viafax999 wrote:They have a backdoor on port 4567. Go into firewall setting, port forwarding rules and you'll see it there as a PF rule marked Verizon FIOS Service forwarding to destination 127.0.0.1 - local host (i.e. the router) You cannot delete or edit that rule but obviously there are several ways to disable the access if it really worries you. However as posted earlier it's pretty secure, of course whether the Verizon web site iteslf is as secure is a somewhat unknown factor.
I created a rule in advanced filtering to drop any packets sent to that port. "Input Rule Sets"->"Broadband Connection (Coax) Rules": "TCP Any -> 4567" "Source Address Any" "Destination Address Any" "Operation Drop".
When I test the port while the rule is active using shields up at grc.com or the port checker at canyouseeme.org it appears to be blocked, and it is reachable when I deactivate the rule. Does Verizon's undeletable rule supersede mine? Why do the port checking sites say it is unreachable?