Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    ports showing as open on zenmap despite being explicitly blocked on firewall

    Firewalling
    5
    7
    608
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J
      jaklawrence
      last edited by

      Hi!

      Got a relatively default PfSense install handling routing and firewalling for our office network. Got explicit firewall rules blocking inbound traffic to 80, 8080, 443 and 993 but all of them still show up in nmap/zenmap as being open. There's no ability to connect down them thanks to the aforementioned rules and actual traffic is being blocked - but for PCI Compliance its much easier and less paperwork for us to have these not show up as being open on a scan. How can I close these ports?

      M awebsterA 2 Replies Last reply Reply Quote 0
      • M
        msf2000 @jaklawrence
        last edited by

        @jaklawrence
        Are the fw rules set to “reject” or “block”? And are we talking tcp or udp or both?

        1 Reply Last reply Reply Quote 0
        • awebsterA
          awebster @jaklawrence
          last edited by

          @jaklawrence By default, pfsense blocks all inbound traffic on WAN, so why do you have explicit blocks?

          –A.

          1 Reply Last reply Reply Quote 0
          • J
            jaklawrence
            last edited by

            It is purely an exercise in preparation since we know that when the compliance testers scan us, any open ports showing on our WAN IP require a fair bit of irritating paperwork to declare false positive.

            I've been playing around and have set WAN Rejects (also tried block with the same result) on all traffic inbound ports 80, 8080, 443 and 993 but nmap is still showing those ports as 'open' under an intense scan. I've got no doubt that any traffic on them will be blocked, but I'd like to prevent them from appearing as 'open' on a scan for the aforementioned compliance test reasons!

            1 Reply Last reply Reply Quote 0
            • KOMK
              KOM
              last edited by

              You definitely want a Block rule instead of Reject. Block rules silently block the traffic and that's all. Reject rules send back a GO AWAY, so a scanner knows something is listening on that port.

              Post a screen of your WAN rules with any public details obscured so we can see what we're dealing with.

              awebsterA 1 Reply Last reply Reply Quote 0
              • awebsterA
                awebster @KOM
                last edited by

                @KOM and in some cases can be used as part of a reflected DDoS, so yeah definitely never reject on WAN side, only block.

                –A.

                1 Reply Last reply Reply Quote 0
                • chpalmerC
                  chpalmer
                  last edited by

                  I would also ask where you are testing from. If it is anywhere from behind your own LAN then you will fool yourself.

                  These kinds of tests must be done from the WAN side.

                  Triggering snowflakes one by one..
                  Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

                  1 Reply Last reply Reply Quote 1
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.