<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: port issue / nmapping in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/port-issue-nmapping/m-p/1249325#M6749</link>
    <description>&lt;P&gt;This behavior is not uncommon and usually depends on how the firewall handles the traffic and how Nmap interprets the response.&lt;/P&gt;&lt;P&gt;Even if the traffic logs and packet captures show that the Palo Alto is dropping the traffic, Nmap may still report the port as &lt;STRONG&gt;open&lt;/STRONG&gt; depending on the scan type and the response it receives. For example:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;If the firewall sends a TCP RST, Nmap may interpret the port as &lt;STRONG&gt;closed&lt;/STRONG&gt;.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;If the firewall silently drops the packet, Nmap may classify it as &lt;STRONG&gt;filtered&lt;/STRONG&gt;.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;If another device in the path (load balancer, upstream firewall, IDS/IPS, etc.) responds to the SYN request, Nmap may report the port as &lt;STRONG&gt;open&lt;/STRONG&gt;, even though the Palo Alto is dropping the traffic.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Since the issue only appears in production and not in the lab, I would investigate environmental differences such as:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Asymmetric routing (return traffic bypassing the firewall)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Upstream devices responding on behalf of the server&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Different Nmap scan types (e.g., &lt;CODE&gt;-sS&lt;/CODE&gt; vs &lt;CODE&gt;-sT&lt;/CODE&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;NAT behavior or policy differences in production&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Whether the firewall is configured to send TCP resets instead of silently dropping traffic&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;As a validation step, you can also test using &lt;CODE&gt;telnet&lt;/CODE&gt; or &lt;CODE&gt;nc&lt;/CODE&gt; to confirm whether a full TCP handshake is actually completed. Additionally, capturing traffic on both ingress and egress interfaces of the firewall can confirm whether any SYN-ACK is being generated from another device.&lt;/P&gt;</description>
    <pubDate>Tue, 03 Mar 2026 10:48:30 GMT</pubDate>
    <dc:creator>abayoumi21</dc:creator>
    <dc:date>2026-03-03T10:48:30Z</dc:date>
    <item>
      <title>port issue / nmapping</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/port-issue-nmapping/m-p/1247931#M6685</link>
      <description>&lt;P data-start="50" data-end="62"&gt;Hi everyone,&lt;/P&gt;
&lt;P data-start="64" data-end="123"&gt;I’m facing a strange issue and would appreciate your input.&lt;/P&gt;
&lt;P data-start="125" data-end="392"&gt;We created a security policy to block certain ports. When we check the traffic logs and packet captures, they clearly show that the traffic is being dropped. However, when we run an Nmap scan, it still reports the ports as &lt;STRONG data-start="348" data-end="356"&gt;open&lt;/STRONG&gt;, even though they should be closed.&lt;/P&gt;
&lt;P data-start="394" data-end="476"&gt;I also checked for any active sessions related to those ports, but there are none.&lt;/P&gt;
&lt;P data-start="478" data-end="689"&gt;We repeated the same test in two different lab environments, and everything worked as expected — Nmap showed the ports as closed. However, when we tested again in the production environment, the issue came back.&lt;/P&gt;
&lt;P data-start="691" data-end="836"&gt;Is this normal behavior? The logs and packet captures confirm the traffic is being dropped, but Nmap still shows the ports as open in production.&lt;/P&gt;
&lt;P data-start="838" data-end="923"&gt;Has anyone experienced something similar or have any idea what might be causing this?&lt;/P&gt;
&lt;P data-start="925" data-end="943" data-is-last-node="" data-is-only-node=""&gt;Thanks in advance!&lt;BR /&gt;&lt;BR /&gt;Version 11.1.6-h10&lt;/P&gt;</description>
      <pubDate>Wed, 11 Feb 2026 12:50:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/port-issue-nmapping/m-p/1247931#M6685</guid>
      <dc:creator>wally4</dc:creator>
      <dc:date>2026-02-11T12:50:48Z</dc:date>
    </item>
    <item>
      <title>Re: port issue / nmapping</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/port-issue-nmapping/m-p/1247932#M6686</link>
      <description>&lt;P&gt;Extra info:&lt;BR /&gt;I checked for asymmetric routing or if the traffic is working from a different gateway/route, but everything appears that it is correctly configured&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Feb 2026 12:52:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/port-issue-nmapping/m-p/1247932#M6686</guid>
      <dc:creator>wally4</dc:creator>
      <dc:date>2026-02-11T12:52:36Z</dc:date>
    </item>
    <item>
