I am trying to test some settings on my router that allow certain ports (e.g. 139) to be open for inbound traffic - via port forwarding.
For that, I use a port scan service like ShieldsUp on
However, no matter what I do (I even did port forwarding on ALL ports to my test PC (running XP with its firewall turned off), the test results always show ALL ports as stealthed.
Internally (in my LAN) I used a Linux port scanner to verify that my test PC indeed has at least ports 135, 139 and 445 open. They are definitely open on the test PC.
I also temporarily configured my router to set the test PC as a DMZ (on my NETGEAR router it is call "Default DMZ Server") - and indeed the
However, I don't understand what is the difference between this "officially labeled" DMZ setting to port forwarding of ALL the ports. Could someone please help me understand this?
For example, is it possible that a DMZ server is being skipped the NAT done by the router? (despite it retaining the internal LAN address?)
Thanks, Alex