Skip to content

Commit 5e37c54

Browse files
committed
add file
1 parent 3d65e5d commit 5e37c54

1 file changed

Lines changed: 98 additions & 0 deletions

File tree

Lines changed: 98 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,98 @@
1+
---
2+
title: 'RDS 2012: Which ports are used during deployment?'
3+
TOCTitle: 'RDS 2012: Which ports are used during deployment?'
4+
ms.date: 12/21/2023 2:12:22 AM
5+
ms:mtpsurl: https://social.technet.microsoft.com/wiki/contents/articles/16164.rds-2012-which-ports-are-used-during-deployment.aspx
6+
_tocRel: toc.json
7+
author: Archiveddocs
8+
ms.author: Archiveddocs
9+
---
10+
# RDS 2012: Which ports are used during deployment?
11+
12+
To configure Remote Desktop Services correctly for internet access or any time where firewalls are used, it is useful to know what ports are required.
13+
14+
The information / taxonomy is broken down by role service/component, and lists all inbound/outbound ports used.
15+
16+
## From Client to RD Resource
17+
18+
- If using RDWeb
19+
- TCP 443 (HTTPS)
20+
- TCP|UDP 3389:  Standard RDP port. Can be configured on host and client to a different port number.
21+
22+
## Remote Desktop Connection Broker (RDCB)
23+
24+
- TCP 5504: connection to RD Web Access
25+
- TCP 3389: connection to RD Session Host
26+
- TCP 3389: connection to non-managed VM pools, managed machines use VMBus to open port.
27+
- TCP 3389: client port for clients not using RD Gateway
28+
- TCP 445|RPC: connection to RD Virtualization Host
29+
- TCP 445|RPC: connection to RD Session Host
30+
- TCP 5985: WMI and PowerShell Remoting for administration
31+
32+
## Remote Desktop Gateway
33+
34+
- For inbound external internet based traffic from RD Clients to the Gateway:
35+
- TCP 443:  HTTP (includes RPC over HTTP) over SSL - (configurable using RD Gateway Management console)
36+
- UDP 3391:  RDP/UDP (configurable using RD Gateway Management console) (NOTE: Firewalls that have directional UDP analysis, such as TMG, require UDP "Send Receive"  configured)
37+
- For internal traffic between the Gateway and the required User AD, Resource AD, DNS, NPS etc:
38+
- TCP 88: Kerberos for user authentication
39+
- TCP 135: RPC Endpoint Mapper
40+
- TCP: \<\>, Port on which NTDS RPC services listens on AD
41+
- TCP|UDP 389:  LDAP for user authentication
42+
- TCP|UDP 53: Internal resource name resolution, DNS
43+
- TCP|UDP 389: If using LDAP for Certificate Revocation List (CRL)  
44+
- TCP 80:  If using HTTP for Certificate Revocation List (CRL)  
45+
- TCP 21:  If using FTP for Certificate Revocation List (CRL)  
46+
- UDP 1812, 1813: If NPS Server is being used
47+
- TCP 5985: WMI and PowerShell Remoting for administration
48+
- For internal traffic from the Gateway and the Internal Remote Desktop resources
49+
- TCP|UDP 3389: RDP (NOTE: Firewalls that have directional UDP analysis, such as TMG, require UDP "Send Receive" configured in the UDP protocol)
50+
51+
## Remote Desktop Web Access
52+
53+
- If RD Web Access is on a perimeter network
54+
- TCP: \<WMI Fixed Port\>
55+
- TCP 5504: connection to RD Connection Broker for centralized publishing
56+
- TCP 5985: WMI and PowerShell Remoting for administration
57+
58+
<!-- -->
59+
60+
- If ISA is used, please refer to  <http://www.isaserver.org/articles/2004perimeterdomain.html>
61+
62+
## Remote Desktop Session Host
63+
64+
- RD License Server Port RPC
65+
- TCP 389|636: Active Directory communication
66+
- TCP 5985: WMI and PowerShell Remoting for administration
67+
68+
## Remote Desktop Virtualization Host
69+
70+
- RD License Server Port RPC
71+
- TCP 389|636: Active Directory communication
72+
- TCP 5985: WMI and PowerShell Remoting for administration
73+
74+
## Remote Desktop Licensing Server
75+
76+
Information for Terminal Server in Windows Server 2008 is at <http://support.microsoft.com/KB/832017#method26>  The ports used have not changed in Windows Server 2012 | R2.  The summary follows.
77+
78+
### TCP
79+
80+
- TCP 135 - RPC  for License Server communication and RDSH
81+
- TCP 1024-65535 (randomly allocated)  Used for RPC For Windows Server pre-2008 (see next line).
82+
- TCP 49152 - 65535 (randomly allocated) -  This is the range in Windows Server 2012,  Windows Server 2008 R2, Windows Server 2008
83+
- TCP 445 - SMB
84+
- TCP 443: Communication over the internet to the Microsoft Clearing House
85+
- TCP 5985: WMI and PowerShell Remoting for administration
86+
- TCP 139 - NetBIOS session service
87+
88+
How to configure which ports (if need to set to specifics) <http://support.microsoft.com/kb/154596/>
89+
90+
### NetBIOS
91+
92+
- UDP 137 - NetBIOS Name resolution
93+
- UDP 138 - NetBIOS datagram
94+
- UDP|TCP 389   LDAP - Used with per-user CALs against Active Directory
95+
96+
From a proxy standpoint, the regkey HKLM\Software\Microsoft\TermServLicensing\lrwiz\Params shows the Microsoft service that the RD LS communicates with.  e.g. clearinghouse.one.microsoft.com
97+
98+
 

0 commit comments

Comments
 (0)