could you perhaps copy and past the script for the port scan rule? here is the script from the wiki which ive tested
and works perfectly,tried give this one a go and see if you problem persists…
The difference between what I did and this is that I have this rule running in both the INPUT and FORWARD chains (i.e. I believe the wiki example only runs on the INPUT chain). I thought it would be good idea to look for port scans that were going across interfaces, but perhaps that was flawed thinking?!
if you put that rule under the input chain, it spans across all interfaces by default,eliminating the need to add it to any other
interfaces manually,hope it helps
We tried using a 21 weight in 3 seconds as shown for the Port Scan and found it would flag pretty much anyone downloading a directory full of small files. Passive FTP uses a unique port # on each file transfer, and CuteFTP Pro defaults to 5 concurrent connections, as you can imagine a weight of 21 can be achieved very easily in this setup. Even a 42 weight was hit multiple times by clients connecting to their FTP sessions. We are currently experimenting with a weight of 84, in hopes that a legitimate client doesn’t actually retrieve 84 files in 3 seconds (28 files a second).