apops - Fotolia
Companies use various ports for various reasons. For a VoIP setup, Port 9875 is registered with the Internet Assigned Numbers Authority for Session Announcement Protocol. Session announcements are used to define the format and describe the information that will be exchanged on a multicast conferencing session. The VoIP system traffic directed to this port will communicate the start and stop of a session if this is the port your system expects. Port 9875 uses the IP network standard Transmission Control Protocol, which guarantees the delivery of data packets in the order in which they were sent.
With that said, some ports are a bit more notorious for being exploited than others. Port 9875 in particular has the ominous distinction of being known as the Portal of Doom in some circles because the Portal of Doom Trojan can use this port to communicate and give an attacker control of a system. This port is also used to create and break down IP sessions. VMware uses Port 9875 to dynamically create sessions for the vSphere Web Client Java Management Extension and is acquired upon starting the vSphere Web Client service.
It is always important to determine what ports are required for various applications before you just block them off for security reasons. You can search the port number online and find the IP ports. Just make sure you read a few answers to determine which is active on your network before taking action in your firewall.
Do you have a question for Carrie Higbie or any of our experts? Ask your enterprise-specific questions today! (All questions are treated anonymously.)
Protecting networks and ports from intrusion
Six steps to avoid security risks on a VoIP setup
Dig Deeper on IP Telephony Systems
Related Q&A from Carrie Higbie Goetz
An unguarded VoIP system could be vulnerable to attack. Learn what security measures can help prevent VoIP security threats from affecting your ... Continue Reading
Traditional and cloud SIP trunking perform the same tasks of initiating and ending call sessions, but the method and costs of access create distinct ... Continue Reading
The rules around E911 location tracking have evolved as more businesses move away from traditional wired connections to VoIP. Here's how to stay ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.