often
  • 00:04:45
    memorize ip addresses of servers and
  • 00:04:48
    very often server ip addresses can
  • 00:04:50
    change without any type of notification
  • 00:04:52
    it's dns that provides that resolution
  • 00:04:55
    between a name that we're typing in on
  • 00:04:57
    the browser and the ip address that will
  • 00:04:59
    be used for the actual communication
  • 00:05:02
    if you've ever used your mobile device
  • 00:05:04
    on the wi-fi network of a coffee shop
  • 00:05:07
    then you've automatically received an ip
  • 00:05:09
    address that you can use on that network
  • 00:05:12
    this ip address was assigned
  • 00:05:13
    automatically using the dynamic host
  • 00:05:15
    configuration protocol or dhcp the
  • 00:05:19
    well-known ports for dhcp are udp port
  • 00:05:22
    67 and udp port 68. of course you need a
  • 00:05:26
    dhcp server to assign these ip addresses
  • 00:05:29
    to devices on your network that
  • 00:05:30
    functionality is commonly built into the
  • 00:05:33
    routers and wireless access points that
  • 00:05:35
    we use these days this dhcp server will
  • 00:05:37
    have a large pool of ip addresses that
  • 00:05:40
    can then be assigned to devices on your
  • 00:05:42
    network all of these ip addresses are
  • 00:05:44
    assigned in real time so when you start
  • 00:05:46
    up your computer it queries the dhcp
  • 00:05:48
    server and the dhcp server assigns your
  • 00:05:51
    device all of your ip configuration
  • 00:05:53
    details
  • 00:05:54
    dhcp uses a leasing system to assign
  • 00:05:57
    these ip addresses so you are only using
  • 00:05:59
    this ip address for a certain amount of
  • 00:06:01
    time and after that lease expires and
  • 00:06:03
    you're no longer on the network that ip
  • 00:06:06
    address goes back in the pool for
  • 00:06:07
    someone else to use
  • 00:06:09
    network administrators can also
  • 00:06:10
    configure dhcp servers to always assign
  • 00:06:14
    the same ip address to certain devices
  • 00:06:16
    so if there are routers firewalls
  • 00:06:18
    switches and other infrastructure
  • 00:06:20
    devices on your network your network
  • 00:06:22
    administrator may configure dhcp
  • 00:06:24
    reservations so those devices always
  • 00:06:27
    receive the same ip address every time
  • 00:06:29
    they're booted up this also means that
  • 00:06:32
    if you need to change any of the ip
  • 00:06:33
    configurations on these devices you
  • 00:06:35
    don't have to go to the devices to make
  • 00:06:37
    those changes you simply make them on
  • 00:06:39
    the dhcp server the next time that
  • 00:06:41
    device requests a dhcp address it will
  • 00:06:44
    receive the new configuration
  • 00:06:47
    if you've ever used a web browser then
  • 00:06:49
    you've used http and https http is the
  • 00:06:53
    hypertext transfer protocol and this is
  • 00:06:56
    the common protocol used by our browsers
  • 00:06:58
    to communicate to web servers there are
  • 00:07:00
    two different protocols depending on the
  • 00:07:02
    type of communication that you'll be
  • 00:07:04
    doing if you're communicating in the
  • 00:07:06
    clear or in a non-encrypted form you
  • 00:07:08
    would be using the http protocol which
  • 00:07:11
    uses tcp and port 80. if your browser's
  • 00:07:14
    communicating over an encrypted
  • 00:07:15
    connection then it's probably using
  • 00:07:18
    https the s being for secure and that
  • 00:07:21
    uses tcp port 443.
