← Back to all network ports
TCP
Safe

636 LDAPS

LDAPS protects directory queries and authentication traffic with TLS from connection start.

Security Context

Port 636 is commonly expected on managed infrastructure, but it still needs scoped exposure, TLS where applicable, and service-specific hardening.

Nmap Check

Use a version probe first so you confirm whether the expected service is really what is listening on this port.

nmap -sV -p 636 <host>

Firewall Commands

UFW
sudo ufw allow 636/tcp
iptables
sudo iptables -A INPUT -p tcp --dport 636 -j ACCEPT

Related TCP Ports