CA Access Control uses the following TCP ports on UNIX by default:
|
Port Number |
Description |
Direction |
Source |
Target |
Comments |
|---|---|---|---|---|---|
|
8891 |
CA Access Control Client Applications |
Incoming |
Remote CA Access Control Utilities |
CA Access Control Agent |
You can change the default port number by modifying the /etc/services file settings. To modify the default port number, add the following line, then restart CA Access Control daemons: seoslang2 port-number/ tcp |
|
5249 |
SSL Communications |
Incoming |
Remote CA Access Control Utilities |
CA Access Control Agent |
FIPS 140-2 compliant. For more information about SSL communication, see the SSL, Authentication, and Certificates section in the Implementation Guide. |
|
8892 |
Starting seosd from a remote computer |
Incoming |
|
seosload |
When seload loads daemons on a remote computer, inetd (internet services daemon) on the remote computer executes the rseloadd program. This program executes seload locally and exits; it receives the parameters on this port. You can change the default port number by modifying the /etc/services file settings. To modify the default port number, add the following line, then restart CA Access Control daemons: seosload port-number/ tcp Note: The communication on this port is not encrypted since it does not send any sensitive information. |
|
7443 |
Reports and Audit Events |
Outgoing |
ReportAgent |
Distribution Server |
|
|
8891 |
CA Access Control Client Applications |
Outgoing |
Policyfetcher |
Distribution Server |
Distributing AC policies to endpoints through Advanced Policy Management. |
|
5249 |
SSL Communications |
Outgoing |
Policyfetcher |
Distribution Server |
Distributing AC policies to endpoints through Advanced Policy Management when SSL is enabled. |
| Copyright © 2012 CA. All rights reserved. |
|