You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| 49679 |`ncacn_ip_tcp`|[\[MS-RAA\]: Remote Authorization API Protocol](https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-raa/98ab2e01-da37-4e76-bea5-8d4d83e66e1a)|
1275
1270
1276
1271
These ports are allowed by the built-in [Active Directory Domain Controller (RPC)](#active-directory-domain-controller-rpc) rule.
1277
1272
The respective protocols are exposed through the `ncacn_np` RPC transport as well.
1278
-
As a matter of fact, Windows client components seem to be using the `\PIPE\lsass` named pipe exclusively when communicating over these RPC protocols.
1279
-
Consequently, the RPC dynamic port range (`49152/TCP` to `65535/TCP`) on domain controllers does not need to be accessible by member computers for AD to work properly. We therefore typically block this port range on firewall appliances.
1273
+
As a matter of fact, Windows client components seem to be using the `\PIPE\lsass` named pipe exclusively
1274
+
when communicating over these RPC protocols.
1275
+
Consequently, the RPC dynamic port range (`49152/TCP` to `65535/TCP`) on domain controllers
1276
+
does not need to be accessible by member computers for AD to work properly.
1277
+
We therefore typically block this port range on firewall appliances.
1280
1278
1281
1279
A UDP port scan should yield far less interesting results:
0 commit comments