      <title>Re: port issue / nmapping</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/port-issue-nmapping/m-p/1247955#M6687</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1375435105"&gt;@wally4&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you have any applications listed in the security policy block rule?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Wed, 11 Feb 2026 17:24:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/port-issue-nmapping/m-p/1247955#M6687</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2026-02-11T17:24:39Z</dc:date>
    </item>
    <item>
      <title>Re: port issue / nmapping</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/port-issue-nmapping/m-p/1248022#M6689</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;Thank you for your response.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="isSelectedEnd"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;I attempted to block the application associated with the port in question; however, the port continues to appear as open during our nmap scans.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;For example, in the test environment, port 5060 shows as closed. In the production environment, however, it appears as open. Since SIP operates on port 5060, I created a rule to block the SIP application, but the port is still reachable.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="isSelectedEnd"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;When we perform the scan directly from server to server, the port correctly shows as closed. However, when the scan includes the firewall in the path, nmap reports the port as open.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="isSelectedEnd"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I will be uploading a PDF that explains the test environment results. The document shows the expected behavior that we would like to replicate in the production environment. The rules and configurations appear to be the same in both environments, yet the results are different.&lt;BR /&gt;&lt;BR /&gt;Best Regards,&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Feb 2026 08:08:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/port-issue-nmapping/m-p/1248022#M6689</guid>
      <dc:creator>wally4</dc:creator>
      <dc:date>2026-02-12T08:08:33Z</dc:date>
    </item>
    <item>
      <title>Re: port issue / nmapping</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/port-issue-nmapping/m-p/1248041#M6690</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1375435105"&gt;@wally4&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That behavior is indeed strange.&amp;nbsp; There is an additional piece of information that you should know.&amp;nbsp; If you include an application in a block rule, the NGFW will still allow a few packets in order to correctly identify the application.&amp;nbsp; The best practice in this case is to block port 5060, and leave the application field blank.&amp;nbsp; Then the NGFW will drop &lt;U&gt;all&lt;/U&gt; packets on port 5060.&amp;nbsp; I have seen this behavior on multiple vendor NGFWs, and it is expected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Thu, 12 Feb 2026 13:02:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/port-issue-nmapping/m-p/1248041#M6690</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2026-02-12T13:02:41Z</dc:date>
    </item>
    <item>
      <title>Re: port issue / nmapping</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/port-issue-nmapping/m-p/1248042#M6691</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Thank you for your answer.&lt;BR /&gt;&lt;BR /&gt;I will try that and check if it was the main reason.&lt;BR /&gt;&lt;BR /&gt;Best Regards,&lt;BR /&gt;&lt;BR /&gt;wally&lt;/P&gt;</description>
      <pubDate>Thu, 12 Feb 2026 13:09:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/port-issue-nmapping/m-p/1248042#M6691</guid>
      <dc:creator>wally4</dc:creator>
      <dc:date>2026-02-12T13:09:25Z</dc:date>
    </item>
    <item>
      <title>Re: port issue / nmapping</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/port-issue-nmapping/m-p/1248232#M6698</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Hope you are doing well.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;I blocked port 5060 and left the application field blank as you suggested, but we are still seeing the same issue.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Is there a way we can test whether this might be a false positive? It appears that traffic is being dropped when it attempts to pass through the port, but the scan is still reporting it as open.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;wally&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2026 08:01:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/port-issue-nmapping/m-p/1248232#M6698</guid>
      <dc:creator>wally4</dc:creator>
      <dc:date>2026-02-16T08:01:47Z</dc:date>
    </item>
    <item>
