Hey all,
A customer has to show all listening ports on there firewall and netstat -an reveals several (approx. 20) ports > 50000 listening to 0.0.0.0 (IE all) on their box. I thought maybe it was for NAT or something along those lines, but when I checked my VM SPLAT, after installing a super basic policy ensuring no NATing/VPN was enabled, I found the close to the same amount of high ports listening on it. Adding the -p tag showed they all (with the exception of one) were open by fwd; therefore, a cpstop closed them. Anyone know why Check Points firewall uses these high ports?
Policy properly blocks access to them; thus the need for the stealth rule, but customer still needs to explain the listening ports...
Bookmarks