<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic nmap showing open ports on all IPs in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/nmap-showing-open-ports-on-all-IPs/m-p/125909#M23202</link>
    <description>&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN class="test-id__field-value slds-form-element__static slds-grow  is-read-only"&gt;&lt;SPAN class="uiOutputTextArea"&gt;I'm running an nmap scan of a /24 network across an MPLS network and receiving unexpected responses on "proxy" related ports. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="test-id__field-value slds-form-element__static slds-grow  is-read-only"&gt;&lt;SPAN class="uiOutputTextArea"&gt;The traffic flow is:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="test-id__field-value slds-form-element__static slds-grow  is-read-only"&gt;&lt;SPAN class="uiOutputTextArea"&gt;linux nmap -&amp;gt; FW1 -&amp;gt; MPLS -&amp;gt;FW2 -&amp;gt; 192.168.10.0 /24 &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="test-id__field-value slds-form-element__static slds-grow  is-read-only"&gt;&lt;SPAN class="uiOutputTextArea"&gt;i'm expecting no responses as all traffic is blocked on the FW2 firewall, but here is an example of what i'm receiving for every IP in the block:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Nmap scan report for 192.168.10.127&lt;BR /&gt;Host is up (0.0014s latency).&lt;BR /&gt;Not shown: 994 filtered ports&lt;BR /&gt;PORT STATE SERVICE&lt;BR /&gt;80/tcp open http&lt;BR /&gt;1720/tcp open h323q931&lt;BR /&gt;3128/tcp open squid-http&lt;BR /&gt;8000/tcp open http-alt&lt;BR /&gt;8001/tcp open vcom-tunnel&lt;BR /&gt;8080/tcp open http-proxy&lt;/P&gt;&lt;P&gt;There is not even a device at this IP - 192.168.10.127&lt;/P&gt;&lt;P&gt;&lt;SPAN class="test-id__field-value slds-form-element__static slds-grow  is-read-only"&gt;&lt;SPAN class="uiOutputTextArea"&gt;We do not have a proxy server, we do not have proxy enabled on any of the gateways. When i look at the fw logs between the nmap client and the 192.168.10.0 network, i see traffic hit both firewalls, accepted at FW1, and dropped at FW2 - EXCEPT FOR THE PORTS LISTED ABOVE. For those ports, i only see the traffic accepted on FW1.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="test-id__field-value slds-form-element__static slds-grow  is-read-only"&gt;&lt;SPAN class="uiOutputTextArea"&gt;Any thoughts as to what is responding?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="test-id__field-value slds-form-element__static slds-grow  is-read-only"&gt;&lt;SPAN class="uiOutputTextArea"&gt;Thanks - all versions are r80.40 jhfa 118&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 06 Aug 2021 22:36:20 GMT</pubDate>
    <dc:creator>D_TK</dc:creator>
    <dc:date>2021-08-06T22:36:20Z</dc:date>
    <item>
      <title>nmap showing open ports on all IPs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/nmap-showing-open-ports-on-all-IPs/m-p/125909#M23202</link>
      <description>&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN class="test-id__field-value slds-form-element__static slds-grow  is-read-only"&gt;&lt;SPAN class="uiOutputTextArea"&gt;I'm running an nmap scan of a /24 network across an MPLS network and receiving unexpected responses on "proxy" related ports. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="test-id__field-value slds-form-element__static slds-grow  is-read-only"&gt;&lt;SPAN class="uiOutputTextArea"&gt;The traffic flow is:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="test-id__field-value slds-form-element__static slds-grow  is-read-only"&gt;&lt;SPAN class="uiOutputTextArea"&gt;linux nmap -&amp;gt; FW1 -&amp;gt; MPLS -&amp;gt;FW2 -&amp;gt; 192.168.10.0 /24 &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="test-id__field-value slds-form-element__static slds-grow  is-read-only"&gt;&lt;SPAN class="uiOutputTextArea"&gt;i'm expecting no responses as all traffic is blocked on the FW2 firewall, but here is an example of what i'm receiving for every IP in the block:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Nmap scan report for 192.168.10.127&lt;BR /&gt;Host is up (0.0014s latency).&lt;BR /&gt;Not shown: 994 filtered ports&lt;BR /&gt;PORT STATE SERVICE&lt;BR /&gt;80/tcp open http&lt;BR /&gt;1720/tcp open h323q931&lt;BR /&gt;3128/tcp open squid-http&lt;BR /&gt;8000/tcp open http-alt&lt;BR /&gt;8001/tcp open vcom-tunnel&lt;BR /&gt;8080/tcp open http-proxy&lt;/P&gt;&lt;P&gt;There is not even a device at this IP - 192.168.10.127&lt;/P&gt;&lt;P&gt;&lt;SPAN class="test-id__field-value slds-form-element__static slds-grow  is-read-only"&gt;&lt;SPAN class="uiOutputTextArea"&gt;We do not have a proxy server, we do not have proxy enabled on any of the gateways. When i look at the fw logs between the nmap client and the 192.168.10.0 network, i see traffic hit both firewalls, accepted at FW1, and dropped at FW2 - EXCEPT FOR THE PORTS LISTED ABOVE. For those ports, i only see the traffic accepted on FW1.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="test-id__field-value slds-form-element__static slds-grow  is-read-only"&gt;&lt;SPAN class="uiOutputTextArea"&gt;Any thoughts as to what is responding?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="test-id__field-value slds-form-element__static slds-grow  is-read-only"&gt;&lt;SPAN class="uiOutputTextArea"&gt;Thanks - all versions are r80.40 jhfa 118&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Aug 2021 22:36:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/nmap-showing-open-ports-on-all-IPs/m-p/125909#M23202</guid>
      <dc:creator>D_TK</dc:creator>
      <dc:date>2021-08-06T22:36:20Z</dc:date>
    </item>
    <item>
      <title>Re: nmap showing open ports on all IPs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/nmap-showing-open-ports-on-all-IPs/m-p/125910#M23203</link>
      <description>&lt;P&gt;Port 80 is likely because of an implied rule.&lt;BR /&gt;What precisely shows in the logs on FW2 when the traffic is accepted in the other cases?&lt;BR /&gt;Screenshots of log cards would be helpful.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Aug 2021 23:14:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/nmap-showing-open-ports-on-all-IPs/m-p/125910#M23203</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-08-06T23:14:40Z</dc:date>
    </item>
    <item>
      <title>Re: nmap showing open ports on all IPs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/nmap-showing-open-ports-on-all-IPs/m-p/125913#M23204</link>
      <description>&lt;P&gt;Attached is a simple example.&amp;nbsp; I did a scan of tcp/21 and tcp/8080.&amp;nbsp; for 21 it shows exactly what i expected, allowed at fw1 and dropped at fw2.&amp;nbsp; For tcp/8080, accepted at fw1, and nothing at fw2 - a running fw monitor showed the same, it's like it never reached that side of the net, but nmap showed 8080 as open, and again, there isn't even a device at that IP.&lt;/P&gt;&lt;P&gt;In the attached screenshot, "car-1" is the near side, "lc-1" is the far side.&amp;nbsp; lmk if you like to see the actual card for any of these entries.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Fri, 06 Aug 2021 23:39:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/nmap-showing-open-ports-on-all-IPs/m-p/125913#M23204</guid>
      <dc:creator>D_TK</dc:creator>
      <dc:date>2021-08-06T23:39:43Z</dc:date>
    </item>
    <item>
      <title>Re: nmap showing open ports on all IPs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/nmap-showing-open-ports-on-all-IPs/m-p/125917#M23207</link>
      <description>&lt;P&gt;What about something other than port 8080?&lt;BR /&gt;HTTPS Inspection picked up the traffic, even though it was a bypass rule, which I’m sure impacted the scan result.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 07 Aug 2021 06:23:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/nmap-showing-open-ports-on-all-IPs/m-p/125917#M23207</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-08-07T06:23:57Z</dc:date>
    </item>
    <item>
      <title>Re: nmap showing open ports on all IPs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/nmap-showing-open-ports-on-all-IPs/m-p/125926#M23209</link>
      <description>&lt;P&gt;I ran another scan for all the ports that show as "open" + tcp/21 (as the example of what's expected).&amp;nbsp; Results attached.&lt;/P&gt;&lt;P&gt;Appreciate your help.&lt;/P&gt;</description>
      <pubDate>Sat, 07 Aug 2021 17:15:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/nmap-showing-open-ports-on-all-IPs/m-p/125926#M23209</guid>
      <dc:creator>D_TK</dc:creator>
      <dc:date>2021-08-07T17:15:13Z</dc:date>
    </item>
    <item>
      <title>Re: nmap showing open ports on all IPs</title>
      <link>https://community.checkpoint.com/t5/General-Topics/nmap-showing-open-ports-on-all-IPs/m-p/125965#M23216</link>
      <description>&lt;P&gt;Clearly the first gateway is seeing the traffic and nmap is getting something back.&lt;BR /&gt;That means something is answering the nmap probes.&lt;BR /&gt;The question is: what?&lt;BR /&gt;Can you confirm traffic is leaving the first gateway with tcpdump?&lt;BR /&gt;Is there any reply traffic and from what MAC does it originate?&lt;BR /&gt;If the second gateway, then you may need to see what is happening there.&amp;nbsp;&lt;BR /&gt;Follow the bouncing packet.&lt;/P&gt;
&lt;P&gt;Also rather than using nmap, try something like telnet or netcat on one of the ports (8000) and see what precisely happens, observing with tcpdump and/or fw monitor.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Aug 2021 21:55:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/nmap-showing-open-ports-on-all-IPs/m-p/125965#M23216</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-08-08T21:55:30Z</dc:date>
    </item>
  </channel>
</rss>

