TCP 179
Synopsis
- TCP port 179 is used by the Border Gateway Protocol (BGP) for establishing and maintaining peering sessions.
- It’s used on routers and network OSes such as Cisco IOS/IOS-XE/IOS-XR and NX-OS, Juniper Junos, Arista EOS, Nokia SR OS, Huawei VRP, MikroTik RouterOS, and Ubiquiti EdgeOS.
- Open-source routing stacks using TCP 179 include FRRouting (FRR), BIRD, OpenBGPD, Quagga (legacy), GoBGP, and ExaBGP.
- Cloud networking services use BGP over 179 for dynamic routing: AWS Direct Connect and Site-to-Site VPN, Azure VPN Gateway/ExpressRoute, and Google Cloud Router/Interconnect.
- Enterprise firewalls and SD-WAN platforms use BGP on 179: Palo Alto Networks PAN-OS, Fortinet FortiOS, Check Point Gaia, Cisco Meraki MX (in concentrator mode with DC BGP), Cisco Viptela SD-WAN, VMware SD-WAN (VeloCloud), and Versa.
- Internet route collectors and looking glasses (e.g., RIPE RIS and University of Oregon Route Views) peer via TCP 179 to gather global routing data.
- Many ISPs and CDNs (e.g., Akamai, Cloudflare, Lumen) run BGP on 179 across their edge routers for interdomain routing and anycast.
- BGP over 179 is also used in data center fabrics (e.g., EVPN/VXLAN deployments) on platforms like Arista EOS, Cisco NX-OS, and Juniper Junos.
- Security note: Port 179 is a target for BGP hijacking/route leaks and TCP session attacks (RST injection/hijack) that can reroute traffic; operators mitigate with strict prefix filters, MD5/TCP-AO, TTL security, and RPKI validation.
Observed activity
Last 30 days
Detailed chart