Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    2.1 Failing the GRC firewall test

    Scheduled Pinned Locked Moved General pfSense Questions
    47 Posts 13 Posters 15.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • K
      kejianshi
      last edited by

      I'm in Manilla…
      That VM is running on a machine is in a rack in Copenhagen. 
      I did use a VPN to access the desktop and kick off the scan, but I'm not in the desktop right now.
      Looks like it will take about another 20 minutes.  Abit like watching paint dry.
      I'll check it again in 20.

      1 Reply Last reply Reply Quote 0
      • K
        kejianshi
        last edited by

        All scanned port filtered.  Also doesn't respond to ping.

        In other words, less than nothing.

        I only scanned 2000 ports.

        1 Reply Last reply Reply Quote 0
        • S
          Supermule Banned
          last edited by

          Thanks dude. :)

          1 Reply Last reply Reply Quote 0
          • DerelictD
            Derelict LAYER 8 Netgate
            last edited by

            2.1.5 Cox Las Vegas.

            
            –--------------------------------------------------------------------
            
            GRC Port Authority Report created on UTC: 2014-10-20 at 18:41:47
            
            Results from scan of ports: 0-1055
            
                0 Ports Open
                0 Ports Closed
             1056 Ports Stealth
            ---------------------
             1056 Ports Tested
            
            ALL PORTS tested were found to be: STEALTH.
            
            TruStealth: FAILED - ALL tested ports were STEALTH,
                               - NO unsolicited packets were received,
                               - A PING REPLY (ICMP Echo) WAS RECEIVED.
            
            ----------------------------------------------------------------------
            
            

            Chattanooga, Tennessee, USA
            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
            Do Not Chat For Help! NO_WAN_EGRESS(TM)

            1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator
              last edited by

              "Most dynamically choose a port at run time, and if that port isn't being forwarded, you can't play."

              What game is this - that is moronic way to do it..

              "How can you forward the same port to two different computers,"

              I never said you could, that is why game on computer A uses port X, game on computer B uses port Y, etc.  You seem to completely miss the point, as to your block on WAN??  There is already a BLOCK for ANY, unless you allow it its block.. Putting in another block is pointless!!  And yes UPnP would create an allow rule – which is the issue with it in the first place!

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              1 Reply Last reply Reply Quote 0
              • stephenw10S
                stephenw10 Netgate Administrator
                last edited by

                Hmm, this is unclear to me. Adding a block rule is not the same as there being no allow rule.
                Where, logically, in the chain of rules does the upnp added rule appear?

                Steve

                1 Reply Last reply Reply Quote 0
                • T
                  Texnet
                  last edited by

                  Hi All,

                  Thanks for your replies.  I have checked the rules i have in place and these are just TCP only not UDP.  There are no rules set for the ports that state open the GRC test states there is 640 Ports Open i know i do not have rules for these.  I have disabled UDP on the BT business hub as an extra measure and run the test again but this made no difference.  I have attached our current rules applied.  I am wondering if it is in fact the BT business hub that is responding not the firewall as if i turn on the firewall on the business hub we get true stealth?

                  Thanks

                  ![firewall rules.png](/public/imported_attachments/1/firewall rules.png)
                  ![firewall rules.png_thumb](/public/imported_attachments/1/firewall rules.png_thumb)

                  1 Reply Last reply Reply Quote 0
                  • K
                    kejianshi
                    last edited by

                    UDP was never a problem.

                    uPNP might be a problem.

                    Your pfsense isn't doing something different than every other pfsense on the net UNLESS you have changed something from default OR a client on the LAN is causing it.

                    Thats what we need to find.  Its one of those two things.

                    1 Reply Last reply Reply Quote 0
                    • T
                      Texnet
                      last edited by

                      Sorry miss read uPNP will have a look on the Business hub pfSense and see if there is anything.  As the pfSense is running default with 3 rules added i assume that this is not enabled by default?

                      1 Reply Last reply Reply Quote 0
                      • K
                        kejianshi
                        last edited by

                        Ohhhh - Forgot to mention.  Please reboot pfsense between modifications.

                        Also, disconnect everything except 1 CLEAN client (preferably a clean bare OS install with browser).

                        1 Reply Last reply Reply Quote 0
                        • K
                          kejianshi
                          last edited by

                          uPNP is off by default.

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            How do you have the business hub setup? Is it passing your public IP to pfSense?

                            Steve

                            1 Reply Last reply Reply Quote 0
                            • T
                              Texnet
                              last edited by

                              Hi,

                              We have it setup on the home screen to use Public IP addresses we have 13 in total.

                              Static IP: Enabled

                              The Firewall devices have then got the public IP addresses on the WAN interfaces.  The router itself is not assigning these to the devices they are static Public IP's on the firewall devices.

                              1 Reply Last reply Reply Quote 0
                              • stephenw10S
                                stephenw10 Netgate Administrator
                                last edited by

                                Sorry for the delay. I'm not familiar with the business hub but it seems very likely that it is causing the open port reports you're seeing. I'm still not clear how you have it configured.

                                Steve

                                1 Reply Last reply Reply Quote 0
                                • First post
                                  Last post
                                Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.