      <title>Re: port issue / nmapping</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/port-issue-nmapping/m-p/1248279#M6700</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1375435105"&gt;@wally4&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could you 1st confirm that you see the traffic hitting your block rule in the traffic logs?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2026 13:30:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/port-issue-nmapping/m-p/1248279#M6700</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2026-02-16T13:30:31Z</dc:date>
    </item>
    <item>
      <title>Re: port issue / nmapping</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/port-issue-nmapping/m-p/1248280#M6701</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Yes, the block rule is dropping the traffic to that port. That's why I find this case abnormal.&lt;BR /&gt;&lt;BR /&gt;Best Regards,&lt;BR /&gt;wally&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2026 13:33:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/port-issue-nmapping/m-p/1248280#M6701</guid>
      <dc:creator>wally4</dc:creator>
      <dc:date>2026-02-16T13:33:28Z</dc:date>
    </item>
    <item>
      <title>Re: port issue / nmapping</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/port-issue-nmapping/m-p/1248281#M6702</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1375435105"&gt;@wally4&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That is abnormal.&amp;nbsp; I have configured block rules the same on my NGFWs and tested them with a port scanner as you did.&amp;nbsp; My NGFW drops the traffic.&amp;nbsp; Something is off.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2026 13:36:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/port-issue-nmapping/m-p/1248281#M6702</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2026-02-16T13:36:42Z</dc:date>
    </item>
    <item>
      <title>Re: port issue / nmapping</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/port-issue-nmapping/m-p/1249325#M6749</link>
      <description>&lt;P&gt;This behavior is not uncommon and usually depends on how the firewall handles the traffic and how Nmap interprets the response.&lt;/P&gt;&lt;P&gt;Even if the traffic logs and packet captures show that the Palo Alto is dropping the traffic, Nmap may still report the port as &lt;STRONG&gt;open&lt;/STRONG&gt; depending on the scan type and the response it receives. For example:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;If the firewall sends a TCP RST, Nmap may interpret the port as &lt;STRONG&gt;closed&lt;/STRONG&gt;.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;If the firewall silently drops the packet, Nmap may classify it as &lt;STRONG&gt;filtered&lt;/STRONG&gt;.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;If another device in the path (load balancer, upstream firewall, IDS/IPS, etc.) responds to the SYN request, Nmap may report the port as &lt;STRONG&gt;open&lt;/STRONG&gt;, even though the Palo Alto is dropping the traffic.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Since the issue only appears in production and not in the lab, I would investigate environmental differences such as:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Asymmetric routing (return traffic bypassing the firewall)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Upstream devices responding on behalf of the server&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Different Nmap scan types (e.g., &lt;CODE&gt;-sS&lt;/CODE&gt; vs &lt;CODE&gt;-sT&lt;/CODE&gt;)&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;NAT behavior or policy differences in production&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Whether the firewall is configured to send TCP resets instead of silently dropping traffic&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;As a validation step, you can also test using &lt;CODE&gt;telnet&lt;/CODE&gt; or &lt;CODE&gt;nc&lt;/CODE&gt; to confirm whether a full TCP handshake is actually completed. Additionally, capturing traffic on both ingress and egress interfaces of the firewall can confirm whether any SYN-ACK is being generated from another device.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2026 10:48:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/port-issue-nmapping/m-p/1249325#M6749</guid>
      <dc:creator>abayoumi21</dc:creator>
      <dc:date>2026-03-03T10:48:30Z</dc:date>
    </item>
    <item>
      <title>Re: port issue / nmapping</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/port-issue-nmapping/m-p/1249649#M6759</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/830285149"&gt;@abayoumi21&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Thank you for your reply.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I kind of understand it more thanks to your explanation and i will recheck some of the stuff that you suggested.&lt;BR /&gt;&lt;BR /&gt;Best Regards,&lt;BR /&gt;wally&lt;/P&gt;</description>
      <pubDate>Sun, 08 Mar 2026 09:28:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/port-issue-nmapping/m-p/1249649#M6759</guid>
      <dc:creator>wally4</dc:creator>
      <dc:date>2026-03-08T09:28:36Z</dc:date>
    </item>
  </channel>
</rss>

