# Specifically closed ports

# Place ports which should be specifically blocked
# Shield makes no allowances for ALLOWING access to ports
# below 1024 which are NOT contained in "services.rules"

# I've included some oddball udp ports here for
# completeness sake (i.e., these ports showed up as open with
# a default nmap udp scan if not specifically blocked)

# By default, gShield drops connections to reserved
# ports (except for auth) and any -incoming- connection
# to high ports. gShield -DOES- allow udp's to high
# ports by default.

# Ports listed here are blocked for tcp, udp AND icmp, so
# if you are worried about a particular port/service
# being vulernable to external access or probes,
# drop it in here..

2049
3130
6969
7100
31789
12345:12346
31337

# Linuxconf
# Given the extensive use of Linuxconf by Redhat
# and others, we -specifically- block/log all
# external access to this port

98