  • 00:07:25
    we mentioned earlier that sending email
  • 00:07:27
    messages can use smtp or the simple mail
  • 00:07:30
    transfer protocol but to receive email
  • 00:07:32
    messages you would commonly use pop3 or
  • 00:07:35
    imap pop3 is the post office protocol
  • 00:07:38
    version 3 and it commonly uses tcp port
  • 00:07:40
    110 pop3 was designed to retrieve email
  • 00:07:44
    messages to an email client but it
  • 00:07:46
    wasn't built for multiple email clients
  • 00:07:48
    and of course these days we tend to walk
  • 00:07:50
    around with many different mobile
  • 00:07:52
    devices all accessing the same email
  • 00:07:55
    inbox to be able to synchronize across
  • 00:07:57
    all of these different mailboxes we
  • 00:07:59
    commonly use imap4 or the internet
  • 00:08:01
    message access protocol version 4. imap
  • 00:08:04
    commonly uses tcp port 143 to be able to
  • 00:08:08
    download and manage that mailbox
  • 00:08:11
    many operating systems have their own
  • 00:08:13
    method of transferring files and
  • 00:08:15
    information between devices using that
  • 00:08:17
    operating system windows commonly uses
  • 00:08:20
    server message block or smb to be able
  • 00:08:23
    to provide this connection this is the
  • 00:08:25
    protocol commonly used by microsoft
  • 00:08:27
    windows so if you're transferring files
  • 00:08:29
    between devices or you're sending a
  • 00:08:31
    print job to a printer it's probably
  • 00:08:33
    using smb you might also hear smb
  • 00:08:36
    referenced as cifs or the common
  • 00:08:38
    internet file system smb uses a number
  • 00:08:41
    of different protocols to be able to
  • 00:08:43
    communicate and if you're communicating
  • 00:08:44
    to an older windows machine you're
  • 00:08:46
    probably using netbios over tcp netbios
  • 00:08:50
    is the network basic input output system
  • 00:08:53
    this uses udp port 137 as a name service
  • 00:08:56
    function so that it can find devices on
  • 00:08:58
    your network by the name and uses tcp
  • 00:09:01
    port 139 to set up a session and
  • 00:09:03
    transfer data between devices
  • 00:09:06
    on most modern versions of windows
  • 00:09:08
    netbios isn't used devices can
  • 00:09:10
    communicate directly between each other
  • 00:09:11
    using tcpip in those cases it would use
  • 00:09:15
    a direct smb connection using tcp port
  • 00:09:18
    445. this allows us to have a direct s b
  • 00:09:21
    communication between two devices by
  • 00:09:23
    using only tcp
  • 00:09:26
    if you plan on doing any work as a
  • 00:09:28
    network administrator you'll become very
  • 00:09:30
    familiar with snmp or the simple network
  • 00:09:32
    management protocol snmp allows a
  • 00:09:35
    network management device to query these
  • 00:09:37
    infrastructure devices for performance
  • 00:09:39
    details and receive those metrics in
  • 00:09:41
    return this uses udp port 161 to perform
  • 00:09:45
    these queries you can also configure the
  • 00:09:47
    infrastructure device to monitor for
  • 00:09:49
    certain metrics and if it exceeds any of
  • 00:09:51
    those metrics it can send an alert to
  • 00:09:54
    the management station we refer to these
  • 00:09:56
    alerts as traps and the traps use udp
  • 00:09:59
    port 162.
  • 00:10:01
    if you're configuring snmp on a device
  • 00:10:03
    it will ask you if you're using version
  • 00:10:05
    one version two or version three version
  • 00:10:08
    one was obviously the original snmp
  • 00:10:10
    version it sent structured information
  • 00:10:12
    across the network but all of this
  • 00:10:14
    information was sent in the clear or in
  • 00:10:16
    a non-encrypted form we introduced a
  • 00:10:19
    newer version of snmp with snmp version
  • 00:10:21
    2 which allowed us to do bulk transfers
  • 00:10:24
    of information but still all of that
  • 00:10:26
    information was being sent in a
  • 00:10:28
    non-encrypted form to be able to include
  • 00:10:31
    additional security with snmp you need
  • 00:10:33
    to use snmp v3 this includes encryption
  • 00:10:36
    that allows us to have message integrity
  • 00:10:39
    authentication and encryption of all of
  • 00:10:41
    the snmp data
  • 00:10:44
    we use directories extensively on our
  • 00:10:46
    modern networks and one very common
  • 00:10:48
    protocol to use to query these
  • 00:10:50
    directories is ldap ldap is the
  • 00:10:53
    lightweight directory access protocol
  • 00:10:55
    and it commonly uses tcp port 389. there
  • 00:10:58
    are many implementations of ldap but one
  • 00:11:01
    of the most popular is microsoft active
  • 00:11:03
    directory which allows you to query that
  • 00:11:05
    active directory server using the ldap
  • 00:11:08
    protocol
  • 00:11:10
    if you've ever worked in a support role
  • 00:11:12
    or on a help desk then you've probably
  • 00:11:14
    performed some type of remote access to
  • 00:11:16
    someone's desktop one very popular
  • 00:11:19
    protocol to provide this remote
  • 00:11:20
    communication is rdp or the remote
  • 00:11:23
    desktop protocol this is the standard
  • 00:11:25
    protocol used by windows for the remote
  • 00:11:28
    sharing and it commonly uses tcp port
  • 00:11:30
    3389
  • 00:11:32
    these remote desktop services are
  • 00:11:34
    available in many different editions of
  • 00:11:36
    windows and if you're using windows
  • 00:11:38
    today then you probably have built into
  • 00:11:40
    the operating system the ability to
  • 00:11:42
    connect to or receive a remote desktop
  • 00:11:45
    session
  • 00:11:46
    rdp can be used to take over and control
  • 00:11:48
    an entire system or just to run a single
  • 00:11:51
    application from that server although
  • 00:11:54
    you'll find servers running rdp almost
  • 00:11:56
    exclusively on windows there are clients
  • 00:11:58
    that you can run on almost any operating
  • 00:12:01
    system so if you're running linux macos
  • 00:12:04
    android or any other operating system
  • 00:12:06
    there's probably an application you can
  • 00:12:08
    load that will allow you to connect to a
  • 00:12:10
    windows device using the remote desktop
  • 00:12:12
    protocol
标签
  • numéros de port
  • protocoles
  • FTP
  • SSH
  • SMTP
  • DNS
  • DHCP
  • HTTP
  • SMTP
  • RDP