• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Pfsense refusing to block 3 ports

Scheduled Pinned Locked Moved General pfSense Questions
10 Posts 4 Posters 1.1k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • P
    pfsense_user07
    last edited by pfsense_user07 Feb 5, 2020, 4:02 AM Feb 5, 2020, 4:02 AM

    I am attempting to reject traffic coming in on the WAN interface on ports 135, 139, and 445. I have several other ports rejected successfully, as well as port ranges which work fine. I have no microsoft devices connected on the LAN side. I make a rule to block these ports, they do not work. If I block a range of ports ( 135-445), then all the ports in the range except 135, 139, and 445 are rejected. I test this via an external nmap scan,a reset should show a closed port ( which it does for the various other rules). I have attempted to delete the rule, clear the state table (there is nothing on these ports that I can see), etc. but pfsense refuses to reject these microsoft ports.

    In addition, when I remove all rules relating to these ports and rely on the default deny ( drop packets), the firewall logs indicate that the traffic on these ports is passing through with unfettered access, i.e. no blocked log messages.

    Where can I start to debug this issue and get to the root, and does anyone have any idea why pfsense would refuse to block these 3 microsoft ports and allow a complete firewall bypass? I am on the most recent version

    1 Reply Last reply Reply Quote 0
    • C
      chpalmer
      last edited by chpalmer Feb 5, 2020, 4:32 AM Feb 5, 2020, 4:29 AM

      pfsense blocks all unsolicited traffic into the WAN port by default. You do not need to create block rules there to stop that traffic. If traffic is passing you need to explain changes you have made.

      Triggering snowflakes one by one..
      Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

      P 1 Reply Last reply Feb 5, 2020, 5:38 AM Reply Quote 0
      • P
        pfsense_user07
        last edited by Feb 5, 2020, 5:20 AM

        I wanted to change these ports from drop to reject, and the only changes that have been made are rules to make certain ports reject instead of block.

        1 Reply Last reply Reply Quote 0
        • P
          pfsense_user07 @chpalmer
          last edited by Feb 5, 2020, 5:38 AM

          @chpalmer I just factory reset the box, and immediately after I did a scan and viewed the firewall logs, every port except 135, 139 and 445 are blocked but even after a factory reset those ports are still allowed

          1 Reply Last reply Reply Quote 0
          • C
            chpalmer
            last edited by Feb 5, 2020, 6:00 AM

            Ok. You are checking these ports from outside your network right? If you check from your LAN then the LAN rules apply.

            If you are seeing answers from a service such as GRC.com then your modem or ISP is probably the culprit. pfSense by default blocks ALL inbound unsolicited traffic.

            You need to describe how you are testing and what your internet connection consists of.. DSL or Cable or ??

            Modem type? Do you actually have a publicly accessible IP address on the WAN of your pfSense box?

            Triggering snowflakes one by one..
            Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

            P 1 Reply Last reply Feb 5, 2020, 6:28 AM Reply Quote 0
            • P
              pfsense_user07
              last edited by Feb 5, 2020, 6:23 AM

              Yes I am getting an IP from the WAN. It is cable & docsis 3.0 modem. I'm not getting any answers from GRC.com. Yes the scan is coming from outside of the network on a completely separate public IP address.

              1 Reply Last reply Reply Quote 0
              • P
                pfsense_user07 @chpalmer
                last edited by pfsense_user07 Feb 5, 2020, 6:29 AM Feb 5, 2020, 6:28 AM

                @chpalmer After the factory reset, I downloaded the raw image and did a complete reinstall, and the same symptoms are occuring. I'm now wondering if my ISP is blocking those ports to protect those who plug their Windows XP SP1 boxes into their modem... Hence why I am not seeing it being filtered. Its an ISP provided modem. Is there anyway I can check and see if I'm receiving these packets at all to verify that there is some sort of ISP/modem filtering?

                1 Reply Last reply Reply Quote 0
                • C
                  chpalmer
                  last edited by Feb 5, 2020, 6:45 AM

                  @pfsense_user07 said in Pfsense refusing to block 3 ports:

                  135, 139, and 445

                  Yes many if not most ISP's automatically block those ports.

                  Yes you can enable logging on your block rules that you had put in place. But if you are not already seeing them in your block logs then your ISP is definitely blocking them.

                  Sometimes I will build a block rule and enable logging just to see how much traffic is hitting a certain port over time. Its quick and dirty but it works.

                  These are all on my WAN as inbound and allowed on my primary box here. But block rules show the same info. You can see the amount of data that hit a particular rule.

                  inbound.jpg

                  Triggering snowflakes one by one..
                  Intel(R) Core(TM) i5-4590T CPU @ 2.00GHz on an M400 WG box.

                  1 Reply Last reply Reply Quote 0
                  • S
                    stephenw10 Netgate Administrator
                    last edited by Feb 5, 2020, 1:17 PM

                    Yes, almost certainly this is your ISP blocking or maybe null routing that traffic.

                    Run a packet capture on the pfSense WAN while you're testing. Does traffic arrive on those ports.

                    Steve

                    1 Reply Last reply Reply Quote 0
                    • J
                      johnpoz LAYER 8 Global Moderator
                      last edited by johnpoz Feb 5, 2020, 1:35 PM Feb 5, 2020, 1:33 PM

                      As stated those are almost always blocked by ISP or even at the cable modem (docsis)...

                      As stated sniff on your wan while your sending traffic to that port - does it get there?

                      Also sending rejects on wan (that is connected to public internet) is almost always going to be a BAD idea!!!

                      example - I just checked 445 to my public on can you see me, and nothing seen at my wan via packet capture.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      1 Reply Last reply Reply Quote 0
                      10 out of 10
                      • First post
                        10/10
                        Last post
                      Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                        This community forum collects and processes your personal information.
                        consent.not_received