This commit is contained in:
Zhang Huangbin 2016-04-25 10:23:00 +08:00
parent 263ecf3956
commit 4ac664bb79
2 changed files with 37 additions and 37 deletions

View File

@ -2,13 +2,6 @@
[TOC] [TOC]
## Web server (Apache or Nginx)
* 80: normal web service port
* 443: HTTPS (http over SSL, secure connection)
SOGo groupware provides Exchange ActiveSync (EAS) support through port 443.
## SMTP (Postfix) ## SMTP (Postfix)
* 25: normal smtp port, used for server-to-server communication. * 25: normal smtp port, used for server-to-server communication.
@ -16,6 +9,21 @@ SOGo groupware provides Exchange ActiveSync (EAS) support through port 443.
* 465: smtps (SMTP over SSL). Deprecated, and disabled by default, please use * 465: smtps (SMTP over SSL). Deprecated, and disabled by default, please use
port 587 instead. port 587 instead.
## POP3/IMAP (Dovecot)
* 110: POP3 service, insecure connection. Supports STARTTLS for secure connection.
* 995: POP3S (Secure POP3 over SSL). Deprecated, recommended to use port 110 with STARTTLS.
* 143: IMAP service, insecure connection. Supports STARTTLS for secure connection.
* 993: IMAPS (Secure IMAP over SSL). Deprecated, recommended to use port 143 with STARTTLS.
* 4190: managesieve service. (Refuse connections from external network in iptables by default). Note: in old iRedMail releases, it's port 2000, it's deprecated and not even listed in `/etc/services` file.
## Web server (Apache or Nginx)
* 80: normal web service port
* 443: HTTPS (http over SSL, secure connection)
SOGo groupware provides Exchange ActiveSync (EAS) support through port 443.
## MySQL ## MySQL
* 3306: default listen port. Listening on IP address `127.0.0.1` by default. * 3306: default listen port. Listening on IP address `127.0.0.1` by default.
@ -33,14 +41,6 @@ SOGo groupware provides Exchange ActiveSync (EAS) support through port 443.
Listening on all available network interfaces by default, but access from Listening on all available network interfaces by default, but access from
external network is blocked by firewall (iptables, pf). external network is blocked by firewall (iptables, pf).
## POP3/IMAP (Dovecot)
* 110: POP3 service, insecure connection. Supports STARTTLS for secure connection.
* 995: POP3S (Secure POP3 over SSL). Deprecated, recommended to use port 110 with STARTTLS.
* 143: IMAP service, insecure connection. Supports STARTTLS for secure connection.
* 993: IMAPS (Secure IMAP over SSL). Deprecated, recommended to use port 143 with STARTTLS.
* 4190: managesieve service. (Refuse connections from external network in iptables by default). Note: in old iRedMail releases, it's port 2000, it's deprecated and not even listed in `/etc/services` file.
## Amavisd-new ## Amavisd-new
* 10024: port used for inbound messages, includes spam/virus scanning, DKIM * 10024: port used for inbound messages, includes spam/virus scanning, DKIM
@ -58,9 +58,9 @@ All ports are listening on `127.0.0.1` by default.
## Policyd or Cluebringer (Postfix policy server) ## Policyd or Cluebringer (Postfix policy server)
* 10031: default listen port. Listening on IP address `127.0.0.1` by default.
!!! note !!! note
Policyd and Cluebringer were removed since iRedMail-0.9.3, they're replaced Policyd and Cluebringer were removed since iRedMail-0.9.3, they're replaced
by iRedAPD. by iRedAPD.
* 10031: default listen port. Listening on IP address `127.0.0.1` by default.

