Port 4443 (HTTPS Alternate)
TCPAlternate HTTPS port — commonly used by VPN gateways, web apps, and development servers.
What is Port 4443?
Port 4443 is one of the most widely used alternate HTTPS ports. When the standard HTTPS port 443 is already occupied by a primary web server, services bind to 4443 instead. It carries the same TLS-encrypted traffic as port 443 but on a non-standard number.
Unlike port 443, which is officially assigned by IANA for HTTPS, port 4443 is an unregistered port in the dynamic/private range. This means no central authority governs its use, and different vendors have adopted it independently for their own products. The port number 4443 was likely chosen because it visually resembles 443, making it easy to remember as an "alternate HTTPS" port.
Common services on port 4443 include Fortinet FortiGate SSL VPN, Cisco AnyConnect, Kubernetes API server (via --secure-port), Apache/Nginx alternate HTTPS virtual hosts, Docker registries, and local development servers (e.g., webpack-dev-server, Vite).
Because port 4443 is not a well-known IANA port, corporate firewalls and browser security policies may block it by default. Always verify that your firewall rules explicitly allow 4443 and that a valid TLS certificate is configured for the service.
Port 4443 vs Port 443: Key Differences
| Feature | Port 443 | Port 4443 |
|---|---|---|
| IANA Status | Officially assigned (HTTPS) | Unregistered / unofficial |
| Browser Behavior | Default HTTPS port (no port in URL) | Must specify in URL (https://host:4443) |
| Firewall Default | Usually open | Usually blocked |
| Protocol | TCP (TLS/SSL) | TCP (TLS/SSL) |
| Root Privilege | Required on Linux (port < 1024) | Not required (port > 1024) |
One practical advantage of port 4443 is that it does not require root or administrator privileges to bind on Linux/Unix systems, since ports above 1024 are unprivileged. This makes it a popular choice for development servers and containerized applications running as non-root users.
Common Uses of Port 4443
VPN Gateways: Fortinet FortiGate uses port 4443 as its default SSL VPN portal. Administrators access the FortiGate web interface on port 443, while remote VPN users connect through port 4443. Cisco AnyConnect and Palo Alto GlobalProtect can also be configured to use 4443 as an alternate VPN endpoint.
Kubernetes: The Kubernetes API server accepts the --secure-port flag, and some clusters use 4443 instead of the default 6443. This is common in lightweight distributions like K3s or when running multiple control planes on the same host.
Web Application Firewalls (WAF): Products like F5 BIG-IP and Citrix ADC often place their management interfaces on port 4443, keeping port 443 free for the proxied application traffic.
Development Servers: Tools like webpack-dev-server, Vite, and Angular CLI can serve on port 4443 for local HTTPS testing. This avoids conflicts with any production web server already bound to port 443.
Pharos Blueprint: Pharos print management software uses port 4443 for its secure web interface by default. The Pharos Blueprint server listens on 4443 for TLS-encrypted communication between print stations and the management console.
Docker & Container Registries: Private Docker registries and Harbor instances frequently use port 4443 or 5000 for TLS-secured image pulls and pushes.
Port 4443 Security Best Practices
Any service on port 4443 should use a valid TLS certificate (not self-signed in production) and enforce TLS 1.2 or higher. Disable older protocols like TLS 1.0 and 1.1, as well as weak cipher suites (RC4, 3DES, export ciphers). Use certificates from a trusted CA or Let's Encrypt for publicly accessible services.
Restrict access with firewall rules so only trusted IP ranges or VPN clients can reach the port. On Linux, use iptables or nftables; on cloud platforms, use security groups or network ACLs. If the service is a VPN gateway, enable multi-factor authentication (MFA).
Monitoring: Regularly audit access logs for brute-force attempts, certificate errors, and unexpected source IPs. Set up alerts for high connection rates, which may indicate scanning or DDoS activity. Tools like fail2ban can automatically block offending IPs.
Patching: Keep the software listening on 4443 up to date. VPN gateways and web servers are frequent targets for CVE exploits. Subscribe to vendor security advisories and apply patches promptly.
How to Check Port 4443
Remote Scanning
To check if port 4443 is open on a remote host:
- nmap:
nmap -p 4443 hostname— basic open/closed check - nmap service detection:
nmap -sV -p 4443 hostname— identifies the service and version - netcat:
nc -zv hostname 4443— quick TCP connection test - curl:
curl -Iv https://hostname:4443— test HTTPS and view certificate info - PowerShell:
Test-NetConnection -ComputerName hostname -Port 4443
Local Listening Check
To check if port 4443 is listening on your local machine:
- Linux:
ss -tlnp | grep 4443ornetstat -tlnp | grep 4443 - macOS:
lsof -i :4443 - Windows:
netstat -an | findstr 4443
You can also use our Port Scanner tool to check port 4443 on any host directly from your browser.
Configuring Port 4443
Nginx
To configure Nginx to listen on port 4443 with TLS:
server {
listen 4443 ssl;
server_name example.com;
ssl_certificate /etc/ssl/certs/example.crt;
ssl_certificate_key /etc/ssl/private/example.key;
ssl_protocols TLSv1.2 TLSv1.3;
}
Apache
For Apache, add a VirtualHost on port 4443:
Listen 4443
<VirtualHost *:4443>
SSLEngine on
SSLCertificateFile /etc/ssl/certs/example.crt
SSLCertificateKeyFile /etc/ssl/private/example.key
DocumentRoot /var/www/html
</VirtualHost>
Firewall Rules
Allow port 4443 through common firewalls:
- iptables:
iptables -A INPUT -p tcp --dport 4443 -j ACCEPT - UFW:
ufw allow 4443/tcp - firewalld:
firewall-cmd --permanent --add-port=4443/tcp - Windows:
netsh advfirewall firewall add rule name="Port 4443" dir=in action=allow protocol=tcp localport=4443
Troubleshooting Port 4443
Connection refused: No service is listening on port 4443. Verify the service is running and configured to bind to the correct interface and port. Check with ss -tlnp | grep 4443.
Connection timeout: A firewall is blocking the port. Check iptables/security group rules. If behind NAT, ensure port forwarding is configured for 4443.
SSL/TLS certificate errors: The certificate may be self-signed, expired, or issued for a different hostname. Use openssl s_client -connect hostname:4443 to inspect the certificate chain.
Port already in use: Another process is bound to 4443. Find it with ss -tlnp | grep 4443 (Linux) or netstat -an | findstr 4443 (Windows), then stop the conflicting service or choose a different port.
Related Ports
Frequently Asked Questions
What is port 4443 used for?
What is the difference between port 4443 and port 443?
Which services use port 4443?
Should port 4443 be open on my firewall?
How do I check if port 4443 is open?
nmap -p 4443 hostname to scan remotely, ss -tlnp | grep 4443 to check locally on Linux, lsof -i :4443 on macOS, and Test-NetConnection -ComputerName hostname -Port 4443 in Windows PowerShell. You can also use our online Port Scanner tool.How do I configure Nginx to use port 4443?
listen 4443 ssl; to your server block along with ssl_certificate and ssl_certificate_key directives pointing to your TLS certificate files. Ensure ssl_protocols TLSv1.2 TLSv1.3; is set and open port 4443 in your firewall.Is port 4443 secure?
🔍 Check Your IP Address
While you're here, find out your public IP address, location, and ISP details instantly.
Check My IP →