When you see ORA-12545: Connect failed because target host or object does not exist or the SQL*Plus prompt stalls, there’s a quiet suspect: port 8443. Many engineers think about port 1521 for Oracle, but modern secure connections—especially through proxies, firewalls, or cloud deployments—often redirect SQL*Plus over 8443. Understanding why, and how to configure it, saves hours of blind debugging.
Port 8443 is typically the secured HTTPS port. In some Oracle deployments, especially with Oracle REST Data Services or secure tunneling setups, SQL*Plus connections pass through it when standard database ports are blocked. This configuration needs correct listener settings, firewall rules, and sometimes load balancer adjustments. If anything in that chain rejects the session, SQL*Plus simply will not connect.
To use SQL*Plus over port 8443, confirm first that the database listener is configured for HTTPS on that port. In listener.ora, you’ll often find an (ADDRESS = (PROTOCOL = TCPS) (HOST = <hostname>) (PORT = 8443)) section. Ensure the host matches the domain reachable from the client machine. If a reverse proxy routes traffic, validate the mapping from 8443 down to the internal Oracle listener port.
On the client side, test the port’s accessibility with tnsping or openssl s_client -connect host:8443 to make sure there is no network block. If the check passes, edit your tnsnames.ora or EZCONNECT string to point SQL*Plus to the correct server and port: