WatchGuard acquires Percipient Networks to extend protection to the DNS layer, further increasing the value of Total Security Suite. Learn more about what this means for you and how you can improve your security with WatchGuard today!
Looking at the ports
<port protocol="udp" port="20128"/> <port protocol="udp" port="20129"/> <port protocol="udp" port="20130"/> <port protocol="udp" port="20131"/>
Using nmap from remote locations
# firewall-cmd --zone=public --list-all public (default, active) interfaces: enp1s0f1 sources: services: dhcpv6-client http https ports: 20128/udp 20130/udp 20129/udp 20131/udp masquerade: no forward-ports: icmp-blocks: rich rules: ***SNIP***
testing to a port that is not in the firewall
$ nmap -p 50128 -sU -P0 x.x.x.x Host is up (0.00031s latency). PORT STATE SERVICE 50128/udp closed unknown $ nmap -p 50129 -sU -P0 x.x.x.x Host is up (0.00034s latency). PORT STATE SERVICE 50129/udp closed unknown
# nmap -p 50120 -sU -P0 x.x.x.x PORT STATE SERVICE 50120/udp filtered unknown