Ports
Client systems communicate with the net daemon servants of the I2A2 data base managers (DBMs) via the TCP/IP protocol a
six well-known ports. The ports have names and numbers that are published by the Purdue IT Telecommunications group in the
services file.
Each DBM has two well-known ports: one for plain text connections; and a second for connections via the Secure Socket Layer
(SSL) protocol.
The plain text port can be used when no secret information passes between the client host and the DBM's daemon. When secret
information must be exchanged, the SSL port must be used.
Restrictions
Here are the I2A2 entries of the IT Telecommunications services file:
Service Name | Port Number | Description |
authc | 1561 | Plain text access to the authenticator DBM |
authcs | 1562 | SSL access to the authenticator DBM |
authz | 1563 | Plain text access to the authorizer DBM |
authzs | 1564 | SSL access to the authorizer DBM |
refl | 1565 | Plain text access to the reflector DBM |
refls | 1566 | SSL access to the reflector DBM |