There is an online MMORPG game, "Chronicles of Spellborn", that when launched on a machine on the LAN, is trying to create an incoming connection to the internal address of the firewall using UDP port 137. Even though I have created a rule in the Packet Filter to allow this, it is still being dropped. Here's 1 of the 3 lines in the Packet Filter log:
21:54:36 Default DROP UDP 5.239.175.97:137 → 192.168.0.100:137 len=78 ttl=128 tos=0x00 srcmac=00:00:00:00:00:00
I've tried various forms of the rule with more or less restrictions, but basically: Source= 5.239.175.97, Service= TCP/UDP port 137, Destination= Internal (Network) [I've tried the Internal NIC address (192.168.0.100), the client's address, etc.], Action= Allow, Time= Always.
And, yes, I've activated the rule; and no, I don't have any other blocking rules in my custom Packet Filter rules.
Yet, the packets are still being dropped. Is this because it is trying to use Netbios NS, which, to my knowledge, isn't really designed as a routable protocol; or is there some other security setting at a higher level that would be blocking this (does Astaro see it as a Windows Attack, for instance)?
Any ideas? Thanks!
This thread was automatically locked due to age.