Two computers communicate over the Internet by using their IP addresses and a combination of ports. The client...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
computer (the one requesting the connection) contacts the server on a known destination port and provides the server with its own IP address and a source port that the server may use for reply traffic. All communication then takes place using those source/destination port and address combinations.
In order for the computers to communicate successfully, the server must have at least one port open to receive inbound requests. The client must then open the source port for replies from that particular system. That's simply the only way that a TCP connection can take place (UDP traffic is slightly different, but follows the same basic idea).
I suspect what the product you describe actually does is swap the client and server roles from their traditional sense. The server and client may both establish a connection to an intermediary server that routes traffic between the two. However, there's simply no way that this can be accomplished without some kind of device listening for traffic on a known port.
Dig Deeper on Network Protocols and Security
Related Q&A from Mike Chapple
It's not possible to eradicate the risk of DoS attacks, but there are steps infosec pros can take to reduce their impact. Mike Chapple shares ...continue reading
The HHS OCR ruled that healthcare ransomware attacks are HIPAA violations, so these covered entities need to react according to the HHS's guidance. ...continue reading
HIPAA regulations incorporate NIST guidelines and standards, so do healthcare organizations need to be compliant with both? Expert Mike Chapple ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.