Companies use various ports for various reasons. For a VoIP setup, Port 9875 is registered with the Internet Assigned...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Numbers Authority for Session Announcement Protocol. Session announcements are used to define the format and describe the information that will be exchanged on a multicast conferencing session. The VoIP system traffic directed to this port will communicate the start and stop of a session if this is the port your system expects. Port 9875 uses the IP network standard Transmission Control Protocol, which guarantees the delivery of data packets in the order in which they were sent.
With that said, some ports are a bit more notorious for being exploited than others. Port 9875 in particular has the ominous distinction of being known as the Portal of Doom in some circles because the Portal of Doom Trojan can use this port to communicate and give an attacker control of a system. This port is also used to create and break down IP sessions. VMware uses Port 9875 to dynamically create sessions for the vSphere Web Client Java Management Extension and is acquired upon starting the vSphere Web Client service.
It is always important to determine what ports are required for various applications before you just block them off for security reasons. You can search the port number online and find the IP ports. Just make sure you read a few answers to determine which is active on your network before taking action in your firewall.
Do you have a question for Carrie Higbie or any of our experts? Ask your enterprise-specific questions today! (All questions are treated anonymously.)
Protecting networks and ports from intrusion
Six steps to avoid security risks on a VoIP setup
Dig Deeper on IP Telephony Systems
Related Q&A from Carrie Higbie Goetz
The next generation of wireless broadband, 5G, promises faster speeds and better coverage than current wireless technology. New mobile UC features ...continue reading
Preparing a request-for-proposal document for a potential UC cloud service requires several elements. Learn how to craft a thorough RFP to meet your ...continue reading
Security is a priority when moving communications to the cloud. Organizations must do their due diligence when evaluating cloud providers' UC ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.