Skip to content

NKCODE TECH GEEK ZONE

  • RSS - Posts
Menu
  • Home
  • Cloud
    • Azure
    • Alibaba
    • AWS
  • Hardware
  • Linux
  • Network
  • Security
  • Windows Client / Servers
    • SQL
    • Windows Client OS
      • Windows 10
    • Windows Servers
      • Windows 2008R2
      • Windows Server 2012R2
      • Windows Server 2016
      • Windows Server 2019
  • VMWARE
  • Free Tools
  • About Me
    • Disclaimer
Menu

Which ports are used by a RDS 2012 deployment

Posted on May 18, 2017

To configure Remote Desktop Services correctly for internet access or any time where firewalls are used, it is useful to know what ports are required.  

The information / taxonomy is broken down by role service/component, and lists all inbound/outbound ports used.

  • From Client to RD Resource
    • If using RDWeb
      • TCP 443 (HTTPS)
    • TCP|UDP 3389:  Standard RDP port. Can be configured on host and client to a different port number.
  • Remote Desktop Connection Broker (RDCB)
    • TCP 5504: connection to RD Web Access
    • TCP 3389: connection to RD Session Host
    • TCP 3389: connection to non-managed VM pools, managed machines use VMBus to open port.
    • TCP 3389: client port for clients not using RD Gateway
    • TCP 445|RPC: connection to RD Virtualization Host
    • TCP 445|RPC: connection to RD Session Host
    • TCP 5985: WMI and PowerShell Remoting for administration
  • Remote Desktop Gateway
    • For inbound external internet based traffic from RD Clients to the Gateway:
      • TCP 443:  HTTP (includes RPC over HTTP) over SSL – (configurable using RD Gateway Management console)
      • UDP 3391:  RDP/UDP (configurable using RD Gateway Management console) (NOTE: Firewalls that have directional UDP analysis, such as TMG, require UDP “Send Receive”  configured)
    • For internal traffic between the Gateway and the required User AD, Resource AD, DNS, NPS etc:
      • TCP 88: Kerberos for user authentication
      • TCP 135: RPC Endpoint Mapper
      • TCP: <>, Port on which NTDS RPC services listens on AD
      • TCP|UDP 389:  LDAP for user authentication
      • TCP|UDP 53: Internal resource name resolution, DNS
      • TCP|UDP 389: If using LDAP for Certificate Revocation List (CRL)  
      • TCP 80:  If using HTTP for Certificate Revocation List (CRL)  
      • TCP 21:  If using FTP for Certificate Revocation List (CRL)  
      • UDP 1812, 1813: If NPS Server is being used
      • TCP 5985: WMI and PowerShell Remoting for administration
    • For internal traffic from the Gateway and the Internal Remote Desktop resources
      • TCP|UDP 3389: RDP (NOTE: Firewalls that have directional UDP analysis, such as TMG, require UDP “Send Receive” configured in the UDP protocol)
  • Remote Desktop Web Access
    • If RD Web Access is on perimeter network
      • TCP: <WMI Fixed Port>
      • TCP 5504: connection to RD Connection Broker for centralized publishing
      • TCP 5985: WMI and PowerShell Remoting for administration
  • Remote Desktop Session Host
    • RD License Server Port RPC
    • TCP 389|636: Active Directory communication
    • TCP 5985: WMI and PowerShell Remoting for administration
  • Remote Desktop Virtualization Host
    • RD License Server Port RPC
    • TCP 389|636: Active Directory communication
    • TCP 5985: WMI and PowerShell Remoting for administration
  • Remote Desktop Licensing Server
    • Information for Terminal Server in Windows Server 2008 is at:http://support.microsoft.com/KB/832017#method26    The ports used have not changed in Widows Server 2012 | R2.  The summary follows.

      • TCP 135 – RPC  for License Server communication and RDSH
      • TCP 1024-65535 (randomly allocated)  Used for RPC For Windows Server pre-2008 (see next line).
      • TCP 49152 – 65535 (randomly allocated) –  This is the range in Windows Server 2012,  Windows Server 2008 R2, Windows Server 2008
      • How to configure which ports (if need to set to specifics) : http://support.microsoft.com/kb/154596/  
      • UDP 137 – NetBIOS Name resolution
      • UDP 138 – NetBIOS datagram
      • TCP 139 – NetBIOS session service
      • UDP|TCP 389   LDAP – Used with per user CALs against Active Directory
      • TCP 445 – SMB
      • TCP 443: Communication over the internet to the Microsoft Clearing House
      • TCP 5985: WMI and PowerShell Remoting for administration

Share this:

  • Click to share on X (Opens in new window) X
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to email a link to a friend (Opens in new window) Email

Like this:

Like Loading...

Related

Welcome to Teck Geek Zone

Alibaba & Azure Cloud with a free trial worth $200-1200 USD Click below Cloud Providers

  • 🆚 Modern Identity Wars: Active Directory vs. Microsoft Entra ID
  • 🔷 VMware Cloud Foundation 9 (VCF 9.0): Redefining the Modern Private Cloud
  • From ARM to HCL: Exploring Azure’s New Export Template to Terraform Feature
  • 🛡️ Strengthening Your AWS Security: Best Practices Explored
  • From Backup Center to Business Continuity Center: A New Era in Azure BCDR Management

Categories

  • Cloud (178)
    • Alibaba (38)
    • AWS (36)
    • Azure (109)
  • Free Tools (5)
  • Hardware (17)
  • Linux (13)
  • Network (28)
  • Security (21)
  • VMWARE (51)
  • Windows OS (44)
    • Windows 10 (7)
  • Windows Servers (69)
    • SQL (3)
    • Windows 2008R2 (7)
    • Windows Server 2012R2 (15)
    • Windows Server 2016 (20)
    • Windows Server 2019 (10)

Subscribe to our newsletter

©2025 NKCODE TECH GEEK ZONE | Design: Newspaperly WordPress Theme
%d