View File

@ -18,12 +18,12 @@
<div class="toc"> <div class="toc">
<ul> <ul>
<li><a href="#which-network-ports-are-open-by-iredmail">Which network ports are open by iRedMail</a><ul> <li><a href="#which-network-ports-are-open-by-iredmail">Which network ports are open by iRedMail</a><ul>
<li><a href="#web-server-apache-or-nginx">Web server (Apache or Nginx)</a></li>
<li><a href="#smtp-postfix">SMTP (Postfix)</a></li> <li><a href="#smtp-postfix">SMTP (Postfix)</a></li>
<li><a href="#pop3imap-dovecot">POP3/IMAP (Dovecot)</a></li>
<li><a href="#web-server-apache-or-nginx">Web server (Apache or Nginx)</a></li>
<li><a href="#mysql">MySQL</a></li> <li><a href="#mysql">MySQL</a></li>
<li><a href="#postgresql">PostgreSQL</a></li> <li><a href="#postgresql">PostgreSQL</a></li>
<li><a href="#openldap">OpenLDAP</a></li> <li><a href="#openldap">OpenLDAP</a></li>
<li><a href="#pop3imap-dovecot">POP3/IMAP (Dovecot)</a></li>
<li><a href="#amavisd-new">Amavisd-new</a></li> <li><a href="#amavisd-new">Amavisd-new</a></li>
<li><a href="#iredapd-postfix-policy-server">iRedAPD (Postfix policy server)</a></li> <li><a href="#iredapd-postfix-policy-server">iRedAPD (Postfix policy server)</a></li>
<li><a href="#policyd-or-cluebringer-postfix-policy-server">Policyd or Cluebringer (Postfix policy server)</a></li> <li><a href="#policyd-or-cluebringer-postfix-policy-server">Policyd or Cluebringer (Postfix policy server)</a></li>
@ -31,12 +31,6 @@
</li> </li>
</ul> </ul>
</div> </div>
<h2 id="web-server-apache-or-nginx">Web server (Apache or Nginx)</h2>
<ul>
<li>80: normal web service port</li>
<li>443: HTTPS (http over SSL, secure connection)</li>
</ul>
<p>SOGo groupware provides Exchange ActiveSync (EAS) support through port 443.</p>
<h2 id="smtp-postfix">SMTP (Postfix)</h2> <h2 id="smtp-postfix">SMTP (Postfix)</h2>
<ul> <ul>
<li>25: normal smtp port, used for server-to-server communication.</li> <li>25: normal smtp port, used for server-to-server communication.</li>
@ -44,6 +38,20 @@
<li>465: smtps (SMTP over SSL). Deprecated, and disabled by default, please use <li>465: smtps (SMTP over SSL). Deprecated, and disabled by default, please use
port 587 instead.</li> port 587 instead.</li>
</ul> </ul>
<h2 id="pop3imap-dovecot">POP3/IMAP (Dovecot)</h2>
<ul>
<li>110: POP3 service, insecure connection. Supports STARTTLS for secure connection.</li>
<li>995: POP3S (Secure POP3 over SSL). Deprecated, recommended to use port 110 with STARTTLS.</li>
<li>143: IMAP service, insecure connection. Supports STARTTLS for secure connection.</li>
<li>993: IMAPS (Secure IMAP over SSL). Deprecated, recommended to use port 143 with STARTTLS.</li>
<li>4190: managesieve service. (Refuse connections from external network in iptables by default). Note: in old iRedMail releases, it's port 2000, it's deprecated and not even listed in <code>/etc/services</code> file.</li>
</ul>
<h2 id="web-server-apache-or-nginx">Web server (Apache or Nginx)</h2>
<ul>
<li>80: normal web service port</li>
<li>443: HTTPS (http over SSL, secure connection)</li>
</ul>
<p>SOGo groupware provides Exchange ActiveSync (EAS) support through port 443.</p>
<h2 id="mysql">MySQL</h2> <h2 id="mysql">MySQL</h2>
<ul> <ul>
<li>3306: default listen port. Listening on IP address <code>127.0.0.1</code> by default.</li> <li>3306: default listen port. Listening on IP address <code>127.0.0.1</code> by default.</li>
@ -60,14 +68,6 @@
</ul> </ul>
<p>Listening on all available network interfaces by default, but access from <p>Listening on all available network interfaces by default, but access from
external network is blocked by firewall (iptables, pf).</p> external network is blocked by firewall (iptables, pf).</p>
<h2 id="pop3imap-dovecot">POP3/IMAP (Dovecot)</h2>
<ul>
<li>110: POP3 service, insecure connection. Supports STARTTLS for secure connection.</li>
<li>995: POP3S (Secure POP3 over SSL). Deprecated, recommended to use port 110 with STARTTLS.</li>
<li>143: IMAP service, insecure connection. Supports STARTTLS for secure connection.</li>
<li>993: IMAPS (Secure IMAP over SSL). Deprecated, recommended to use port 143 with STARTTLS.</li>
<li>4190: managesieve service. (Refuse connections from external network in iptables by default). Note: in old iRedMail releases, it's port 2000, it's deprecated and not even listed in <code>/etc/services</code> file.</li>
</ul>
<h2 id="amavisd-new">Amavisd-new</h2> <h2 id="amavisd-new">Amavisd-new</h2>
<ul> <ul>
<li>10024: port used for inbound messages, includes spam/virus scanning, DKIM <li>10024: port used for inbound messages, includes spam/virus scanning, DKIM
@ -83,14 +83,14 @@ external network is blocked by firewall (iptables, pf).</p>
offers greylisting, whitelisting, blacklists, throttling, and other features.</li> offers greylisting, whitelisting, blacklists, throttling, and other features.</li>
</ul> </ul>
<h2 id="policyd-or-cluebringer-postfix-policy-server">Policyd or Cluebringer (Postfix policy server)</h2> <h2 id="policyd-or-cluebringer-postfix-policy-server">Policyd or Cluebringer (Postfix policy server)</h2>
<ul>
<li>10031: default listen port. Listening on IP address <code>127.0.0.1</code> by default.</li>
</ul>
<div class="admonition note"> <div class="admonition note">
<p class="admonition-title">Note</p> <p class="admonition-title">Note</p>
<p>Policyd and Cluebringer were removed since iRedMail-0.9.3, they're replaced <p>Policyd and Cluebringer were removed since iRedMail-0.9.3, they're replaced
by iRedAPD.</p> by iRedAPD.</p>
</div><p style="text-align: center; color: grey;">All documents are available in <a href="https://bitbucket.org/zhb/iredmail-docs/src">BitBucket repository</a>, and published under <a href="http://creativecommons.org/licenses/by-nd/3.0/us/" target="_blank">Creative Commons</a> license. If you found something wrong, please do <a href="http://www.iredmail.org/contact.html">contact us</a> to fix it.<script> </div>
<ul>
<li>10031: default listen port. Listening on IP address <code>127.0.0.1</code> by default.</li>
</ul><p style="text-align: center; color: grey;">All documents are available in <a href="https://bitbucket.org/zhb/iredmail-docs/src">BitBucket repository</a>, and published under <a href="http://creativecommons.org/licenses/by-nd/3.0/us/" target="_blank">Creative Commons</a> license. If you found something wrong, please do <a href="http://www.iredmail.org/contact.html">contact us</a> to fix it.<script>
(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){
(i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),
m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)