This article details the default ports the PGP Encryption Server (Symantec Encryption Management Server) uses for client-server communications as well as other services included.
This includes the ports the PGP Encryption Server has open and on which it is listening.
Although these ports are open, you can close specific ports on firewalls to halt the PGP Encryption Server listening on those ports.
When you stop a particular service, the PGP Encryption server will add a firewall rule and will block any further communications.
21 | FTP |
This is available for PGP Backups (Backups are encrypted locally before transmitting) |
22 | SSH |
This is for access to the PGP Encryption server command line and accessible for only SuperUser Administrators. |
25 | SMTP |
This port is available for use for all SMTP activities, even STARTTLS if configured for this port. |
50 | DNS |
DNS |
80 | HTTP |
This port is no longer recommended for general use. HTTPS is preferred although port 80 can be used for Verified Directory, which services public keys only. |
123 | NTP |
Network Time Protocol |
443 | HTTPS |
Used for Encryption Desktop and Web Email Protection access. |
389 | LDAP | Used to allow remote hosts to look up public keys of local users. This is a general keyserver services and services public keys only. We do not recommend using LDAP for Directory Synchronization, instead, LDAPS for secure TLS is recommended. |
636 | LDAPS | Used to securely allow remote hosts to look up public keys of local users. This is also used for Directory Synchronization for the PGP Encryption server. |
444 | SOAPS | Used for clustering replication messages. |
9000 | HTTPS | Allows Access to the PGP Encryption Server Administrative interface. |
Network reviews are commonly done and sometimes things change in the network that are not communicated back to the PGP admin.
Ensure that all the ports being used for your specific activities are open, and then stop the services that are not in use for the rest.
Important Note: If there are ports that you do not want available to the outside world, use a firewall to block connections to the PGP Servers on those ports.
The best rule of thumb is to allow only those ports needed, and everything else should be blocked.
Services not in use should generally be disabled.
For further guidance, reach out to Symantec Encryption Support.