| Description | This article describes how to confirm if TCP/UDP 5060 and TCP 2000 ports are closed. |
| Scope | FortiGate. |
| Solution |
The following KB article can be followed to close ports TCP/UDP 5060 and TCP 2000: Technical Tip: How to close port TCP/UDP 5060 and TCP 2000
Post closing the ports there are scenarios where port shows open via telnet or from public port checking websites. Verify this by taking a sniffer on the FortiGate for port 2000.
FortiGate ports are blocked if we notice only the SYN packet and a 3-way handshake not being completed. Even though sniffers confirm handshake is not complete,the port would still be visible as open. In this scenario, NMAP is used which shows the port open below:
NMAP Results Nmap done: 1 IP address (1 host up) scanned in 10.36 seconds
NMAP shows the port open however tracert details from PC show destination is 7 hops away:
PS C:\Users\rba> tracert 10.5.56.59 Tracing route to 10.5.56.59 over a maximum of 30 hops
Packet capture on the source would show the TCP 3-way handshake as complete:
The destination is 7 hops away but still in the user PC capture if MAC is different and also TTL 64(in this case). The TTL field is decremented by each intervening IP router or hop. Based on the TTL count, it is possible to confirm packet originated closer to the source or from one of the hops that is spoofing the response than the original destination.
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.