Skip to content

Commit a0bf619

Browse files
committed
aa
1 parent 5e37c54 commit a0bf619

1 file changed

Lines changed: 36 additions & 36 deletions

File tree

support/windows-server/remote/sample.md

Lines changed: 36 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -7,46 +7,52 @@ _tocRel: toc.json
77
author: Archiveddocs
88
ms.author: Archiveddocs
99
---
10-
# RDS 2012: Which ports are used during deployment?
10+
# Ports that are used by RDS
1111

12-
To configure Remote Desktop Services correctly for internet access or any time where firewalls are used, it is useful to know what ports are required.
12+
This article introduces the ports that are required to open on firewalls in order to configure Remote Desktop Services correctly.
1313

14-
The information / taxonomy is broken down by role service/component, and lists all inbound/outbound ports used.
14+
The information and taxonomy is broken down by role service and component, and lists all inbound and outbound ports used.
1515

16-
## From Client to RD Resource
16+
## From Client to Remote Desktop Resource
1717

18-
- If using RDWeb
19-
- TCP 443 (HTTPS)
20-
- TCP|UDP 3389:  Standard RDP port. Can be configured on host and client to a different port number.
18+
- TCP 443 (HTTPS) needs to be open if RDWeb is deployed.
19+
- TCP and UDP 3389:  Standard RDP port. Can be configured on host and client to a different port number.
2120

2221
## Remote Desktop Connection Broker (RDCB)
2322

2423
- TCP 5504: connection to RD Web Access
2524
- TCP 3389: connection to RD Session Host
2625
- TCP 3389: connection to non-managed VM pools, managed machines use VMBus to open port.
2726
- TCP 3389: client port for clients not using RD Gateway
28-
- TCP 445|RPC: connection to RD Virtualization Host
29-
- TCP 445|RPC: connection to RD Session Host
27+
- TCP 445 and RPC: connection to RD Virtualization Host
28+
- TCP 445 and RPC: connection to RD Session Host
3029
- TCP 5985: WMI and PowerShell Remoting for administration
3130

3231
## Remote Desktop Gateway
3332

34-
- For inbound external internet based traffic from RD Clients to the Gateway:
35-
- TCP 443:  HTTP (includes RPC over HTTP) over SSL - (configurable using RD Gateway Management console)
36-
- UDP 3391:  RDP/UDP (configurable using RD Gateway Management console) (NOTE: Firewalls that have directional UDP analysis, such as TMG, require UDP "Send Receive"  configured)
37-
- For internal traffic between the Gateway and the required User AD, Resource AD, DNS, NPS etc:
38-
- TCP 88: Kerberos for user authentication
39-
- TCP 135: RPC Endpoint Mapper
40-
- TCP: \<\>, Port on which NTDS RPC services listens on AD
41-
- TCP|UDP 389:  LDAP for user authentication
42-
- TCP|UDP 53: Internal resource name resolution, DNS
43-
- TCP|UDP 389: If using LDAP for Certificate Revocation List (CRL)  
44-
- TCP 80:  If using HTTP for Certificate Revocation List (CRL)  
45-
- TCP 21:  If using FTP for Certificate Revocation List (CRL)  
46-
- UDP 1812, 1813: If NPS Server is being used
47-
- TCP 5985: WMI and PowerShell Remoting for administration
48-
- For internal traffic from the Gateway and the Internal Remote Desktop resources
49-
- TCP|UDP 3389: RDP (NOTE: Firewalls that have directional UDP analysis, such as TMG, require UDP "Send Receive" configured in the UDP protocol)
33+
For inbound external internet based traffic from RD Clients to the Gateway:
34+
35+
- TCP 443:  HTTP (includes RPC over HTTP) over SSL - (configurable using RD Gateway Management console)
36+
- UDP 3391:  RDP/UDP (configurable using RD Gateway Management console) (NOTE: Firewalls that have directional UDP analysis, such as TMG, require UDP "Send Receive"  configured)
37+
38+
For internal traffic between the Gateway and the required User AD, Resource AD, DNS, NPS etc:
39+
40+
- TCP 88: Kerberos for user authentication
41+
- TCP 135: RPC Endpoint Mapper
42+
- TCP: 135, Port on which NTDS RPC services listens on AD
43+
- TCP and UDP 389:  LDAP for user authentication
44+
- TCP and UDP 53: Internal resource name resolution, DNS
45+
- TCP and UDP 389: If using LDAP for Certificate Revocation List (CRL)  
46+
- TCP 80:  If using HTTP for Certificate Revocation List (CRL)  
47+
- TCP 21:  If using FTP for Certificate Revocation List (CRL)  
48+
- UDP 1812, 1813: If NPS Server is being used
49+
- TCP 5985: WMI and PowerShell Remoting for administration
50+
51+
For internal traffic from the Gateway and the Internal Remote Desktop resources:
52+
53+
- TCP and UDP 3389: RDP
54+
> [!Note]
55+
> Firewalls that have directional UDP analysis, such as TMG, require UDP "Send Receive" configured in the UDP protocol
5056
5157
## Remote Desktop Web Access
5258

@@ -55,25 +61,21 @@ The information / taxonomy is broken down by role service/component, and lists a
5561
- TCP 5504: connection to RD Connection Broker for centralized publishing
5662
- TCP 5985: WMI and PowerShell Remoting for administration
5763

58-
<!-- -->
59-
60-
- If ISA is used, please refer to  <http://www.isaserver.org/articles/2004perimeterdomain.html>
61-
6264
## Remote Desktop Session Host
6365

6466
- RD License Server Port RPC
65-
- TCP 389|636: Active Directory communication
67+
- TCP 389 and 636: Active Directory communication
6668
- TCP 5985: WMI and PowerShell Remoting for administration
6769

6870
## Remote Desktop Virtualization Host
6971

7072
- RD License Server Port RPC
71-
- TCP 389|636: Active Directory communication
73+
- TCP 389 and 636: Active Directory communication
7274
- TCP 5985: WMI and PowerShell Remoting for administration
7375

7476
## Remote Desktop Licensing Server
7577

76-
Information for Terminal Server in Windows Server 2008 is at <http://support.microsoft.com/KB/832017#method26>  The ports used have not changed in Windows Server 2012 | R2.  The summary follows.
78+
For more information, see [RDS Licensing (RDSL)](../networking/service-overview-and-network-port-requirements.md#rds-licensing-rdsl).
7779

7880
### TCP
7981

@@ -85,14 +87,12 @@ Information for Terminal Server in Windows Server 2008 is at <http://support.mic
8587
- TCP 5985: WMI and PowerShell Remoting for administration
8688
- TCP 139 - NetBIOS session service
8789

88-
How to configure which ports (if need to set to specifics) <http://support.microsoft.com/kb/154596/>
90+
For more information, see [How to configure RPC dynamic port allocation to work with firewalls](../networking/configure-rpc-dynamic-port-allocation-with-firewalls.md).
8991

9092
### NetBIOS
9193

9294
- UDP 137 - NetBIOS Name resolution
9395
- UDP 138 - NetBIOS datagram
9496
- UDP|TCP 389   LDAP - Used with per-user CALs against Active Directory
9597

96-
From a proxy standpoint, the regkey HKLM\Software\Microsoft\TermServLicensing\lrwiz\Params shows the Microsoft service that the RD LS communicates with.  e.g. clearinghouse.one.microsoft.com
97-
98-
 
98+
From a proxy standpoint, the registry key `HKLM\Software\Microsoft\TermServLicensing\lrwiz\Params` shows the Microsoft service that the RD LS communicates with.

0 commit comments

Comments
 (0)