Looking for information on Protocol UDP 50? This page will attempt to provide you with as much port information as possible on UDP Port 50.
UDP Port 50 may use a defined protocol to communicate depending on the application. A protocol is a set of formalized rules that explains how data is communicated over a network. Think of it as the language spoken between computers to help them communicate more efficiently.
Protocol HTTP for example defines the format for communication between internet browsers and web sites. Another example is the IMAP protocol that defines the communication between IMAP email servers and clients or finally, the SSL protocol which states the format to use for encrypted communications.
UDP Port 50
Here is what we know about protocol UDP Port 50. If you have information on UDP port 50 that is not reflected on this page, simply leave a comment and we’ll update our information.
PORT 50 – Information
- Port Number: 50
- TCP / UDP: UDP
- Delivery: No
- Protocol / Name: re-mail-ck
- Port Description: Remote Mail Checking Protocol
- Virus / Trojan: No
Tip! Use our free Digital Footprint and Firewall Test to help verify you are not infected.
Side note: UDP port 50 uses the Datagram Protocol, a communications protocol for the Internet network layer, transport layer, and session layer. This protocol when used over PORT 50 makes possible the transmission of a datagram message from one computer to an application running in another computer. Like TCP (Transmission Control Protocol), UDP is used with IP (the Internet Protocol) but unlike TCP on Port 50, UDP Port 50 is connectionless and does not guarantee reliable communication; it’s up to the application that received the message on Port 50 to process any errors and verify correct delivery.
Because protocol UDP port 50 was flagged as a virus (colored red) does not mean that a virus is using port 50, but that a Trojan or Virus has used this port in the past to communicate.
UDP 50 – Disclaimer
We do our best to provide you with accurate information on PORT 50 and work hard to keep our database up to date. This is a free service and accuracy is not guaranteed. We do our best to correct any errors and welcome feedback!
Thanks James!
The peimeter router and firewall must allow inbound protocol numbers 50 and 51 for ESP (Encapsulating Security Payload) and all (Authentication headers) encapsulated IPSec (Internet Protocol Security) traffic in addition to opening the appropriate L2TP (Layer two Tunneling Protocol) and IKE (Internet Key Exchange) transport layer ports on the perimeter router to allow AH (Authentication Header) and ESP (Encapsulating Security Payload) tunnel-encapsulatd iPSec (Internet Protocol Security) traffic to flow between a client and the firewall.