<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Nmap open port in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/nmap-open-port/m-p/581100#M2859</link>
    <description>&lt;P&gt;Hi &lt;SPAN style="background: var(--ck-color-mention-background); color: var(--ck-color-mention-text);"&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/768512591"&gt;@dc93ra&lt;/a&gt;&lt;/SPAN&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When you run nmap from your host to the target server, does that traffic go through the firewall? Can you verify that the fiirewall is in fact in-line with the nmap to destination server? Without knowing much of your environment, could it be that you are running nmap directly to the server without traversing the firewall? I would check the target server to see if it is listening on the ports that is shown through nmap.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 20 Mar 2024 19:07:11 GMT</pubDate>
    <dc:creator>JayGolf</dc:creator>
    <dc:date>2024-03-20T19:07:11Z</dc:date>
    <item>
      <title>Nmap open port</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/nmap-open-port/m-p/580886#M2850</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I find myself confused regarding the following case: when running a scan with nmap on an IP address that was previously on my access list, nmap indicates that the ports are still open.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;C:\Program Files (x86)\Nmap&amp;gt;.\nmap.exe xxx.xxx.xxx.xx -p 22,3389,5900,1433,3306,21,110,143,23,6667,1025,548,143,23,667,1025,548,445,139,135,1026&lt;BR /&gt;Starting Nmap 7.94 ( &lt;A href="https://nmap.org" target="_blank"&gt;https://nmap.org&lt;/A&gt; ) at 2024-03-19 08:50 Hora estßndar romance&lt;BR /&gt;WARNING: Duplicate port number(s) specified. Are you alert enough to be using Nmap? Have some coffee or Jolt(tm).&lt;BR /&gt;Nmap scan report for xxx.xxx.xxx.xx&lt;BR /&gt;Host is up (0.056s latency).&lt;/P&gt;
&lt;P&gt;PORT STATE SERVICE&lt;BR /&gt;21/tcp open ftp&lt;BR /&gt;22/tcp open ssh&lt;BR /&gt;23/tcp open telnet&lt;BR /&gt;110/tcp open pop3&lt;BR /&gt;135/tcp filtered msrpc&lt;BR /&gt;139/tcp filtered netbios-ssn&lt;BR /&gt;143/tcp open imap&lt;BR /&gt;445/tcp filtered microsoft-ds&lt;BR /&gt;548/tcp open afp&lt;BR /&gt;667/tcp open disclose&lt;BR /&gt;1025/tcp open NFS-or-IIS&lt;BR /&gt;1026/tcp open LSA-or-nterm&lt;BR /&gt;1433/tcp open ms-sql-s&lt;BR /&gt;3306/tcp open mysql&lt;BR /&gt;3389/tcp open ms-wbt-server&lt;BR /&gt;5900/tcp open vnc&lt;BR /&gt;6667/tcp open irc&lt;/P&gt;
&lt;P&gt;Nmap done: 1 IP address (1 host up) scanned in 2.92 seconds&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Despite having removed the object and all applicable policies, the result still shows that the ports are open.&lt;/P&gt;
&lt;P&gt;When I check the traffic, I see that all connection attempts are rejected, as the policies I have set for access control are as follows:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Captura de pantalla 2024-03-19 090038.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/58474i44BE182F5D3C3919/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Captura de pantalla 2024-03-19 090038.png" alt="Captura de pantalla 2024-03-19 090038.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there any solution to this problem?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you very much for your help.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2024 08:01:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/nmap-open-port/m-p/580886#M2850</guid>
      <dc:creator>dc93ra</dc:creator>
      <dc:date>2024-03-19T08:01:48Z</dc:date>
    </item>
    <item>
      <title>Re: Nmap open port</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/nmap-open-port/m-p/581100#M2859</link>
      <description>&lt;P&gt;Hi &lt;SPAN style="background: var(--ck-color-mention-background); color: var(--ck-color-mention-text);"&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/768512591"&gt;@dc93ra&lt;/a&gt;&lt;/SPAN&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When you run nmap from your host to the target server, does that traffic go through the firewall? Can you verify that the fiirewall is in fact in-line with the nmap to destination server? Without knowing much of your environment, could it be that you are running nmap directly to the server without traversing the firewall? I would check the target server to see if it is listening on the ports that is shown through nmap.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2024 19:07:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/nmap-open-port/m-p/581100#M2859</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2024-03-20T19:07:11Z</dc:date>
    </item>
  </channel>
</rss>

