Companies use various ports for various reasons. For a VoIP setup, Port 9875 is registered with the Internet Assigned...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Numbers Authority for Session Announcement Protocol. Session announcements are used to define the format and describe the information that will be exchanged on a multicast conferencing session. The VoIP system traffic directed to this port will communicate the start and stop of a session if this is the port your system expects. Port 9875 uses the IP network standard Transmission Control Protocol, which guarantees the delivery of data packets in the order in which they were sent.
With that said, some ports are a bit more notorious for being exploited than others. Port 9875 in particular has the ominous distinction of being known as the Portal of Doom in some circles because the Portal of Doom Trojan can use this port to communicate and give an attacker control of a system. This port is also used to create and break down IP sessions. VMware uses Port 9875 to dynamically create sessions for the vSphere Web Client Java Management Extension and is acquired upon starting the vSphere Web Client service.
It is always important to determine what ports are required for various applications before you just block them off for security reasons. You can search the port number online and find the IP ports. Just make sure you read a few answers to determine which is active on your network before taking action in your firewall.
Do you have a question for Carrie Higbie or any of our experts? Ask your enterprise-specific questions today! (All questions are treated anonymously.)
Protecting networks and ports from intrusion
Six steps to avoid security risks on a VoIP setup
Dig Deeper on IP Telephony Systems
Related Q&A from Carrie Higbie Goetz
Organizations need to consider several factors when debating using on-premises or cloud video conferencing. Learn how to evaluate the deployment ...continue reading
Several factors are involved when adopting cloud-based UC. Networking expert Carrie Higbie Goetz breaks down what organizations must include in their...continue reading
VoIP service providers have specific guidelines to meet to ensure E911 services are properly configured and meet regulatory standards. Learn how to ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.