All posts

Using SQL*Plus over Port 8443 for Secure Oracle Connections

When you see ORA-12545: Connect failed because target host or object does not exist or the SQL*Plus prompt stalls, there’s a quiet suspect: port 8443. Many engineers think about port 1521 for Oracle, but modern secure connections—especially through proxies, firewalls, or cloud deployments—often redirect SQL*Plus over 8443. Understanding why, and how to configure it, saves hours of blind debugging. Port 8443 is typically the secured HTTPS port. In some Oracle deployments, especially with Oracle

Free White Paper

VNC Secure Access + SQL Query Filtering: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

When you see ORA-12545: Connect failed because target host or object does not exist or the SQL*Plus prompt stalls, there’s a quiet suspect: port 8443. Many engineers think about port 1521 for Oracle, but modern secure connections—especially through proxies, firewalls, or cloud deployments—often redirect SQL*Plus over 8443. Understanding why, and how to configure it, saves hours of blind debugging.

Port 8443 is typically the secured HTTPS port. In some Oracle deployments, especially with Oracle REST Data Services or secure tunneling setups, SQL*Plus connections pass through it when standard database ports are blocked. This configuration needs correct listener settings, firewall rules, and sometimes load balancer adjustments. If anything in that chain rejects the session, SQL*Plus simply will not connect.

To use SQL*Plus over port 8443, confirm first that the database listener is configured for HTTPS on that port. In listener.ora, you’ll often find an (ADDRESS = (PROTOCOL = TCPS) (HOST = <hostname>) (PORT = 8443)) section. Ensure the host matches the domain reachable from the client machine. If a reverse proxy routes traffic, validate the mapping from 8443 down to the internal Oracle listener port.

On the client side, test the port’s accessibility with tnsping or openssl s_client -connect host:8443 to make sure there is no network block. If the check passes, edit your tnsnames.ora or EZCONNECT string to point SQL*Plus to the correct server and port:

Continue reading? Get the full guide.

VNC Secure Access + SQL Query Filtering: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.
sqlplus user/password@'(DESCRIPTION=(ADDRESS=(PROTOCOL=tcps)(HOST=mydb.example.com)(PORT=8443))(CONNECT_DATA=(SERVICE_NAME=myservice)))'

Certificates matter. If the listener is using TLS over 8443, the client must trust the certificate chain. Load the required certificates into the Oracle Wallet, and configure sqlnet.ora with the wallet location. A bad or missing certificate is a common cause of connection drops.

Performance matters too. 8443 connections may be subject to extra latency because of SSL handshakes and proxy routing. Test throughput and adjust SQL*Net parameters like SDU_SIZE if you move significant data through SQL*Plus over this port.

Once the connection is solid, you gain a reliable encrypted channel able to traverse many corporate and cloud network policies that would otherwise block database access. Port 8443 can be your secret entry point to keep administration smooth, scripts running, and downtime minimal.

If you want to see this in action without spending days on infrastructure setup, spin it up now on hoop.dev and watch a secure SQL*Plus session on port 8443 work end-to-end in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts