
There is an IP range for available IP addresses similarly, between the User Datagram Protocol (UDP) ports and Transmission Control Protocol (TCP) ports, there are 65,536 ports open for communication. Ports are all assigned a number and standardized across all network devices. Hypothetically, for example, if you wanted to enable remote desktop on a Windows PC within your network, you'd need to make sure port 3389 was open and forwarding to the appropriate computer. Therefore, computers are able to distinguish between different kinds of traffic. They are software-based, each uniquely associated with a specific process or service.

Network ports are used for routing incoming information from a network to specific applications to a designated machine. What is a port?Ī port, referred to as a server port or Internet port, is a virtual point of network connection. Scan your network for open ports and determine if those open ports need to be closed to provide more network security and less vulnerabilities. Using both scanners and Nipper will help you achieve a much higher level of security than using scanning tools alone.The advanced port scanner tool will provide you with information regarding valid methods of connecting to a network. Because our software analyses the actual configuration file, audits can be run with minimal contact with the device, therefore leaving a small footprint. Using virtual modeling technology, Nipper identifies any vulnerabilities in the settings and rule interactions and delivers a detailed and actionable report within minutes. how devices will actually respond to any query or intelligent security scenario.


In contrast, Nipper analyses the configuration of firewalls, switches and routers ie. They look at external data (results from attacks).

Scanners act as an attacker would, running attacks on devices and extrapolating weaknesses based on the results.
