Can TC ports be stealthed to ShieldsUP?
TC, running 7.9.1 firmware, wired directly to cable modem. AirPort Utility 6.3.9 on Mojave connecting over WiFi to TC.
Right now, ShieldsUP shows everything "closed" except for 139, 445, and 548, which are "open." GRC reports those as 139 (NetBIOS Session Service), 445 (Microsoft Directory Service), and 548 (AFP over TCP), although I understand that may not be what macOS is doing with them.
Are there any TC settings that would close 139, 445, and 548 (or any of them)?
Is there any way to "stealth" ports using a TC?
TIA,
Mark