Client and server port identity

4.9 Interpret common artifact elements from an event to identify an alert

📘Cisco Certified CyberOps Associate (200-201 CBROPS)


1. What is a port?

  • A port is like a door on a computer that allows data to go in and out.
  • Ports are numbered from 0 to 65535.
  • Ports help identify specific services running on a device.
    • Example: A server may run a web service on port 80.

2. Client Ports vs Server Ports

In any network communication, there is a client (the one initiating the request) and a server (the one responding to the request).

AspectClient PortServer Port
DefinitionThe temporary port used by the client device to communicateThe known port where a service listens for requests
Port RangeUsually 1024–65535 (called ephemeral ports)Usually 0–1023 (called well-known ports)
Assigned ByAssigned dynamically by the client OSPredefined by the service/application
PurposeUsed to receive replies from the serverReceives requests from clients
Example49215, 5012280 (HTTP), 443 (HTTPS), 22 (SSH)

Example in IT context

Suppose a network alert shows:

Source: 10.0.0.5:53210 → Destination: 192.168.1.100:443
  • Client: 10.0.0.5 → Port 53210 (randomly assigned ephemeral port)
  • Server: 192.168.1.100 → Port 443 (HTTPS service)

This tells us:

  • The client device asked the server for a secure web connection.
  • The server responded on its standard HTTPS port.

3. Why this matters in cyber security

Knowing which port belongs to the client and which to the server helps you:

  1. Identify the type of traffic
    • Port 80 → HTTP traffic
    • Port 22 → SSH traffic
    • Port 53 → DNS traffic
  2. Detect unusual behavior
    • If a client connects to a server on a port not typically used (e.g., port 3389 for RDP on a public server), it may indicate a security alert.
  3. Analyze logs and alerts
    • Security tools like SIEMs (e.g., Splunk, QRadar) often show source and destination ports.
    • Knowing which is client vs server port allows you to understand the flow of communication.

4. How client and server ports are displayed in alerts

  • Logs usually show in the format: source_ip:source_port → destination_ip:destination_port
  • Source port → client port
  • Destination port → server port

Example alert in SIEM:

Alert: Suspicious network connection
Source IP: 10.1.1.50:49765
Destination IP: 172.16.0.25:22
  • Client port: 49765
  • Server port: 22 (SSH)
  • Interpretation: The client tried to connect to an SSH service on the server. If unexpected, this could be suspicious.

5. Port Categories

To understand port identity, you should know the types of ports:

  1. Well-known ports (0–1023)
    • Reserved for common services
    • Example: HTTP (80), HTTPS (443), DNS (53), SMTP (25)
  2. Registered ports (1024–49151)
    • Used by applications and services, but not as standard as well-known ports
    • Example: Microsoft SQL Server (1433), Oracle DB (1521)
  3. Dynamic/Ephemeral ports (49152–65535)
    • Temporary client ports
    • Example: A client device connecting to a web server on port 443 may get an ephemeral port 53215

For the exam, memorizing common well-known server ports is important because alerts often reference them.


6. How to identify client vs server in an event

  1. Look at the port numbers:
    • Ephemeral (high-numbered) → likely client
    • Well-known → likely server
  2. Look at the direction of traffic (if available):
    • The initiator of the connection is usually the client
  3. Combine IP and port knowledge:
    • Internal IP → could be client
    • Server IP → well-known port, responding to requests

7. Exam Tips

  • Know the top 10–15 server ports, e.g.:
    • 20,21 → FTP
    • 22 → SSH
    • 25 → SMTP
    • 53 → DNS
    • 80 → HTTP
    • 443 → HTTPS
    • 3389 → RDP
  • Remember: The client port is usually high-numbered and dynamic, server port is standard for service.
  • Practice reading alerts: Always identify which IP is client/server and which port belongs to whom.

8. Quick Summary

  • Ports = doors for network traffic
  • Client port = ephemeral, temporary, high-numbered, initiates requests
  • Server port = well-known, standard, listens for requests
  • Correct identification helps in alert analysis, intrusion detection, and understanding network events.
Buy Me a Coffee