Online Firewall Test for Work or Home

A Firewall Test conducted by an external port scanner is the easiest way to identify open services. An unprotected open service (listening port) can be a major security weakness in poor firewall or router configurations. Continue reading to understand the benefits of a remote firewall test and why understanding your network perimeter is an essential part of any Business or Home Network.

Enter an IP address in the form below to perform a quick online firewall test. The port scan will test ten of the most common TCP services (ports), with results showing a port as open, closed or filtered.


This firewall test is a high level overview that can reveal the status of a system firewall based on the port responses. See the Nmap Tutorial for more detail on interpreting the results.

To ensure complete coverage when testing a firewall you should perform a scan against the full range of ports. You can run port scanning software yourself or you can use perform a comprehensive firewall test using our hosted Online Nmap Port Scanner.

Why You Need an External Firewall Test

To understand how vulnerable your systems are to external attackers, you need to understand what they look like on the network from an external or Internet facing perspective. A port scan conducted from outside a network perimeter will map and identify vulnerable systems.

Technical operations staff need to know what their network perimeter looks like from the outside. The perimeter may be a single IP gateway, a hosted Internet server or a whole Class B network; it does not matter - you need to understand what services Internet based threats can see and what they are able to access.

If you are a systems administrator or a security analyst for an organisation having access to an external port scanner will provide a number of benefits. The most important being that you should know the services listening on your perimeter. Testing should be performed at least monthly and ideally more often, to monitor for changes to the perimeter.

A simple image showing a firewall and server

Home Router Firewall

For many users a home router is the firewall device that they will have to manage. In this case the most common configuration is for the SOHO device to be performing NAT (network address translation). In a NAT configuration the internal network has a number of devices on private IP address ranges (192.168.1.x) and they communicate with the Internet through the SOHO router. The router has a single public IP address assigned by the Internet provider or ISP. The translation of internal to public IP address is the NAT process.

Home routers should be port scanned to check for two important considerations:
1. The device itself may have listening services for management such as HTTP (tcp port 80) or Telnet (tcp port 23). These are normally only accessible from the Internal network, but if they are listening on the Public Internet side then anyone can access them and if the password is default or weak this could easily be accessed. If someone has access to your router, they can attack any devices on the Internal network.
2. Port Forwarding is another important consideration, where the external interface forwards traffic to an Internal address so that is accessible from the Internet. If you are hosting services on your Internal network and you want these to be accessible, you may setup a port forwarding rule on the SOHO router. Port scanning the external IP address can help troubleshoot port forwards and ensure that there are no services being forwarded that should not be.

Firewall Administration

The primary function of a firewall is to block unauthorised packets from being able to reach listening services. The firewall can be situated on the perimeter of an organisations network or it can be on an internal network. It can also be host based, running on the server or workstation.

Multiple firewalls and filtering devices increases the complexity of assessing a network. Using a port scanner one is able to quickly assess what ports are being permitted through the various layers of defence and are able to reach services on the end point host. Testing a firewall with a port scanner is more accurate and faster than combing through potentially hundreds of rules in a firewall, and piecing together how that fits with the other networking kit.

For example there could be Checkpoint Firewalls being used in conjunction with Cisco networking gear that is configured with ACL's (access control lists) and NAT (network address translation). The servers might then have Linux based IP Tables, Windows Firewall or even Zone Alarm (eek!).

Firewall Rule Base auditing by hand is an important (and tedious) job - the benefit of port scanning is you get results quicker with more assurance that nothing was missed. Combine the two and drop all those unwanted packets.

To effectively test a firewall and network for external access points, it is necessary to perform the port scanning from a remote host. By using our hosted online port scanner service you are able to quickly test a range of IP Addresses or a single IP address. All 65535 ports can be tested at the click of a mouse, with the results delivered to your email address for review.

From the results of the port scan you are able to determine the state of all ports:

  • Filtered - (Packet is Dropped) this indicates the port is being filtered by a Firewall or Router, this is recommended state for any port that does not have a listening service on it.
  • Closed - (Packet is Denied - response sent) this indicates traffic destined to this port is being allowed past any firewall / router devices and is arriving at the destination host (which has no listening service running on that port).
  • Open - (TCP Handshake Established) this indicates that a connection to a listening service has been made. This state should only be found on services that have a requirement to be externally facing (HTTP 80 and SMTP 25 are two examples of common external facing services).

Ingress Filtering

Ingress Filtering is the traffic coming into your network from the Internet. It is used to restrict access to vulnerable services, reduce attack surface of Internet facing systems and reduce ability of an attacker to open back-doors on Internet facing ports.

Egress Filtering

Egress Filtering is the traffic leaving your network. Data ex-filtration and outbound initiated remote access. Command shells and other remote access can be achieved by a system initiating an outbound connection. Limiting the available outbound ports can make this outbound communication more difficult for an attacker. Note - this does not entirely solve the problem as advanced tools and attackers are able to initiate communication through multiple means including over HTTPS proxy servers, SMTP and even DNS queries.

Troubleshooting Network Services

When installing and configuring Internet facing services it will often be necessary to troubleshoot a network configuration in order to get a service up and running. For example you may have correctly setup the service on the server with everything operating correctly, however an external firewall may be blocking remote access to this service.

While the situations in which network troubleshooting is required are varied, it is a common methodology to perform an external port scan against the network port or system to quickly understand where the problem may lie. If you are able to connect to a service from the internal host but unable to connect from external, you can make a pretty good guess at where the problem might lie. By performing a port scan using an external online port scan you are able to quickly confirm that all the required services are being filtered - hence your troubleshooting can move to looking at any external or host based firewalls that are blocking that port.

Mapping Networks and Services

In order to determine how vulnerable a network or host is to exploitation, it is necessary to know what services are running and whether they are externally facing (or accessible from the Internet). By performing a remote port scan against the network IP range or against a specific host it is possible to determine not only the open ports but also the types of services running on those ports. This is known as service detection and is a feature of most well known port scanners such as the nmap port scanning tool.

Further more identification of the actual operating system is also possible, either from the service identification or through more low level analysis of the packets coming back from the host.

System and network administrators will also utilize port scanners to map the external network of a host or organisation. Networks change over time and documentation is not always kept current, so a quick port scan of the services listening on a network will help a system administrator to understand the layout of the network.

, , ,

Comments are closed.