This article details the default ports the PGP Encryption Server (Symantec Encryption Management Server) may be using on applicable services being used.
This includes the ports the PGP Encryption Server utilizes for its various services and functionality.
| 21 | FTP |
This is available for PGP Backups (Backups are encrypted locally before transmitting) |
| 22 | SSH |
This is for access to the PGP Encryption server command line and accessible for only SuperUser Administrators. |
| 25 | SMTP |
This port is available for use for all SMTP activities, even STARTTLS if configured for this port. |
| 53 | DNS |
DNS |
| 80 | HTTP |
This port is no longer recommended for general use. HTTPS is preferred although port 80 can be used for Verified Directory, which services public keys only. |
| 123 | NTP |
Network Time Protocol |
| 443 | HTTPS |
Used for Encryption Desktop and Web Email Protection access. |
| 389 | LDAP | Used to allow remote hosts to look up public keys of local users. This is a general keyserver services and services public keys only. We do not recommend using LDAP for Directory Synchronization, instead, LDAPS for secure TLS is recommended. |
| 636 | LDAPS | Used to securely allow remote hosts to look up public keys of local users. This is also used for Directory Synchronization for the PGP Encryption server. |
| 444 | SOAPS | Used for clustering replication messages. |
| 9000 | HTTPS | Allows Access to the PGP Encryption Server Administrative interface. |
Network reviews are commonly done and sometimes things change in the network that are not communicated back to the PGP admin.
Important Note: If there are ports that you do not want available to the outside world, use a firewall to block connections to the PGP Servers on those ports.
The best rule of thumb is to allow only those ports needed, and everything else should be blocked. Services not in use should generally be disabled.
For further guidance, reach out to Symantec Encryption Support.