Fortinet white logo
Fortinet white logo

Default port information

Default port information

FortiDeceptor treats Port1 as reserved for device management. The other ports are used to deploy deception decoys.

The following table list the default open ports for each FortiDeceptor interface.

FortiDeceptor 1000F default ports:

Port (Interface)

Default Open Ports

Port1

TCP ports 22 (SSH), 23 (Telnet), 80 and 443 (GUI).

FortiGuard Distribution Servers (FDS) use TCP port 8890 for download. The FortiDeceptor uses a random port picked by the kernel.

FortiGuard Web Filtering servers use UDP port 53 or 8888. The FortiDeceptor uses a random port picked up by the kernel.

FortiDeceptor deception VM download uses TCP port 443 for download. FortiDeceptor uses a random port picked by the kernel.

Port2 to Port8

In DMZ mode, no service listens. In regular mode, token communication service listens on deployment interface monitor IP with port 1443. The token communication uses HTTPS protocol.

Default port information

Default port information

FortiDeceptor treats Port1 as reserved for device management. The other ports are used to deploy deception decoys.

The following table list the default open ports for each FortiDeceptor interface.

FortiDeceptor 1000F default ports:

Port (Interface)

Default Open Ports

Port1

TCP ports 22 (SSH), 23 (Telnet), 80 and 443 (GUI).

FortiGuard Distribution Servers (FDS) use TCP port 8890 for download. The FortiDeceptor uses a random port picked by the kernel.

FortiGuard Web Filtering servers use UDP port 53 or 8888. The FortiDeceptor uses a random port picked up by the kernel.

FortiDeceptor deception VM download uses TCP port 443 for download. FortiDeceptor uses a random port picked by the kernel.

Port2 to Port8

In DMZ mode, no service listens. In regular mode, token communication service listens on deployment interface monitor IP with port 1443. The token communication uses HTTPS protocol.